Ad End 1 August 2025
Ad Ends 13 July 2025
ad End 25 October 2025
Ad Ends 20 April 2025
Ad expire at 5 August 2024
banner Expire 9 June 2025
banner Expire 25 October 2025
banner Expire 10 May 2025
What's new
Wizard's shop 2.0
Money Club cc shop
banner Expire 15 January 2025
banner Expire 20 October 2024
UniCvv
Yale Lodge
Kfc CLub
adv exp at 30 July 2025
Carding.pw carding forum
BidenCash Shop

File_closed07

TRUSTED VERIFIED SELLER
Staff member
Joined
Jun 13, 2020
Messages
7,907
Reaction score
943
Points
212
Awards
2
  • trusted user
  • Rich User
The Russian state-backed operatives responsible for the SolarWinds attack may have numbered more than 1000, Microsoft president Brad Smith has claimed.

Speaking to the CBS 60 Minutes program over the weekend, Smith argued that the campaign, which targeted multiple US government departments and private cybersecurity companies, was “the largest and most sophisticated attack the world has ever seen.”

Only around 4000 of the millions of lines of code in the SolarWinds Orion update were rewritten to help the attackers achieve their ends, but this took a tremendous amount of manpower, he added.

“Microsoft has assigned 500 engineers to dig in to the attack. One compared it to a Rembrandt painting, the closer they looked, the more details emerged,” Smith continued.

“When we analyzed everything that we saw at Microsoft, we asked ourselves how many engineers have probably worked on these attacks, and the answer we came to was, well, certainly more than 1000.”

When asked how, with all the resources Microsoft had to hand, the tech giant still managed to miss the presence of these attackers, Smith claimed that attackers usually have an “asymmetric advantage” at this level.

The program also shed some further light on how security vendor FireEye first discovered it was compromised.

“Just like everybody working from home, we have two-factor authentication. A code pops up on our phone. We have to type in that code. Then we can log in. A FireEye employee was logging in, but the difference was our security staff looked at the login and we noticed that individual had two phones registered to their name,” explained CEO Kevin Mandia.

“So our security employee called that person up and we asked, ‘Hey, did you actually register a second device on our network?’ Our employee said, ‘No. It wasn’t, it wasn’t me.’”

This effectively lifted the lid on the whole operation, as FireEye engineers started to dig into the attack and unearthed what turned out to be a widespread state-backed cyber-espionage campaign.
 
Ad End 1 February 2024
Top