![]() Organizations with suspected compromises need to keep operational security front and center, CISA cautioned, including when conducting incident response activities and designing and implementing remediation plans. “This is a patient, well-resourced, and focused adversary that has sustained long duration activity on victim networks.” “CISA has determined that this threat poses a grave risk to the federal government and state, local, tribal, and territorial governments as well as critical infrastructure entities and other private sector organizations,” the agency wrote in a 17-page cyber activity alert. CISA added it has evidence of additional initial access vectors beyond the SolarWinds Orion supply chain compromise, but noted that those other intrusion methods are still being investigated. The Cybersecurity and Infrastructure Security Agency (CISA) said that the group behind the SolarWinds breach has demonstrated patience, operational security and complex tradecraft in its attacks. ![]() ![]() government warned Thursday that removing the SolarWinds hackers from compromised environments will be a highly complex and challenging endeavor for organizations.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |