Gadgets News

Microsoft says Chinese hackers have been using a SolarWinds exploit to carry out attacks

SolarWinds the vulnerabilities continue to be targeted by foreign hackers months after the U.S. information technology society suffered a widespread cyberattack. On Tuesday, Microsoft said a group operating outside of China was using zero-distance code execution to attack the SolarWinds software. If exploited successfully, the flaw in the IT company’s Serv-U software allows hackers to take actions such as installing and managing malicious payloads or viewing and changing data, Microsoft noted in a blog post.

As part of its investigation, Microsoft said it had observed the group of hackers targeting organizations in the U.S. military research and development sectors and software. The company designated the plaintiff as DEV-0322 in reference to its status of unidentified “development team”. Microsoft explained that it uses the label before reaching high confidence as to the origin or identity of a hacker. Microsoft said the group operating outside of China uses commercial VPN solutions and compromised consumer routers to carry out its attacks. Those affected were notified and assisted in their response, the company said.

SolarWinds confirmed last weekend that Microsoft was notified of a security vulnerability in its Serv-U software The flaw was related to the managed file transfer of the product and to the secure FTP, which it has already fixed.

SolarWinds gained notoriety overnight in December after it became the subject of a supply chain cyberattack which has impacted 18,000 of its clients, including nine U.S. government agencies. U.S. intelligence issued a joint statement in January naming it Russia as the most likely source of the pirate. The following month, Reuters he said Chinese suspected pirates had exploited a separate flaw in SolarWinds software to help violate U.S. government computers last year. The latest vulnerability is not linked to the so-called Sunburst supply chain attack, SolarWinds said.

All products recommended by Engadget are selected by our editorial team, independent of our parent company. Some of our stories include affiliate links. If you buy something through one of these links, you can earn an affiliate commission.

Source link

Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top button