Skip to main content area.
MBT Transparent 3286-747

 

(855) 688-9525

Support
Client Login

Site Navigation

  • Home
  • Services
    • IT Managed Services
    • Networking & Wireless
    • Secure Remote Access
  • Solutions
    • Our Solutions
    • Network Operations Center
    • MBT IT Staff Augmentation
  • Industries
    • Healthcare
    • Business
    • Education
    • Government
    • Non-Profits
  • About Us
    • Our Story
    • Leadership Team
  • Contact Us
  • Blog
Medicine Bow Technologies
Click to call. 8666889525

Site Mobile Navigation

  • Home
  • Services
    • IT Managed Services
    • Networking & Wireless
    • Secure Remote Access
  • Solutions
    • Our Solutions
    • Network Operations Center
    • MBT IT Staff Augmentation
  • Industries
    • Healthcare
    • Business
    • Education
    • Government
    • Non-Profits
  • About Us
    • Our Story
    • Leadership Team
  • Contact Us
  • Blog

SolarWinds Hack News 1-5-2021

By:
Elmer Robinson
Date Published:
January 5th, 2021

The details and scope of this event continue to evolve and I don’t think we know the full nature of what has happened yet.

New information that has emerged since our previous post includes:

  • Initial reports said the attackers were in place since March, but we now know that the attackers conducted a dry run as a test as early as October 2019. They were probably in place a long time before that. This is likely a multi-year effort and we may never know the actual start date.
  • The dry run did not contain an active payload but was meant to test the deployment mechanisms to make sure no detection was tripped before the actual attack was launched.
  • While the full list of entities affected is unknown, the list of companies and agencies known to be affected continues to grow, and includes the most advanced cyber-defenses in existence. Examples include:
    • U.S. Department of Defense
    • U.S. Department of Homeland Security
    • U.S. State Department
    • NASA
    • The Cybersecurity and Infrastructure Security Agency (CISA)
    • U.S. Department of Energy
    • U.S. Treasury
    • U.S. National Nuclear Security Administration
    • Microsoft
    • Intel
    • Cisco
    • Mastercard and Visa
  • Microsoft admits that their source code was accessed but claim the account used did not have rights to make modifications. Hopefully this means Windows source code did not get implanted with back doors, but it does mean that it’s possible malicious actors are reading through the Windows Firewall or Office 365 code looking for holes and ways to attack as we speak.

A firewall, anti-virus and data backups are no longer enough to protect your business from compromise or to detect one if it occurs. Medicine Bow Technologies provides 13 individual security services for all of our managed clients, and the expertise to use them to help keep you safe. If you don’t have that much protection call us now to set an appointment at (307) 721-4050

Elmer Robinson, Cybersecurity Director, MBT
Elmer Robinson, Cybersecurity Director, MBT
Categories:
antivirus, backuips, cyber threats, cybersecurity, disaster recovery, it monitoring, it security, it services, malware, managed service provider, msp, network security, patching
Categories:
antivirus, cyber threats, cybersecurity, disaster recovery, it monitoring, it security, it services, malware, network security
Tags:
solarwinds
  • Employee Portal
  • Careers
  • Privacy

CALL US: (855) 688-9525
IT Managed Services for Your Industry

Copyright © 2020 Medicine Bow Technologies, Inc.

  • Facebook
  • LinkedIn
$(document).ready(function(){ $('a[href^="https://www.medbowtech.com/about-us/"]').each(function(){ var oldUrl = $(this).attr("href"); // Get current url var newUrl = oldUrl.replace("https://www.medbowtech.com/about-us/", "https://www.medbowtech.com/about-us/our-story/"); // Create new url $(this).attr("href", newUrl); // Set herf value }); });