A highly elusive attacker leverages supply chain
to compromise strategic targets
Technical Webinar | Tuesday 23 February | 16h-17h
FireEye has uncovered a widespread campaign, that we are tracking as UNC2452. The actors behind this campaign gained access to numerous public and private organizations around the world. They gained access to victims via trojanized updates to SolarWind’s Orion IT monitoring and management software.
This campaign may have begun as early as Spring 2020 and is currently ongoing. Post compromise activity following this supply chain compromise has included lateral movement and data theft. The campaign is the work of a highly skilled actor and the operation was conducted with significant operational security.
In this webinar FireEye experts Ronald Bushar and Bart Vanautgaerden will tell you the story of the most notorious attack of the last years.