The SolarWinds Breach & Code Signing
"It’s hard to overstate how bad this is." - Bruce Schneier
Sometime before March 2020, hackers working for the Russian SVR hacked into SolarWinds and slipped a backdoor into an Orion software update. Users who downloaded and installed that corrupted update were subject to a supply-chain attack that allowed a malicious hacking group access to unknown quantities of sensitive data. Orion software is used by very sensitive companies (more than 400 of the Fortune500 largest companies and a lot of government agencies) to monitor all of their IT. So how did this happen? Why didn't code signing prevent a third party from injecting bad code?
To protect yourself against this type of attack you might want to think about keeping a tight inventory on the cryptographic assets that make code signing work. A cryptographic key inventory starting with the private key that actually signs your updates, and includes information about how you measure access to keys, how you store keys, and who has access to keys.
- More about key inventory in our white paper: https://cryptosense.com/whitepapers/cryptography-inventory-whitepaper/
- HSMs and how they get breached: https://www.youtube.com/playlist?list=PLA-8aGQm6tkIgd8-zi4PtCO79qmmtKyCm
- Cryptography breaches: https://www.youtube.com/playlist?list=PLA-8aGQm6tkLoaLzuoxv_IIxTH3uMLgSD
/////
Find out more about Cryptosense: https://cryptosense.com/
Follow us on Twitter: https://twitter.com/cryptosense
/////
Cryptosense CEO Dr. Graham Steel was formerly an academic researcher before founding Cryptosense in 2013. His cryptography expertise is the basis for the company's 'Analyzer' technology which allows customers to protect themselves against losing sensitive data.
Видео The SolarWinds Breach & Code Signing канала Cryptosense
Sometime before March 2020, hackers working for the Russian SVR hacked into SolarWinds and slipped a backdoor into an Orion software update. Users who downloaded and installed that corrupted update were subject to a supply-chain attack that allowed a malicious hacking group access to unknown quantities of sensitive data. Orion software is used by very sensitive companies (more than 400 of the Fortune500 largest companies and a lot of government agencies) to monitor all of their IT. So how did this happen? Why didn't code signing prevent a third party from injecting bad code?
To protect yourself against this type of attack you might want to think about keeping a tight inventory on the cryptographic assets that make code signing work. A cryptographic key inventory starting with the private key that actually signs your updates, and includes information about how you measure access to keys, how you store keys, and who has access to keys.
- More about key inventory in our white paper: https://cryptosense.com/whitepapers/cryptography-inventory-whitepaper/
- HSMs and how they get breached: https://www.youtube.com/playlist?list=PLA-8aGQm6tkIgd8-zi4PtCO79qmmtKyCm
- Cryptography breaches: https://www.youtube.com/playlist?list=PLA-8aGQm6tkLoaLzuoxv_IIxTH3uMLgSD
/////
Find out more about Cryptosense: https://cryptosense.com/
Follow us on Twitter: https://twitter.com/cryptosense
/////
Cryptosense CEO Dr. Graham Steel was formerly an academic researcher before founding Cryptosense in 2013. His cryptography expertise is the basis for the company's 'Analyzer' technology which allows customers to protect themselves against losing sensitive data.
Видео The SolarWinds Breach & Code Signing канала Cryptosense
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
![AWS KMS vs. Azure Key Vault](https://i.ytimg.com/vi/afHZOcp-ea0/default.jpg)
![Solarwinds Orion Hack December 2020](https://i.ytimg.com/vi/aKhfL9IP6DI/default.jpg)
![The Codecov Incident - How do supply chain attacks work?](https://i.ytimg.com/vi/AYMtiqmXiGM/default.jpg)
![Learn Cryptography | Part 1 - Introduction to Cryptography Risk](https://i.ytimg.com/vi/3t7C2hOJNy8/default.jpg)
![Explaining Keystores | Part 3 - PKCS#12](https://i.ytimg.com/vi/pCHgsvJ4QwQ/default.jpg)
![What is Post-Quantum Cryptography?](https://i.ytimg.com/vi/N6mvo9ZyoPo/default.jpg)
![The SolarWinds Hack: The Largest Cyber Espionage Attack in the United States](https://i.ytimg.com/vi/Kf7Motm36Go/default.jpg)
![What do Germany and France think about Post-Quantum Cryptography?](https://i.ytimg.com/vi/9yzVAMtWD8Q/default.jpg)
![The SolarWinds Hack Explained | Cybersecurity Advice](https://i.ytimg.com/vi/jD02Q3RStaM/default.jpg)
![How did SolarWinds' massive data breach go undetected for months?](https://i.ytimg.com/vi/Gw2YCwkr8Bs/default.jpg)
![SUPERNOVA - Everything you need to know to Reverse Engineer an APT WebShell](https://i.ytimg.com/vi/7WX5fCEzTlA/default.jpg)
![SolarWinds Breach | Protecting from on-premises attacks | EP2](https://i.ytimg.com/vi/8e4-MaB7Fyo/default.jpg)
![Updates on the SolarWinds Sunburst Supply Chain Attack | FireEye Hack](https://i.ytimg.com/vi/fhCrxSyUl3w/default.jpg)
![Biggest Cyber attack just got public | solarwinds | fireEye](https://i.ytimg.com/vi/wiQ_dKFUYkc/default.jpg)
![Analysis of the SolarWinds Attack](https://i.ytimg.com/vi/8O8v022f06g/default.jpg)
![Learn Cryptography | Part 2 - Breaches and Attacks](https://i.ytimg.com/vi/osX3A4wdwcs/default.jpg)
![SolarWinds Sunburst Hack: What you need to know](https://i.ytimg.com/vi/Q_iAW9RNafA/default.jpg)
![Hackers ने ऐसे लगाई IT Security में सेंध, Fortune 500 companies बनी target| Solarwinds Hack|Orion](https://i.ytimg.com/vi/iKsxlIDIOnQ/default.jpg)
![SUNBURST SolarWinds RECON - Malware Reverse Engineering, OSINT and Identifying Victims](https://i.ytimg.com/vi/mbGN1xqy1jY/default.jpg)
![SolarWinds Breach: An RSAC Interview with Dmitri Alperovitch About Who, How and Why](https://i.ytimg.com/vi/3kpaV4FNzc0/default.jpg)