Careful data collection, specific keyword searches and the type of breach were factors that FireEye used to determine that Kremlin-sponsored hackers were behind one of the largest cyber-espionage operations in recent years. The first revelations about what would come to be known as the SolarWinds campaign — in which spies exploited the federal contractor to breach nine U.S. government agencies and roughly 100 companies — occurred in early December 2020, when FireEye announced that hackers had stolen its security testing tools. The Milpitas-based company discovered that SolarWinds software was affected during the course of its own investigation, sparking examinations throughout U.S. national security circles that remain ongoing. “We learned it’s fair game to hack the supply chain,” FireEye CEO Kevin Mandia said Tuesday during CyberTalks, a summit presented by CyberScoop. While scrambling to understand the scope of the breach, FireEye investigators observed that hackers had searched for specific keywords, an […]
The post How FireEye attributed the SolarWinds hacking campaign to Russian spies appeared first on CyberScoop.
Continue reading How FireEye attributed the SolarWinds hacking campaign to Russian spies→