SolarWinds

SolarWinds Corporation is an American company that develops software for businesses to help manage their networks, systems, and information technology infrastructure. It is headquartered in Austin, Texas, with sales and product development offices in a number of locations in the United States and several other countries.[3] The company was publicly traded from May 2009 until the end of 2015, and again from October 2018. It has also acquired a number of other companies, some of which it still operates under their original names, including Pingdom, Papertrail and Loggly.[4] It had about 300,000 customers as of December 2020, including nearly all Fortune 500 companies and numerous agencies of the US federal government.[5][6]

SolarWinds Corporation
TypePublic company
ISINUS83417Q1058
IndustrySoftware
GenreNetwork monitoring
Founded1999 (1999) in Tulsa, Oklahoma, U.S.
Founders
  • Donald Yonce
  • David Yonce
Headquarters,
U.S.
Key people
Sudhakar Ramakrishna (CEO)[1]
ProductsAppOptics, Loggly, Pingdom, Papertrail
RevenueIncrease US$719 million (2022)
Decrease US$−820 million (2022)
Decrease US$−929 million (2022)
Total assetsDecrease US$3.20 billion (2022)
Total equityDecrease US$1.37 billion (2022)
Number of employees
2,305 (Dec 2022)
Websitesolarwinds.com
Footnotes / references
[2]

A SolarWinds product, Orion, used by about 33,000 public and private sector customers, was the focus of a large-scale attack disclosed in December 2020. The attack persisted undetected for months in 2020, and additional details about the breadth and depth of compromised systems continued to surface after the initial disclosure.[7] In February 2021, Microsoft President Brad Smith said that it was "the largest and most sophisticated attack the world has ever seen".[8]

History

SolarWinds began in 1999 in Tulsa, Oklahoma, co-founded by Donald Yonce (a former executive at Walmart) and his brother Dave Yonce.[9][10][11][12] SolarWinds released its first products, Trace Route and Ping Sweep, earlier in March 1998 and released its first web-based network performance monitoring application in November 2001.[13] According to Michael Bennett, who became the chief executive officer in 2006,[14] the name SolarWinds was chosen by an early employee and the company has nothing to do with solar or wind power.[15] In 2006, the company moved its headquarters to Austin, Texas,[10] where about 300 of the company's total 450 employees were based as of 2011.[9] The company was profitable from its founding through its IPO in 2009.[16]

During 2007, SolarWinds raised funding from Austin Ventures, Bain Capital, and Insight Venture Partners.[17][18] SolarWinds completed an initial public offering of US$112.5 million in May 2009,[10] closing at higher prices after its initial day of trading.[15] The IPO from SolarWinds was followed by another from OpenTable (an online restaurant-reservation service), which was perceived to break a dry spell during the Great Recession, when very few companies went public.[19] Both Bain Capital and Insight Venture Partners backed the IPO and used the opportunity to sell some of their shares during the offering.[16]

Analysts and company executives anticipated continued expansion post-IPO, including several acquisitions.[20] In 2010, Bennett retired as CEO and was replaced by the company's former chief financial officer Kevin Thompson.[10] In May 2013, SolarWinds announced plans to invest in an operations hub in Salt Lake City, Utah. It was named by Forbes as "Best Small Company in America, citing high-functioning products for low costs and impressive company growth." By 2013, SolarWinds employed about 900 people.[21]

Acquisition by private equity technology investment firms Silver Lake Partners and Thoma Bravo, LLC. was announced in late 2015,[22][23] and by January 2016, SolarWinds was taken private in a $4.5 billion deal. At the time, the company had 1,770 employees worldwide with 510 based in Austin, and reported revenues of about half a billion dollars a year.[24]

In November 2017, SolarWinds released AppOptics which integrates much of their software portfolio, including Librato and TraceView, into a single software-as-a-service package. AppOptics included compatibility with Amazon Web Services and Microsoft Azure.[25]

In September 2018, SolarWinds filed for a public offering again, after three years of being owned by private equity firms.[26] SolarWinds completed their public offering on October 19, 2018.[27]

On December 7, 2020, CEO Kevin Thompson retired, to be replaced by Sudhakar Ramakrishna, CEO of Pulse Secure, effective January 4, 2021.[1][28][29]

On January 8, 2021, SolarWinds hired former CISA director Chris Krebs to help the company work through the recent cyber attack.[30]

In July 2021, SolarWinds separated its managed service provider (MSP) business from the main company. The new separately-traded public company is named N-able.[31]

Acquisitions

According to The Wall Street Journal, SolarWinds offers freely downloadable software to potential clients and then markets more advanced software to them by offering trial versions.[32] Following the funding in 2007, SolarWinds acquired several companies including Neon Software and ipMonitor Corp. and opened a European sales office in Ireland.[33]

During and after its IPO in 2009, SolarWinds acquired a number of other companies and products, including the acquisition of the New Zealand–based software maker Kiwi Enterprises, which was announced in January 2009.[34]

SolarWinds acquired several companies in 2011 and was ranked number 10 on Forbes magazine's list of fastest-growing tech companies.[35] In January 2011, it acquired Hyper9 Inc, an Austin-based virtualization management company with undisclosed terms.[36] In July, SolarWinds completed the acquisition of the Idaho-based network security company TriGeo for $35 million.[35][37] TriGeo's offices in Post Falls were added to the list of SolarWinds location which already included satellite offices in Dallas, Salt Lake City, and Tulsa, as well as operations in Australia, the Czech Republic, India, Ireland, and Singapore.[38] In 2012 SolarWinds acquired the patch management software provider EminentWare,[39] and RhinoSoft, adding the latter company's FTP Voyager product to SolarWinds' product suite.[40]

In early 2013, SolarWinds acquired N-able Technologies, a cloud-based information technology services provider. The deal was reportedly valued $120 million in cash.[41] In late 2013, it acquired the Boulder, Colorado–based database performance management company Confio Software. With the $103 million agreement, SolarWinds gained a sales office in London and Confio's main product, Ignite.[42] Between 2014 and 2015, the company acquired the Swedish web-monitoring company Pingdom,[43][44] the San Francisco–based metrics and monitoring company Librato (for $40 million),[45] and the log management service Papertrail (for $41 million).[46]

Between 2015 and 2020, SolarWinds acquired Librato (a monitoring company),[47] Capzure Technology (an MSP Manager software to N-able which SolarWinds had previously acquired),[48] LogicNow (a remote monitoring software company),[49] SpamExperts (an email security company),[50] Loggly (a log management and analytics company),[4] Trusted Metrics (a provider of threat monitoring and management software),[51] Samanage (a service desk and IT asset management provider),[52] VividCortex (a database performance monitor),[53] and SentryOne (a provider of database performance monitoring).[54]

2019–2020 supply chain attacks

SUNBURST

On December 13, 2020, The Washington Post reported that multiple government agencies were breached through SolarWinds's Orion software.[55] The company stated in an SEC filing that fewer than 18,000 of its 33,000 Orion customers were affected, involving versions 2019.4 through 2020.2.1, released between March 2020 and June 2020.[5] According to Microsoft, hackers acquired superuser access to SAML token-signing certificates. This SAML certificate was then used to forge new tokens to allow hackers trusted and highly privileged access to networks.[56] The Cybersecurity and Infrastructure Security Agency issued Emergency Directive 21–01 in response to the incident, advising all federal civilian agencies to disable Orion.[57]

APT29, aka Cozy Bear, working for the Russian Foreign Intelligence Service (SVR), was reported to be behind the 2020 attack.[58][59] Victims of this attack include the cybersecurity firm FireEye, the US Treasury Department, the US Department of Commerce's National Telecommunications and Information Administration, as well as the US Department of Homeland Security.[60][61] Prominent international SolarWinds customers investigating whether they were impacted include the North Atlantic Treaty Organization (NATO), the European Parliament, UK Government Communications Headquarters, the UK Ministry of Defence, the UK National Health Service (NHS), the UK Home Office, and AstraZeneca.[62][63] FireEye reported the hackers inserted "malicious code into legitimate software updates for the Orion software that allow an attacker remote access into the victim's environment" and that they have found "indications of compromise dating back to the spring of 2020".[64] FireEye named the malware SUNBURST.[65][66] Microsoft called it Solorigate.[67][66]

The attack used a backdoor in a SolarWinds library; when an update to SolarWinds occurred, the malicious attack would go unnoticed due to the trusted certificate.[68] In November 2019, a security researcher notified SolarWinds that their FTP server had a weak default password of "solarwinds123", warning that "any hacker could upload malicious [code]" that would then be distributed to SolarWinds customers.[69][70][71][72] The New York Times reported SolarWinds did not employ a chief information security officer and that employee passwords had been posted on GitHub in 2019.[73]

On December 15, 2020, SolarWinds reported the breach to the Securities and Exchange Commission.[74] However, SolarWinds continued to distribute malware-infected updates, and did not immediately revoke the compromised digital certificate used to sign them.[69][75][76]

On December 16, 2020, German IT news portal Heise.de reported that SolarWinds had for some time been encouraging customers to disable anti-malware tools before installing SolarWinds products.[77][78]

On December 17, 2020, SolarWinds said they would revoke the compromised certificates by December 21, 2020.[79]

On December 21, 2020, Attorney General William Barr stated that he believed that the SolarWinds hack appears to have been perpetrated by Russia, contradicting speculations by President Donald Trump that China, not Russia, might be to blame.[80]

In late December 2020, Trustwave, a cybersecurity firm, reached out to SolarWinds to report new security flaws they had discovered in software produced by SolarWinds. Although these vulnerabilities hadn't been taken advantage of by hackers, it raised questions concerning the network security of SolarWinds' customers.[81]

The magnitude of the monetary damage has yet to be calculated, but on January 14, 2021, CRN.com reported that the attack could cost cyber insurance firms at least $90 million.[82][83]

On March 1, 2021, SolarWinds CEO, Sudhakar Ramakrishna, blamed a company intern for using an insecure password ("solarwinds123") on their update server. Speculation that this led to the attack is discounted by the company and security professionals.[84][85] More than the intern using a weak password, experts noted that the main issue this fact highlights is the poor security culture the company has.[86]

SUPERNOVA

On December 19, 2020, Microsoft said that its investigations into supply chain attacks at SolarWinds had found evidence of an attempted supply chain attack distinct from the attack in which SUNBURST malware was inserted into Orion binaries (see previous section).[87][88] This second attack has been dubbed SUPERNOVA.[87][88]

Security researchers from Palo Alto Networks said the SUPERNOVA malware was implemented stealthily.[89] SUPERNOVA comprises a very small number of changes to the Orion source code, implementing a web shell that acts as a remote access tool.[89][90] The shell is assembled in-memory during SUPERNOVA execution, thus minimizing its forensic footprint.[89]

Unlike SUNBURST, SUPERNOVA does not possess a digital signature.[89] This is among the reasons why it is thought to have originated with a different group than the one responsible for SUNBURST.[89][91]

Insider trading claims

SolarWinds's share price fell 25% within days of the SUNBURST breach becoming public knowledge,[74] and 40% within a week.[92] Insiders at the company had sold approximately $280 million in stock shortly before this became publicly known,[93] which was months after the attack had started. A spokesperson said that those who sold the stock had not been aware of the breach at the time.[1][94][95]

Microsoft Guidance on Service Provider and Downstream Business Attacks

In November 2021 Microsoft issued an alert[96] in relation to the advanced persistent threat (APT) actor Nobelium (aka APT29; Cozy Bear) that was responsible for the 2020 SolarWinds supply chain attack is targeting cloud service providers (CSPs), managed service providers (MSPs), and other IT service providers. Microsoft Threat Intelligence Center (MSTIC) released a range of recommendations for service providers and downstream businesses to implement in order to address the threat.[97]

Class action lawsuit

In January 2021, a class action lawsuit was filed against SolarWinds in relation to its security failures and subsequent fall in share price.[98][99] SolarWinds attempted to have this case dismissed; in March 2022, a judge ruled that the class action lawsuit could move forward.[100] SolarWinds settled the suit for $26 million in November 2022, and was notified by the SEC that it intended to take enforcement action.[101]

References

  1. Novet, Jordan (December 16, 2020). "SolarWinds hack has shaved 23% from software company's stock this week". CNBC. Archived from the original on December 16, 2020. Retrieved December 17, 2020.
  2. "SolarWinds Corporation 2022 Annual Report (Form 10-K)". U.S. Securities and Exchange Commission. February 22, 2023.
  3. Lind, Treva (September 22, 2011). "SolarWinds blows into Post Falls". Journal of Business. Archived from the original on December 20, 2020. Retrieved January 23, 2018.
  4. Lardinois, Frederic (January 8, 2018). "SolarWinds acquires log-monitoring service Loggly". TechCrunch. Archived from the original on December 20, 2020. Retrieved July 16, 2018.
  5. Cimpanu, Catalin. "SEC filings: SolarWinds says 18,000 customers were impacted by recent hack". ZDNet. Archived from the original on December 15, 2020. Retrieved December 18, 2020.
  6. Sanger, David E.; Perlroth, Nicole; Schmitt, Eric (December 15, 2020). "Scope of Russian Hack Becomes Clear: Multiple U.S. Agencies Were Hit". New York Times. Archived from the original on December 18, 2020. Retrieved December 18, 2020.
  7. Cimpanu, Catalin. "Microsoft says it identified 40+ victims of the SolarWinds hack". ZDNet. Archived from the original on December 20, 2020. Retrieved December 19, 2020.
  8. "SolarWinds is 'largest' cyberattack ever, Microsoft president says". Politico. February 15, 2021. Archived from the original on February 15, 2021. Retrieved February 15, 2021.
  9. Harrell, Barry (July 5, 2011). "Fast-growing Austin software maker Solarwinds acquires Idaho company". Austin American-Statesman. Archived from the original on January 24, 2018. Retrieved January 23, 2018.
  10. Hawkins, Lori (November 20, 2011). "SolarWinds keeps on growing". Austin American-Statesman. Archived from the original on December 20, 2020. Retrieved June 17, 2013.
  11. Baker, Liana B. (October 9, 2015). "SolarWinds confirms it is exploring strategic alternatives". Reuters. Archived from the original on January 24, 2018. Retrieved January 23, 2018.
  12. Peterson-Withorn, Chase (October 23, 2015). "Who Got Rich This Week: SolarWinds Founder Yonce's Fortune Jumps Due To $4.5 Billion Sale Agreement". Forbes. Archived from the original on December 20, 2020. Retrieved January 23, 2018.
  13. "Corporate Fact Sheet" (PDF). SolarWinds. 2008. Archived from the original (PDF) on November 17, 2008. Retrieved February 17, 2017.
  14. Denne, Scott (May 20, 2009). "Q&A With Michael Bennett, CEO Of Hot IPO SolarWinds". WSJ. Archived from the original on December 20, 2020. Retrieved January 23, 2018.
  15. Vance, Ashlee; Miller, Claire Cain (May 20, 2009). "SolarWinds Beats Odds With Public Offering". Bits Blog. Archived from the original on December 20, 2020. Retrieved January 23, 2018.
  16. Cowan, Lynn (May 22, 2009). "Bright Start for SolarWinds Stock". Wall Street Journal. ISSN 0099-9660. Archived from the original on December 20, 2020. Retrieved January 23, 2018.
  17. "SolarWinds raises $7.5M". Austin Business Journal. February 5, 2007. Archived from the original on December 20, 2020. Retrieved January 24, 2018.
  18. Morrison, Chris (January 6, 2009). "Is network management growing? SolarWinds picks up Kiwi Enterprises". VentureBeat. Archived from the original on December 20, 2020. Retrieved January 24, 2018.
  19. Miller, Claire Cain (May 21, 2009). "Investors Find an Appetite for Tech Offerings". The New York Times. ISSN 0362-4331. Archived from the original on December 20, 2020. Retrieved January 24, 2018.
  20. Krause, Reinhardt (November 26, 2014). "SolarWinds Acquisition Spree Expected To Keep Going". Investor's Business Daily. Archived from the original on December 20, 2020. Retrieved January 24, 2018.
  21. Lee, Jasen (May 9, 2013). "Tech firm to bring more than 1,000 jobs to Utah". Deseret News. Archived from the original on December 20, 2020. Retrieved January 24, 2018.
  22. Goliya, Kshitiz (October 21, 2015). "Silver Lake, Thoma Bravo to take SolarWinds private in $4.5 billion deal". Reuters. Archived from the original on December 20, 2020. Retrieved January 30, 2018.
  23. Minaya, Ezequiel (October 21, 2015). "SolarWinds to be Bought by Silver Lake, Thoma Bravo". Wall Street Journal. ISSN 0099-9660. Archived from the original on December 20, 2020. Retrieved January 30, 2018.
  24. Rockwell, Lilly (February 5, 2016). "Austin software maker SolarWinds completes $4.5 billion sale". Austin American-Statesman. Archived from the original on December 20, 2020. Retrieved May 5, 2016.
  25. Moozakis, Chuck (November 21, 2017). "SolarWinds' AppOptics melds network device monitoring, app behavior". TechTarget. Archived from the original on December 14, 2020. Retrieved January 30, 2018.
  26. Assis, Claudia. "Software provider Solarwinds files for IPO". MarketWatch. Archived from the original on December 20, 2020. Retrieved October 1, 2018.
  27. "SolarWinds prices reduced IPO at low end of lowered expected range". MarketWatch.com. Archived from the original on December 20, 2020. Retrieved October 19, 2018.
  28. Johnson, O’Ryan (December 9, 2020). "SolarWinds Names New CEO As Potential Spin-off Inches Forward". CRN. Archived from the original on December 20, 2020. Retrieved December 20, 2020.
  29. "SolarWinds Appoints Sudhakar Ramakrishna as New President and Chief Executive Officer". www.businesswire.com. December 9, 2020. Archived from the original on December 20, 2020. Retrieved December 20, 2020.
  30. Hautala, Laura. "SolarWinds hires former CISA director Chris Krebs to consult on hack aftermath". CNET. Archived from the original on January 10, 2021. Retrieved January 10, 2021.
  31. "SolarWinds Completes Spin-Off of its MSP Business; N-able, Inc. Begins Trading as Independent, Publicly Traded Company". www.businesswire.com. July 20, 2021. Archived from the original on July 30, 2021. Retrieved July 30, 2021.
  32. Cowan, Lynn (May 22, 2009). "Bright Start for SolarWinds Stock". The Wall Street Journal. ISSN 0099-9660. Archived from the original on December 20, 2020. Retrieved July 16, 2018.
  33. Cooter, Maxwell. "Solar Winds finally blows into Europe". Techworld. Archived from the original on January 24, 2018. Retrieved January 24, 2018.
  34. Dubie, Denise (January 5, 2009). "SolarWinds acquires Kiwi Enterprises". Network World. Archived from the original on December 20, 2020. Retrieved January 30, 2018.
  35. Harrell, Barry (July 5, 2011). "Fast-growing Austin software maker Solarwinds acquires Idaho company". Austin American-Statesman. Archived from the original on January 24, 2018. Retrieved July 16, 2018.
  36. "SolarWinds acquires Hyper9". Austin Business Journal. January 19, 2011. Archived from the original on December 20, 2020. Retrieved January 30, 2018.
  37. Wauters, Robin (June 23, 2011). "SolarWinds Buys Network Security Company TriGeo For $35 Million In Cash". TechCrunch. Archived from the original on July 9, 2017. Retrieved January 30, 2018.
  38. Lind, Treva (September 22, 2011). "SolarWinds blows into Post Falls". Spokane Journal. Archived from the original on December 20, 2020. Retrieved July 16, 2018.
  39. Mukhar, Nicholas (February 2, 2012). "SolarWinds Acquires EminentWare for Patch Management Software". Channel Futures. Archived from the original on December 20, 2020. Retrieved January 30, 2018.
  40. Hay, Richard (December 18, 2012). "RhinoSoft Acquired by SolarWinds – FTP Voyager Now Offered as Free Tool". WindowsObserver.com. Archived from the original on July 9, 2017. Retrieved January 30, 2018.
  41. Cai, Debbie (May 21, 2013). "SolarWinds to Buy N-able Technologies for $120 Million". The Wall Street Journal. Archived from the original on June 9, 2013. Retrieved January 23, 2018.
  42. "SolarWinds buys Confio Software for $103M". The Denver Post. Associated Press. October 7, 2013. Archived from the original on December 20, 2020. Retrieved January 23, 2018.
  43. Kobialka, Dan (June 20, 2014). "SolarWinds Adds Pingdom to Its Performance Management Portfolio". Channel Futures. Archived from the original on December 20, 2020. Retrieved January 23, 2018.
  44. Hawkins, Lori (June 18, 2014). "Austin-based SolarWinds acquires Stockholm-based company". Austin American-Statesman. Archived from the original on December 20, 2020. Retrieved January 23, 2018.
  45. "SolarWinds Expands Its Cloud Monitoring and Management Footprint With Acquisition of Librato". MarketWatch. Archived from the original on March 3, 2016. Retrieved May 5, 2016.
  46. Lardinois, Frederic (April 28, 2015). "SolarWinds Acquires Log Management Service Papertrail For $41M In Cash". TechCrunch. AOL. Archived from the original on December 20, 2020. Retrieved May 5, 2016.
  47. Wells, Karla (January 29, 2015). "SOLARWINDS EXPANDS ITS CLOUD MONITORING AND MANAGEMENT FOOTPRINT WITH ACQUISITION OF LIBRATO". SolarWinds News Room. Archived from the original on December 20, 2020. Retrieved July 16, 2018.
  48. Davis, Jessica (August 24, 2015). "SolarWinds N-able to Roll Out Competitively Priced MSP Manager Platform". Channel Futures. Archived from the original on December 20, 2020. Retrieved January 23, 2018.
  49. Foye, Brendon (June 2, 2016). "SolarWinds acquires LogicNow, creates new company". CRN Australia. Archived from the original on December 20, 2020. Retrieved January 23, 2018.
  50. Wells, Karla (August 29, 2017). "SolarWinds MSP Acquires SpamExperts to Enhance its Growing Product Portfol". SolarWinds News Room. Archived from the original on December 20, 2020. Retrieved July 16, 2018.
  51. "SolarWinds acquires Trusted Metrics, Adding Threat Monitoring and Management to Its IT Management Portfolio". July 10, 2018. Archived from the original on December 20, 2020. Retrieved August 1, 2018.
  52. "SolarWinds Sets Its Sights on the ITSM Market through Acquisition of Samanage and Introduction of a SolarWinds Service Desk Product". April 11, 2019. Archived from the original on December 20, 2020. Retrieved April 29, 2019.
  53. "SolarWinds Set to "Cover the Databases" Through Acquisition of VividCortex and Introduction of New Monitoring Solution Designed for Cloud-Native Databases". December 11, 2019. Archived from the original on December 20, 2020. Retrieved March 4, 2020.
  54. "SolarWinds Snaps Up SentryOne To Enhance Database Management Capabilities". SmarterAnalyst. October 26, 2020. Archived from the original on December 20, 2020. Retrieved October 26, 2020.
  55. Orion platform (archived website copy)
  56. Lambert, John (December 13, 2020). "Important steps for customers to protect themselves from recent nation-state cyberattacks". Microsoft. Archived from the original on December 20, 2020. Retrieved December 13, 2020.
  57. "CISA Issues Emergency Directive to Mitigate the Compromise of SolarWinds Orion Network Management Products". Cybersecurity & Infrastructure Security Agency. Archived from the original on December 15, 2020. Retrieved December 15, 2020.
  58. "Russian government spies are behind a broad hacking campaign that has breached U.S. agencies and a top cyber firm". The Washington Post. December 13, 2020. Archived from the original on December 13, 2020. Retrieved December 13, 2020.
  59. "Assembling the Russian Nesting Doll: UNC2452 Merged into APT29". Mandiant. Retrieved May 17, 2023.
  60. Cimpanu, Catalin. "Microsoft, FireEye confirm SolarWinds supply chain attack". ZDNet. Archived from the original on December 16, 2020. Retrieved December 14, 2020.
  61. "Suspected Russian hackers breached U.S. Department of Homeland Security - sources". Reuters. December 14, 2020. Archived from the original on December 20, 2020. Retrieved December 16, 2020.
  62. Gallanger, Ryan, Donaldson, Kitty, et al. (15 December 2020). "U.K. Government, NATO Join U.S. in Monitoring Risk From Hack". Bloomberg News website Archived December 15, 2020, at the Wayback Machine Retrieved 15 December 2020.
  63. Field, Matthew. (16 December 2020). "SolarWinds shareholders sold $280m days before breach was revealed". The Telegraph website Archived December 20, 2020, at the Wayback Machine Retrieved 16 December 2020.
  64. "Global Intrusion Campaign Leverages Software Supply Chain Compromise". FireEye. Archived from the original on December 18, 2020. Retrieved December 18, 2020.
  65. "Microsoft, FireEye confirm SolarWinds supply chain attack". ZDNet. December 14, 2020. Archived from the original on December 16, 2020. Retrieved December 16, 2020.
  66. "Sunburst Trojan – What You Need to Know". Deep Instinct. December 16, 2020. Archived from the original on December 18, 2020. Retrieved December 17, 2020.
  67. "The SolarWinds Perfect Storm: Default Password, Access Sales and More". threatpost.com. Archived from the original on December 17, 2020. Retrieved December 17, 2020.
  68. "Microsoft, Customer Guidance on Recent Nation-State Cyber Attacks". Microsoft Security Response Center. December 13, 2020. Archived from the original on December 20, 2020. Retrieved December 15, 2020.
  69. "SolarWinds Hack Could Affect 18K Customers — Krebs on Security". Archived from the original on December 16, 2020. Retrieved December 16, 2020.
  70. Varghese, Sam. "iTWire - SolarWinds FTP credentials were leaking on GitHub in November 2019". www.itwire.com. Archived from the original on December 15, 2020. Retrieved December 16, 2020.
  71. "Hackers used SolarWinds' dominance against it in sprawling spy campaign". Reuters. December 16, 2020. Archived from the original on December 17, 2020. Retrieved December 16, 2020.
  72. Menn, Raphael Satter, Christopher Bing, Joseph (December 16, 2020). "Hackers used SolarWinds' dominance against it in sprawling spy campaign". Reuters. Archived from the original on December 20, 2020. Retrieved December 18, 2020 via www.reuters.com.{{cite news}}: CS1 maint: multiple names: authors list (link)
  73. Sanger, David E.; Perlroth, Nicole; Barnes, Julian E. (December 16, 2020). "Billions Spent on U.S. Defenses Failed to Detect Giant Russian Hack". The New York Times. Archived from the original on December 16, 2020. Retrieved December 18, 2020.
  74. "What you need to know about the biggest hack of the US government in years". the Guardian. December 15, 2020. Archived from the original on December 20, 2020. Retrieved December 16, 2020.
  75. McCarthy, Kieren (December 15, 2020). "SolarWinds: Hey, only as many as 18,000 customers installed backdoored software linked to US govt hacks". The Register. Archived from the original on December 16, 2020. Retrieved December 16, 2020.
  76. Varghese, Sam. "iTWire - Backdoored Orion binary still available on SolarWinds website". www.itwire.com. Archived from the original on December 14, 2020. Retrieved December 16, 2020.
  77. "The SolarWinds Perfect Storm: Default Password, Access Sales and More". threatpost.com. Archived from the original on December 17, 2020. Retrieved December 17, 2020.
  78. online, heise. "l+f SolarWinds-Backdoor: Hersteller sorgte für Ausnahmen von AV-Überwachung". Security. Archived from the original on December 20, 2020. Retrieved December 17, 2020.
  79. Johnson, Joseph F. Kovar, O’Ryan (December 17, 2020). "SolarWinds MSP To Revoke Digital Certificates For Tools, Issue New Ones As Breach Fallout Continues". CRN. Archived from the original on December 20, 2020. Retrieved December 18, 2020.{{cite web}}: CS1 maint: multiple names: authors list (link)
  80. Wilkie, Christina (December 21, 2020). "Attorney General Barr breaks with Trump, says SolarWinds hack 'certainly appears to be the Russians'". CNBC. NBCUniversal News Group. Archived from the original on April 12, 2021. Retrieved December 22, 2020.
  81. Dilanian, Ken (February 3, 2021). "More exploitable flaws found in SolarWinds software, says cybersecurity firm". NBC News. Archived from the original on June 23, 2021. Retrieved June 10, 2021.
  82. "SolarWinds Hack Could Cost Cyber Insurance Firms $90 Million". January 14, 2021. Archived from the original on January 16, 2021. Retrieved January 14, 2021.
  83. "Everything You Need To Know About SolarWinds Supply-Chain Attack". The Hack Report. February 5, 2021.
  84. "SolarWinds Blames Intern for Weak Password That Led to Biggest Attack in 2020". The Hacker News. Archived from the original on March 1, 2021. Retrieved March 1, 2021.
  85. "SolarWinds CEO expresses regret for 'blame the intern' defense during Orion hack investigation". SC Magazine. May 19, 2021. Retrieved August 9, 2021.
  86. "it's a safe bet that a security culture that enabled such a basic mistake couldn't have helped"."SolarWinds security fiasco may have started with simple password blunders". zdnet.com. Archived from the original on March 4, 2021. Retrieved March 4, 2021.
  87. Bing, Christopher (December 19, 2020). "Second hacking team was targeting SolarWinds at time of big breach". Reuters. Archived from the original on December 22, 2020. Retrieved December 23, 2020 via www.reuters.com.
  88. "New Zero-Day, Malware Indicate Second Group May Have Targeted SolarWinds". SecurityWeek. December 28, 2020. Archived from the original on January 14, 2021. Retrieved January 13, 2021.
  89. "New SUPERNOVA backdoor found in SolarWinds cyberattack analysis". BleepingComputer. Archived from the original on December 23, 2020. Retrieved December 23, 2020.
  90. "Microsoft identifies second hacking group affecting SolarWinds software". CyberScoop. December 21, 2020. Archived from the original on December 23, 2020. Retrieved December 23, 2020.
  91. Cimpanu, Catalin. "A second hacking group has targeted SolarWinds systems". ZDNet. Archived from the original on December 23, 2020. Retrieved December 23, 2020.
  92. "SolarWinds Adviser Warned of Lax Security Years Before Hack". Bloomberg.com. December 21, 2020. Archived from the original on May 16, 2021. Retrieved December 23, 2020 via www.bloomberg.com.
  93. "Investors in breached software firm SolarWinds traded $280 million in stock days before hack was revealed". The Washington Post. December 16, 2020. Archived from the original on December 20, 2020. Retrieved December 16, 2020.
  94. Primack, Dan (December 18, 2020). "SolarWinds denies insider trading activity ahead of hack revelation". Axios. Archived from the original on December 20, 2020. Retrieved December 23, 2020.
  95. "SolarWinds Claims Execs Unaware of Breach When They Sold Stock | SecurityWeek.Com". www.securityweek.com. Archived from the original on December 22, 2020. Retrieved December 23, 2020.
  96. "NOBELIUM targeting delegated administrative privileges to facilitate broader attacks". Microsoft Security Blog. October 25, 2021. Retrieved November 4, 2021.
  97. "Microsoft Warns of Ongoing Attacks by SolarWinds Hackers on Service Providers and Downstream Businesses". HIPAA Journal. November 1, 2021. Retrieved November 4, 2021.
  98. "Class Action Lawsuit Filed Against SolarWinds Over Hack". SecurityWeek.Com. January 6, 2021. Archived from the original on February 1, 2021. Retrieved January 13, 2021.
  99. McCarthy, Kieren (January 5, 2021). "Ah, right on time: Hacker-slammed SolarWinds sued by angry shareholders". The Register. Archived from the original on March 17, 2021. Retrieved January 13, 2021.
  100. Johnson, Derek B. (March 31, 2022). "Court denies SolarWinds bid to throw out breach lawsuit". www.scmagazine.com. Retrieved May 12, 2022.
  101. Whittaker, Zack (November 7, 2022). "SolarWinds says it's facing SEC 'enforcement action' over 2020 hack". TechCrunch. Retrieved February 8, 2023.
  • Official website
  • Business data for SolarWinds Inc.:
This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.