DefinePK

DefinePK hosts the largest index of Pakistani journals, research articles, news headlines, and videos. It also offers chapter-level book search.

Latest Trends in the Cybersecurity after the Solar Wind Hacking Attack


Article Information

Title: Latest Trends in the Cybersecurity after the Solar Wind Hacking Attack

Authors: Naveed Akhtar, Omer Aziz, Tariq Hussain

Journal: Foundation University Journal of Engineering and Applied Sciences (FUJEAS)

HEC Recognition History
Category From To
Y 2024-10-01 2025-12-31
Y 2023-07-01 2024-09-30
Y 2022-07-01 2023-06-30
Y 2021-07-01 2022-06-30

Publisher: Foundation University, Islamabad

Country: Pakistan

Year: 2020

Volume: 1

Issue: 2

Language: English

DOI: 10.33897/fujeas.v1i2.347

Keywords: Cyber SecuritySolar Winds AttackFireEye

Categories

Abstract

That dominance, in any case, has gotten to be a risk. On Sunday, Solar Winds alarmed thousands of its clients that an “outside country state” had found a back entryway into its most well-known item, an instrument called Orion that makes a difference organizations screen blackouts on their computer systems and servers. The company uncovered that programmers snuck a malevolent code that gave them inaccessible get to customers’ systems into an upgrade of Orion. The hack started as early as Walk, Solar Winds conceded, giving the programmers bounty of time to get to the customers’ inside workings. The  breach was not found until the unmistakable cybersecurity company FireEye, which itself employments Solar Winds, decided it had experienced a breach through the program. FireEye has not freely faulted that breach on the Solar Winds hack, but it allegedly affirmed that was the case to the tech location Krebs On Security on Tuesday. FireEye depicted the malware’s bewildering capabilities, from at first lying torpid up to two weeks, to stowed away. That was December 13, 2020. FireEye gauges programmers to begin with picked up get to in Walk 2020. For about eight months, malevolent on-screen characters carted absent untold sums of touchy information from contaminated organizations — and the total scope of the breach is still unfolding. Despite Microsoft seizing the code’s command and control server (a common component in botnet assaults as well), a few security specialists think the assailants may still have get to the Solar Winds Orion program system. Others are conjecturing that these programmers cleared out behind extra, yet-to-be-seen malevolent code.


Paper summary is not available for this article yet.

Loading PDF...

Loading Statistics...