A Breach Unlike Any Other
The SolarWinds breach rocked the cybersecurity world, with nine U.S. government agencies and roughly 100 private sector organizations compromised through a poisoned update to the company’s Orion network monitoring software. The colossal campaign was carried out by the Russian foreign intelligence service (SVR), and proved that even elite security and technology firms could be compromised.
Nearly 18,000 organizations downloaded versions of Orion between March and June 2020 where Russian hackers had injected malicious code, though the SVR only took advantage of the access they had gained in select cases. It wasn’t until FireEye was compromised on Dec. 8, 2020, and traced the hacker’s initial intrusion back to a server running SolarWinds Orion that the entire campaign came to light.
CRN spoke with 12 prominent C-suite executives at RSA Conference 2021 about the biggest lessons learned from one the most infamous cyberattacks of all-time. From applying far greater scrutiny to technology suppliers and code used during the application development process to eliminating the use of on-premise Microsoft Active Directory, here are 12 major takeaways from the SolarWinds breach.