.@CISAgov, @FBI, @CNMF_CyberAlert link Russian SVR/APT 29 actors to network infiltration through #SolarWinds supply chain compromise and GoldenSAML exploitation of M365. Read the report here: us-cert.cisa.gov/ncas/analysis-…

Engagement Map


Replies and Quotes

Total of 2 replies and 3 quotes found
U.S. Cyber Command teams hunted for malware & related files used by SVR Russian cyber actors to exploit vulnerabilities in the #SolarWinds supply chain attack. Read the report and mitigate as needed: us-cert.cisa.gov/ncas/analysis-… @CISAgov @FBI #DefendForward
In reply to @CNMF_CyberAlert
.@CNMF_Cyberalert, @CISAGov released 8 files attributed to Russian SVR/APT 29. Upload includes new malware variants of GoldMax, GoldFinder, Sibot and associated files which were used to compromise a single victim network. #SolarWinds virustotal.com/en/user/CYBERC…
Here's the cherry on top of the U.S. government's Russian SVR news blast today.
Over 2 replies and quotes not shown


125 retweeters not shown
For access to this functionality a Trendsmap Explore subscription is required.

A Trendsmap Explore subscription provides full access to all available timeframes

Find out more

Thanks for trying our Trendsmap Pro demo.

For continued access, and to utliise the full functionality available, you'll need to subscribe to a Trendsmap Pro subscription.

Find out more

This account is already logged in to Trendsmap.
Your subscription allows access for one user. If you require access for more users, you can create additional subscriptions.
Please Contact us if you are interested in discussing discounts for 3+ users for your organisation, or have any other queries.