SolarWinds Are Gusting and Blowing Hard
In considering some of the “odd” organizations compromised by SolarWinds, there are three reasons for why they might have been targeted:
- A launch pad for secondary attacks. The idea is that the original compromise was like a rat carrying fleas infected with the bubonic plague (arguably more problematic than the Rona)
- A mechanism for placing malicious code on the computing devices of administrators, instructors, and students. As these individuals thumb typed away, these high trust individuals were infecting others in their social circle. If the infections were activated, downloads of tertiary malware could take place.
- Institutions like these would connect to other networks. Malware could be placed in server nodes serving other institutions; for example, big outfits like Rogers Communications, a government ministry or two, and possibly the cloud customers of the beloved Rogers as well as BCE (Bell Canada’s parent) and Telus.
1994 Sounding the Alarm on Cyber-Security
Review: WORM – The First Digital World War
Worth a Look: Book Reviews on Communications & Computing
We Told You So! US Cyber Today is Crap Because the White House Ignored Our Warning in 1994 — and Allowed NSA to Gut US C4I For Its Own Convenience