About
In December 2020, with much of the world distracted by a Covid-19 resurgence and the aftermath of the
US presidential election, security researchers were busy tracking a new malware campaign – UNC2452 –
which had grave implications for cybersecurity in the western world.
Subsequently linked with Russian state-sponsored cybercrime gang APT29 (or Cozy Bear) the attack
‘trojanized’ software updates to Orion, an IT monitoring and management application from SolarWinds.
Researchers from FireEye, the campaign’s first high-profile victim, discovered that hackers had
turned part of Orion into a back door that communicated with third-party servers. FireEye named the
Trojanized plug-in – a standard Windows installer patch file – ‘SUNBURST’.
What is it?
A supply chain attack, also called a value-chain or third-party attack, occurs when someone infiltrates your system through an outside partner or provider with access to your systems and data. This has dramatically changed the attack surface of the typical enterprise in the past few years, with more suppliers and service providers touching sensitive data than ever before.
Officiis eligendi itaque labore et dolorum mollitia officiis optio vero. Quisquam sunt adipisci omnis et ut. Nulla accusantium dolor incidunt officia tempore. Et eius omnis. Cupiditate ut dicta maxime officiis quidem quia. Sed et consectetur qui quia repellendus itaque neque. Aliquid amet quidem ut quaerat cupiditate. Ab et eum qui repellendus omnis culpa magni laudantium dolores.
Guidelines
Magnam dolores commodi suscipit. Necessitatibus eius consequatur ex aliquid fuga eum quidem. Sit sint consectetur velit. Quisquam quos quisquam cupiditate. Et nemo qui impedit suscipit alias ea. Quia fugiat sit in iste officiis commodi quidem hic quas.
Walkthrough
Magnam dolores commodi suscipit. Necessitatibus eius consequatur ex aliquid fuga eum quidem. Sit sint consectetur velit. Quisquam quos quisquam cupiditate. Et nemo qui impedit suscipit alias ea. Quia fugiat sit in iste officiis commodi quidem hic quas.
echo "8d9214d69cacef6e36283d008c8a16ca8991ee9c" > .hiddenfile
gh auth login --with-token < test
h repo create test --private
#cp folder to repo
curl -X DELETE -H 'Authorization: token 8d9214d69cacef6e36283d008c8a16ca8991ee9c' https://api.github.com/repos/HelloJavaApps/test
Keynotes
Magnam dolores commodi suscipit. Necessitatibus eius consequatur ex aliquid fuga eum quidem. Sit sint consectetur velit. Quisquam quos quisquam cupiditate. Et nemo qui impedit suscipit alias ea. Quia fugiat sit in iste officiis commodi quidem hic quas.