SolarWinds Articles

2024-01-19

Microsoft ‘senior leadership’ emails accessed by Russian SolarWinds hackers. And by password stuffing.

Previous notes have been moved to here


Updated 2024-01-20 05:49z with 3239 articles

Index by topic

    published

  1. Articles in chronological order of publication
  2. discovered

  3. Articles in chronological order of discovery
  4. searchable

  5. Articles by website, searchable
  6. Explain hack

  7. Duration of attack, recovery
  8. Hearings request details about hack
  9. New policies consideration
  10. Timeline of the attack
  11. Initial vector

  12. First vector of attack
  13. Best articles

  14. Best journalism regarding the attack
  15. Legal action

  16. SEC Investigation
  17. SolarWinds Stock and associated legal action
  18. Legal action or legislation
  19. Executive Order

  20. White House Executive order
  21. Technical details

  22. Remote code execution
  23. Drilldown: Detailed, low-level analysis of malware and TTP
  24. Attackers still have access to compromised servers
  25. Malware used in the attack
  26. Tools Techniques and Procedures in the attack
  27. Credentials involved in hack including SAML
  28. Indicators of Compromise
  29. Detecting the presence of the attack
  30. Active Persistent Threat
  31. The vector or vectors used in the attack
  32. Phishing
  33. DNS extraction or circumvention
  34. Cloud vector involvement
  35. Tools for detection and recovery
  36. Protection processes
  37. Vulnerabilities
  38. Removal

  39. How to remove the malware
  40. Prevention

  41. Monitoring
  42. How to prevent attacks
  43. Zero trust
  44. victims

  45. Dept of Homeland Security hackers
  46. Mimecast
  47. Identifications of the victims of the attack
  48. breach

  49. Microsoft agent breached
  50. Failure to detect
  51. Loss of information such as source code
  52. Information breached or infrastructure compromised
  53. Description of the attack
  54. Extent of attack

  55. Cost of recovery
  56. Extent of attack and recovery effort
  57. Duration of attack, recovery
  58. Impact of hack
  59. Leadership, business issues and response

  60. International implicaitons
  61. Legisltation considered
  62. Legislslation would establish cybersecurity training
  63. Investment in security
  64. Funding for remediation and prevention
  65. 60 day sprints announced
  66. Breach disclosure requirements
  67. Reactions to the attack
  68. Actions responding to attack
  69. Congressional Hearings
  70. Board reform to include security
  71. Sharing information about hacks
  72. Considerations of Surveillance
  73. Transparency regarding hack
  74. Insurance
  75. Discrete actions taken in response to the attack
  76. Retaliation
  77. response
  78. Government breach or response
  79. Leadership
  80. Who is to blame

  81. The intern did it
  82. Pointing fingers
  83. Rejoinder to vendor's claims
  84. Vendor relevance to hack
  85. Cultural aspects that lead to breaches

  86. Culture
  87. Analysis of the attack and its impact and remediation

  88. Supply Chain Risk Warning
  89. Software Bill of Materials and SLSA
  90. Reproduceable builds or parallel builds
  91. Recovery from attack
  92. History of attacks
  93. Analysis of the attack
  94. Investigation of the vector
  95. Remediation
  96. Strategy for overall remediaton and long term view
  97. Attribution of the attacking actor
  98. Marketing and alternatives

  99. Mostly Marketing
  100. Alternatives to SolarWinds
  101. Podcast

  102. Video or Audio story
  103. Entertainment

  104. astronomy