The hack of FireEye, a company with an array of business contracts across the national security space both in the United States and its allies, is among the most significant breaches in recent memory. The FireEye breach was disclosed in a blog post authored by CEO Kevin Mandia.
https://www.reuters.com/article/us-fireeye-cyber/u-s-cybersecurity-firm-fireeye-discloses-breach-theft-of-hacking-tools-idUSKBN28I31E
FireEye breached after SolarWinds supply-chain attack
https://bleepingcomputer.com/news/security/us-govt-fireeye-breached-after-solarwinds-supply-chain-attack/
<code>SolarWinds’ comprehensive products and services are used by more than 300,000 customers worldwide, including military, Fortune 500 companies, government agencies, and education institutions. Our customer list includes:
More than 425 of the US Fortune 500
All ten of the top ten US telecommunications companies
All five branches of the US Military
The US Pentagon, State Department, NASA, NSA, Postal Service, NOAA, Department of Justice, and the Office of the President of the United States
All five of the top five US accounting firms
Hundreds of universities and colleges worldwide</code>
Hackers used SolarWinds' dominance against it in sprawling spy campaign
<code>Cybersecurity experts are still struggling to understand the scope of the damage.
“We don’t think anyone else in the market is really even close in terms of the breadth of coverage we have,” he said. “We manage everyone’s network gear.”
The hackers inserted malicious code into Solarwinds.Orion software updates pushed out to nearly 18,000 customers.
The malicious updates - sent between March and June
We may not know the true impact for many months, if not more – if not ever
The company’s stock has tumbled more than 23%
Security researcher Vinoth Kumar told Reuters that, last year, he alerted the company that anyone could access SolarWinds’ update server by using the password “solarwinds123”</code>
https://in.reuters.com/article/global-cyber-solarwinds-idINKBN28P2N8
https://www.reuters.com/article/us-fireeye-cyber/u-s-cybersecurity-firm-fireeye-discloses-breach-theft-of-hacking-tools-idUSKBN28I31E
FireEye breached after SolarWinds supply-chain attack
products that contained this vulnerability to be fewer than 18,000
https://bleepingcomputer.com/news/security/us-govt-fireeye-breached-after-solarwinds-supply-chain-attack/
<code>SolarWinds’ comprehensive products and services are used by more than 300,000 customers worldwide, including military, Fortune 500 companies, government agencies, and education institutions. Our customer list includes:
More than 425 of the US Fortune 500
All ten of the top ten US telecommunications companies
All five branches of the US Military
The US Pentagon, State Department, NASA, NSA, Postal Service, NOAA, Department of Justice, and the Office of the President of the United States
All five of the top five US accounting firms
Hundreds of universities and colleges worldwide</code>
Hackers used SolarWinds' dominance against it in sprawling spy campaign
<code>Cybersecurity experts are still struggling to understand the scope of the damage.
“We don’t think anyone else in the market is really even close in terms of the breadth of coverage we have,” he said. “We manage everyone’s network gear.”
The hackers inserted malicious code into Solarwinds.Orion software updates pushed out to nearly 18,000 customers.
The malicious updates - sent between March and June
We may not know the true impact for many months, if not more – if not ever
The company’s stock has tumbled more than 23%
Security researcher Vinoth Kumar told Reuters that, last year, he alerted the company that anyone could access SolarWinds’ update server by using the password “solarwinds123”</code>
https://in.reuters.com/article/global-cyber-solarwinds-idINKBN28P2N8