{"id":17920,"date":"2020-12-18T18:39:04","date_gmt":"2020-12-18T18:39:04","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/?p=17920"},"modified":"2023-05-12T16:54:00","modified_gmt":"2023-05-12T16:54:00","slug":"fireeye-solarwinds-breaches-implications-protections","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/threats\/fireeye-solarwinds-breaches-implications-protections\/","title":{"rendered":"FireEye, SolarWinds Breaches: Implications and Protections"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Five days after FireEye detailed the theft of about 300 of its proprietary cybersecurity tools, SolarWinds announced that its Orion IT monitoring platform had also been compromised by hackers believed to be sponsored by the Russian government. Together, the attack that originated with a SolarWinds vulnerability turned over critical cybersecurity infrastructure to the malicious actors, along with potential access to thousands of global entities&#8217; sensitive information. As the cybersecurity world wraps its head around how two top vendors were breached, we examine the organizations involved, details of the attack, and implications for the industry and its customers.<\/span><\/p>\n<h2><b>The attacks<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Earlier this month, the U.S. National Security Agency <\/span><a href=\"https:\/\/www.nsa.gov\/trends\/-Features\/Feature-Stories\/Article-View\/Article\/2434988\/russian-state-sponsored-malicious-cyber-actors-exploit-known-vulnerability-in-v\/\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"font-weight: 400;\">warned<\/span><\/a><span style=\"font-weight: 400;\"> that federal agencies were actively being exploited by &#8220;Russian state-sponsored actors.&#8221; A week later, FireEye&#8217;s prized Red Team hacking tools were stolen by a presumed Russian actor. And now we&#8217;ve learned that SolarWinds&#8217; Orion platform has been available to intruders since March.<\/span><\/p>\n<h3><b>First notification from FireEye<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">On December 8, FireEye informed the public that &#8220;a nation with top-tier offensive capabilities&#8221; had infiltrated FireEye&#8217;s network and gained access to the company&#8217;s suite of Red Team hacking tools. By analyzing these tools, actors can replicate the same software FireEye uses to test its own clients&#8217; computer defenses. In light of the news, FireEye has published <\/span><a href=\"https:\/\/www.fireeye.com\/blog\/threat-research\/2020\/12\/unauthorized-access-of-fireeye-red-team-tools.html\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"font-weight: 400;\">detailed analysis of the attacks<\/span><\/a><span style=\"font-weight: 400;\"> and steps potentially affected organizations should take.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">While FireEye is still in its investigation phase, the hack was identified as an <\/span><a href=\"https:\/\/www.esecurityplanet.com\/threats\/advanced-persistent-threat\/\"><span style=\"font-weight: 400;\">advanced persistent threat (APT)<\/span><\/a><span style=\"font-weight: 400;\"> or nation-state attack, with analysts pointing to Russia. FireEye&#8217;s targeting might not come as a surprise to some, as the company has actively exposed Russian cyberintelligence operations for years.<\/span><\/p>\n<p><b>Also read: <\/b><a href=\"https:\/\/www.esecurityplanet.com\/products\/edr-solutions\/\"><b>Top Endpoint Detection and Response (EDR) Security Solutions<\/b><\/a><\/p>\n<h3><b>SolarWinds news breaks<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">On December 13, FireEye released a report on the <\/span><a href=\"https:\/\/www.fireeye.com\/blog\/threat-research\/2020\/12\/evasive-attacker-leverages-solarwinds-supply-chain-compromises-with-sunburst-backdoor.html\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"font-weight: 400;\">SolarWinds attack dubbed SUNBURST<\/span><\/a><span style=\"font-weight: 400;\">. Through updates to SolarWind&#8217;s Orion IT monitoring and management software starting in March, highly skilled actors have potentially gained access to thousands of organizations globally. Victims include government, consulting, technology, and telecom organizations in North America, Europe, Asia, and the Middle East.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">News that the U.S. Treasury and Commerce departments were victims of the hack led to some panic and ordered shutdowns of the Orion IT software for government agencies. SolarWinds <\/span><a href=\"https:\/\/www.solarwinds.com\/securityadvisory\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"font-weight: 400;\">notified its customers<\/span><\/a><span style=\"font-weight: 400;\"> of the need for immediate action and listed the affected software builds.<\/span><\/p>\n<p><b>Also Read: <\/b><a href=\"https:\/\/www.esecurityplanet.com\/threats\/advanced-persistent-threat\/\"><b>APT Attacks &amp; Prevention<\/b><\/a><\/p>\n<h2><b>Nature of the attacks<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">As details emerge, it&#8217;s clear that the SolarWinds attack was initiated in March 2020 and went undetected for almost 9 months. As it&#8217;s been some time since the intrusion, the highly skilled actors were, by all means, successful in minimizing their presence.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Seamless attacks like the plug-in discovered in the Orion platform can maximize an adversary&#8217;s access and insights into critical tools and information.<\/span><\/p>\n<h3><b>Thousands vulnerable<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">In an SEC filing earlier this week, SolarWinds noted about 18,000 customers installed the March update impacting organizations. Of the company&#8217;s total customer base, that means 6% of SolarWinds&#8217; users have been vulnerable for a large chunk of 2020.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">To emphasize the range of entities impacted by the SolarWinds attack, U.S. government agencies attacked include the Federal Reserve, the Department of Justice, the State Department, the Department of Homeland Security, the National Institutes of Health, CDC, NSA, NASA and U.S. nuclear weapons agencies. Just a few of the affected companies include Microsoft, Visa, AT&amp;T, Lockheed Martin, Ernst &amp; Young, Yahoo!, and the New York Times.<\/span><\/p>\n<p><b>Read Also: <\/b><a href=\"https:\/\/www.esecurityplanet.com\/products\/intrusion-detection-and-prevention-systems\/\"><b>9 Top Intrusion Detection and Prevention Systems: Guide to IDPS\u00a0<\/b><\/a><\/p>\n<h3><b>SUNBURST backdoor<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Within the SolarWinds Orion platform, a digitally-signed component that communicates via HTTP to third-party servers was the root of the malicious plug-in FireEye dubbed SUNBURST. By compromising SolarWinds&#8217; build servers, hackers could inject a <\/span><a href=\"https:\/\/www.esecurityplanet.com\/networks\/china-to-require-backdoors-in-foreign-hardware-software\/\"><span style=\"font-weight: 400;\">backdoor<\/span><\/a><span style=\"font-weight: 400;\"> into their code that went to thousands of customers. After an initial dormant period, the malware retrieves and executes commands that can transfer and execute files, profile the system, reboot the machine, and disable system services. SUNBURST&#8217;s network traffic is hidden as Orion Improvement Program (OIP) protocol, and inspection results appear seamlessly in the SolarWinds plug-in configuration files.<\/span><\/p>\n<p><strong>Also Read:<\/strong>\u00a0<em>eSecurity Planet<\/em> warned about <strong><a href=\"https:\/\/www.esecurityplanet.com\/networks\/the-secure-supply-chain-where-security-starts\/\">the vulnerability of the software supply chain<\/a><\/strong> in a 2017 article.<\/p>\n<h3><b>Cozy Bear strikes again<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">In the latest chapter of the Cold War, information security is the name of the game. While FireEye was slow to point blame at Russia, indications continue to implicate the SVR, the Russian Foreign Intelligence Service, which serves as Russia&#8217;s intelligence and global espionage organization and is frequently referred to as Cozy Bear or APT29.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The SVR previously received attention for their <\/span><a href=\"https:\/\/www.crowdstrike.com\/blog\/bears-midst-intrusion-democratic-national-committee\/\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"font-weight: 400;\">successful hacks of the DNC<\/span><\/a><span style=\"font-weight: 400;\"> and the White House in 2014 and 2015 using phishing lures for infiltration. A handful of years later, in the case of the SolarWinds breach, the SRV has gained remote access through the supply chain into thousands of organizations for almost nine months. Unlike its counterpart, the GRU, the SRV is not known for destructive cyber operations, but the theft of intellectual property was substantial.<\/span><\/p>\n<p>In a <a href=\"https:\/\/blogs.microsoft.com\/on-the-issues\/2020\/12\/17\/cyberattacks-cybersecurity-solarwinds-fireeye\/\" target=\"_blank\" rel=\"noopener noreferrer\">Dec. 17 blog post<\/a>, Microsoft President Brad Smith said the attacks require &#8220;that we look with clear eyes at the growing threats we face and commit to more effective and collaborative leadership by the government and the tech sector in the United States to spearhead a strong and coordinated global cybersecurity response.&#8221;<\/p>\n<h2><b>Implications for the security industry<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">This week&#8217;s news brought with it two significant stories for the cybersecurity industry. In the form of the FireEye attack, the first story informed us that nation-states now have access to hacking tools they didn&#8217;t previously have. You can expect these tools to be enabled for malicious reasons soon enough. The second story, news of the Orion platform&#8217;s vulnerabilities, informed us of an enduring compromise.<\/span><\/p>\n<h3><b>Expect enhanced hacking tools<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">FireEye&#8217;s attack gave malicious actors hacking tools that can simulate what nation-states regularly do in cyberspace&#8211;accessing information for millions of individuals, hacking into the global economy, intellectual property theft, and more. While the news continues to evolve, it&#8217;s clear this breach will enhance Russia&#8217;s ability to see what companies and agencies are doing to defend against APTs.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">On a macro-scale, there are little to no rules for these nation-state maneuvers.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Nation-sponsored efforts have occurred with minimal retaliation. On CNBC, former NSA agent and TrustedSec CEO David Kennedy noted a growing population connected to sophisticated organized crime groups makes breaches like this even more dangerous. Sharing these updated hacking capabilities will only lead to their use in <\/span><a href=\"https:\/\/www.esecurityplanet.com\/threats\/ransomware-protection\/\"><span style=\"font-weight: 400;\">ransomware<\/span><\/a><span style=\"font-weight: 400;\"> schemes that rake in hundreds of millions of dollars every year, for example.<\/span><\/p>\n<h3><b>The optimistic take<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">CrowdStrike co-founder Dmitri Alperovitch &#8211; who earlier this year left the EDR vendor to form a nonprofit focused on geopolitical cybersecurity &#8211; offered an optimistic take. In the days after the news broke, FireEye has been transparent about the consequences and the remedies organizations can take to bolster their defenses, he noted. As for the SolarWinds compromise, Alperovitch said no intelligence agency could exploit all of the organizations listed. So instead of thousands exploited, he believes it was likely only hundreds.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In his <\/span><a href=\"https:\/\/www.rsaconference.com\/industry-topics\/video\/solarwinds-breach-dmitri-alperovitch\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"font-weight: 400;\">closing comments to RSA<\/span><\/a><span style=\"font-weight: 400;\"> on the news, Alperovitch emphasized recognizing our inherent cyber vulnerabilities as organizations, FireEye&#8217;s response to the attacks, and the needed hunt for adversaries in our networks.<\/span><\/p>\n<p><i><span style=\"font-weight: 400;\">&#8220;I&#8217;ve been saying for 10+ years that intrusions are inevitable, no one is immune, and everyone needs to start thinking about this in terms of we will likely get breached, we will likely get compromised, but how do we stop the damage from being done? And when you have organizations, FireEye, some of the best of the best out there, and I want to commend them for their response, it has been absolutely stellar. When they&#8217;re getting hit, it really tells you that no one out there is going to be invulnerable to this. The right way to think about security strategies going forward is to assume breach, hunt continuously for any presence of adversaries on your network, and kick them out as soon as possible.&#8221;<\/span><\/i><\/p>\n<p><b>Also Read: <\/b><a href=\"https:\/\/www.esecurityplanet.com\/products\/solarwinds-log-event-manager\/\"><b>SolarWinds Log &amp; Event Manager &#8211; SIEM Product Overview and Insight\u00a0<\/b><\/a><\/p>\n<h2><b>How can companies protect themselves?<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Alperovitch mentioned continuous <\/span><a href=\"https:\/\/www.esecurityplanet.com\/threats\/threat-hunting\/\"><span style=\"font-weight: 400;\">threat hunting<\/span><\/a><span style=\"font-weight: 400;\"> as one way organizations can find threats as early as possible, which is critical for limiting damage. Other approaches include technologies like <\/span><a href=\"https:\/\/www.esecurityplanet.com\/products\/zero-trust-security-solutions\/\"><span style=\"font-weight: 400;\">zero trust<\/span><\/a><span style=\"font-weight: 400;\"> that attempt to limit intrusions, and <\/span><a href=\"https:\/\/www.esecurityplanet.com\/products\/best-user-and-entity-behavior-analytics-ueba-tools\/\"><span style=\"font-weight: 400;\">behavioral technologies<\/span><\/a><span style=\"font-weight: 400;\"> that recognize when something is amiss. And seemingly little things like <\/span><a href=\"https:\/\/www.esecurityplanet.com\/threats\/fireeye-solarwinds-breaches-implications-protections\/\"><span style=\"font-weight: 400;\">patches<\/span><\/a><span style=\"font-weight: 400;\"> are critically important &#8211; and would have protected a number of SolarWinds users in this case.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The best approach to cybersecurity, then, is to do the little things right, establish strong defenses &#8211; and detect the inevitable breaches as quickly as possible.<\/span><\/p>\n<p><strong><span style=\"color: #111111; font-family: Roboto, sans-serif; font-size: 27px;\">How did FireEye detect the breaches?<\/span><\/strong><\/p>\n<p>As FireEye caught both breaches &#8211; the SolarWinds vulnerability was how the attackers gained entry in to FireEye&#8217;s network &#8211; the company clearly did something right. But how did FireEye detect the attacks? The company&#8217;s not saying, at least not yet.<\/p>\n<p>&#8220;We&#8217;re still investigating,&#8221; Dan Wire, FireEye&#8217;s vice president of global communications, told <em>eSecurity Planet<\/em>. &#8220;No promises but I am hopeful we&#8217;ll be able to share some of the attacker TTPs [tactics, techniques and procedures] and how we detected the attack down the line. For the moment we don&#8217;t have anything specific to share.&#8221;<\/p>\n<p>Asked if tools like patch management, threat hunting, zero trust and UEBA could help, Wire said:<\/p>\n<p>&#8220;Certainly patch management, threat hunting and the tools you mention are all critical aspects, but remembering APTs are mission-based groups made up of humans who continually evolve their methods, it&#8217;s too simple to say do X to keep APTs out. For example there&#8217;s no piece of technology that will stop an attacker from calling an employee and getting them to disclose their credentials &#8211; a common APT tactic.<\/p>\n<p>&#8220;Down the line I&#8217;m hopeful the industry will collect enough information about this supply chain compromise that we can share best practices and specifics about how to defend against the TTPs in this event.&#8221;<\/p>\n<h2><strong>Guarding against misuse of certificates<\/strong><\/h2>\n<p>Chris Hickman, chief security officer at digital identity security vendor Keyfactor, said the\u00a0attackers misused X.509 certificates and keys as a part of their toolkit to infiltrate and spread while avoiding detection.<\/p>\n<p><span lang=\"EN-CA\">&#8220;Code signing is one component of the SolarWinds breach, but not because of a stolen certificate,&#8221; Hickman said. &#8220;Attackers were able to inject malware into the build process, which is difficult to detect. They were able to compromise certificates, allowing them to fabricate fake tokens for network access, transversing that to cloud access and subsequently manage network access and user permissions.<\/span><\/p>\n<p><span lang=\"EN-CA\">&#8220;This attack was highly sophisticated and the overarching theme here is not SolarWinds or FireEye. This is endemic of many organization&#8217;s broad inability to track certificates within the business, know how those certificates are used and how to manage them effectively when something might be wrong. This kind of breach can happen to anyone and highlights the importance of certificate lifecycle management and having the processes and technology in place for visibility and certificate management.&#8221;<\/span><\/p>\n<p>Keyfactor outlined some best practices to mitigate misuse of keys and certificates:<\/p>\n<ul>\n<li>Never store code-signing keys on developer workstations, web servers or build servers. Private keys should be kept in a FIPS 140-2 validated HSM.<\/li>\n<li>Segregate duties between who is authorized to sign code, who can approve the request, and who can monitor and enforce compliance with signing policies.<\/li>\n<li>Maintain an active inventory of all certificates, where they are installed, who they were issued from, and who owns them (and your domains).<\/li>\n<li>Control certificate issuance and approval workflows to ensure that every certificate is trusted, compliant with policy, and up-to-date.<\/li>\n<li>Test your certificate re-issuance and revocation capabilities to ensure you can respond effectively to a compromise.<\/li>\n<\/ul>\n<p><em>eSecurity Planet Editor Paul Shread contributed to this report. This updates a Dec. 16 article.<\/em><\/p>\n\n\n<div id=\"ta-campaign-widget-66d7028ab1570-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d7028ab1570\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d7028ab1570\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d7028ab1570\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d7028ab1570\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d7028ab1570\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d7028ab1570\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Five days after FireEye detailed the theft of about 300 of its proprietary cybersecurity tools, SolarWinds announced that its Orion IT monitoring platform had also been compromised by hackers believed to be sponsored by the Russian government. Together, the attack that originated with a SolarWinds vulnerability turned over critical cybersecurity infrastructure to the malicious actors, [&hellip;]<\/p>\n","protected":false},"author":250,"featured_media":17921,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[15],"tags":[5058,595,11623],"b2b_audience":[33],"b2b_industry":[],"b2b_product":[403],"class_list":["post-17920","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-threats","tag-breach","tag-fireeye","tag-solarwinds","b2b_audience-awareness-and-consideration","b2b_product-cyber-terrorists-and-cyber-crime"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>FireEye, SolarWinds Breaches: Implications and Protections<\/title>\n<meta name=\"description\" content=\"Two stunning cybersecurity breaches, their implications for customers and security vendors, and protective and preventive steps everyone should take.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/threats\/fireeye-solarwinds-breaches-implications-protections\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"FireEye, SolarWinds Breaches: Implications and Protections\" \/>\n<meta property=\"og:description\" content=\"Two stunning cybersecurity breaches, their implications for customers and security vendors, and protective and preventive steps everyone should take.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/threats\/fireeye-solarwinds-breaches-implications-protections\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2020-12-18T18:39:04+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-05-12T16:54:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/pexels-soumil-kumar-735911.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"801\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Sam Ingalls\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@https:\/\/twitter.com\/SamIngalls\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Sam Ingalls\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/fireeye-solarwinds-breaches-implications-protections\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/fireeye-solarwinds-breaches-implications-protections\/\"},\"author\":{\"name\":\"Sam Ingalls\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/40407ef36d4a8822d7fcd993b93faba2\"},\"headline\":\"FireEye, SolarWinds Breaches: Implications and Protections\",\"datePublished\":\"2020-12-18T18:39:04+00:00\",\"dateModified\":\"2023-05-12T16:54:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/fireeye-solarwinds-breaches-implications-protections\/\"},\"wordCount\":1982,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/fireeye-solarwinds-breaches-implications-protections\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/pexels-soumil-kumar-735911.jpg\",\"keywords\":[\"breach\",\"FireEye\",\"Solarwinds\"],\"articleSection\":[\"Threats\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.esecurityplanet.com\/threats\/fireeye-solarwinds-breaches-implications-protections\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/fireeye-solarwinds-breaches-implications-protections\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/threats\/fireeye-solarwinds-breaches-implications-protections\/\",\"name\":\"FireEye, SolarWinds Breaches: Implications and Protections\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/fireeye-solarwinds-breaches-implications-protections\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/fireeye-solarwinds-breaches-implications-protections\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/pexels-soumil-kumar-735911.jpg\",\"datePublished\":\"2020-12-18T18:39:04+00:00\",\"dateModified\":\"2023-05-12T16:54:00+00:00\",\"description\":\"Two stunning cybersecurity breaches, their implications for customers and security vendors, and protective and preventive steps everyone should take.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/fireeye-solarwinds-breaches-implications-protections\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/threats\/fireeye-solarwinds-breaches-implications-protections\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/fireeye-solarwinds-breaches-implications-protections\/#primaryimage\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/pexels-soumil-kumar-735911.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/pexels-soumil-kumar-735911.jpg\",\"width\":1200,\"height\":801,\"caption\":\"solarwinds breach\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/fireeye-solarwinds-breaches-implications-protections\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"FireEye, SolarWinds Breaches: Implications and Protections\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/40407ef36d4a8822d7fcd993b93faba2\",\"name\":\"Sam Ingalls\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/08\/Sam-Ingalls-Square-150x150.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/08\/Sam-Ingalls-Square-150x150.jpg\",\"caption\":\"Sam Ingalls\"},\"description\":\"Sam Ingalls is an award-winning writer and researcher covering enterprise technology, cybersecurity, data centers, and IT trends, for eSecurity Planet, Tech Republic, ServerWatch, Webopedia, and Channel Insider.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/singalls\/\",\"https:\/\/x.com\/https:\/\/twitter.com\/SamIngalls\"],\"url\":\"https:\/\/www.esecurityplanet.com\/author\/singalls\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"FireEye, SolarWinds Breaches: Implications and Protections","description":"Two stunning cybersecurity breaches, their implications for customers and security vendors, and protective and preventive steps everyone should take.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/threats\/fireeye-solarwinds-breaches-implications-protections\/","og_locale":"en_US","og_type":"article","og_title":"FireEye, SolarWinds Breaches: Implications and Protections","og_description":"Two stunning cybersecurity breaches, their implications for customers and security vendors, and protective and preventive steps everyone should take.","og_url":"https:\/\/www.esecurityplanet.com\/threats\/fireeye-solarwinds-breaches-implications-protections\/","og_site_name":"eSecurity Planet","article_published_time":"2020-12-18T18:39:04+00:00","article_modified_time":"2023-05-12T16:54:00+00:00","og_image":[{"width":1200,"height":801,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/pexels-soumil-kumar-735911.jpg","type":"image\/jpeg"}],"author":"Sam Ingalls","twitter_card":"summary_large_image","twitter_creator":"@https:\/\/twitter.com\/SamIngalls","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Sam Ingalls","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/threats\/fireeye-solarwinds-breaches-implications-protections\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/fireeye-solarwinds-breaches-implications-protections\/"},"author":{"name":"Sam Ingalls","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/40407ef36d4a8822d7fcd993b93faba2"},"headline":"FireEye, SolarWinds Breaches: Implications and Protections","datePublished":"2020-12-18T18:39:04+00:00","dateModified":"2023-05-12T16:54:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/fireeye-solarwinds-breaches-implications-protections\/"},"wordCount":1982,"commentCount":0,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/fireeye-solarwinds-breaches-implications-protections\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/pexels-soumil-kumar-735911.jpg","keywords":["breach","FireEye","Solarwinds"],"articleSection":["Threats"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.esecurityplanet.com\/threats\/fireeye-solarwinds-breaches-implications-protections\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/threats\/fireeye-solarwinds-breaches-implications-protections\/","url":"https:\/\/www.esecurityplanet.com\/threats\/fireeye-solarwinds-breaches-implications-protections\/","name":"FireEye, SolarWinds Breaches: Implications and Protections","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/fireeye-solarwinds-breaches-implications-protections\/#primaryimage"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/fireeye-solarwinds-breaches-implications-protections\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/pexels-soumil-kumar-735911.jpg","datePublished":"2020-12-18T18:39:04+00:00","dateModified":"2023-05-12T16:54:00+00:00","description":"Two stunning cybersecurity breaches, their implications for customers and security vendors, and protective and preventive steps everyone should take.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/fireeye-solarwinds-breaches-implications-protections\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/threats\/fireeye-solarwinds-breaches-implications-protections\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/threats\/fireeye-solarwinds-breaches-implications-protections\/#primaryimage","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/pexels-soumil-kumar-735911.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/pexels-soumil-kumar-735911.jpg","width":1200,"height":801,"caption":"solarwinds breach"},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/threats\/fireeye-solarwinds-breaches-implications-protections\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"FireEye, SolarWinds Breaches: Implications and Protections"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/40407ef36d4a8822d7fcd993b93faba2","name":"Sam Ingalls","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/08\/Sam-Ingalls-Square-150x150.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/08\/Sam-Ingalls-Square-150x150.jpg","caption":"Sam Ingalls"},"description":"Sam Ingalls is an award-winning writer and researcher covering enterprise technology, cybersecurity, data centers, and IT trends, for eSecurity Planet, Tech Republic, ServerWatch, Webopedia, and Channel Insider.","sameAs":["https:\/\/www.linkedin.com\/in\/singalls\/","https:\/\/x.com\/https:\/\/twitter.com\/SamIngalls"],"url":"https:\/\/www.esecurityplanet.com\/author\/singalls\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/17920"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/250"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=17920"}],"version-history":[{"count":0,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/17920\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media\/17921"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=17920"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=17920"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=17920"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=17920"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=17920"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=17920"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}