
The story of trust is an old one, but the Sunburst cyber-espionage campaign was a startling reminder of the United States’ collective cyber insecurity and the inadequacy of current US strategy to compete in a dynamic intelligence contest in cyberspace. Both the public and private sectors must work together to ruthlessly prioritize risk, make linchpin systems in the cloud more defensible, and make federal cyber-risk management more self-adaptive. The US government and industry should embrace the idea of “persistent flow” to address this strategic shortfall emphasizing that effective cybersecurity is more about speed, balance, and concentrated action. Overlooking that question of strategy invites crises larger and more frequent than those the United States is battling today. Adapt to the trends in security, and opt for stronger third-party email security solutions, to prevent security breaches.įor more resources on security, visit our blog.The Sunburst crisis was a failure of strategy more than it was the product of an information-technology (IT) problem or a mythical adversary. This is how our Email ATP service has been designed, and has been stopping email threats efficiently for 19+ years in the security industry. Logix believes stronger, more intuitive gatekeeping is a much better practice that can stop email threats at the entry level itself. This happens not because of cracks in the way email service providers enforce security, but because they add protection layers from the data first and then move up to the application and users. Why Strong Email Security Mattersīy reading about these cases, it must have become apparent, you can do everything right and still fall prey to an attack. In the case of SolarWinds security breach, Dark Halo fiddled around with Microsoft Exchange’s data handling methods to steal email IDs which it then used to gain illegal access to the mailboxes. Post-attack logs of some of the companies struck by Dark Halo show that these hackers made a request to login using authentic email IDs they’d snicked from monitoring email communication, but were able to get in without providing the OTP required by MFA. They used trickery and vulnerabilities in the way email servers used user sessions to get into the system. Their preferred way of gaining access was to breach email accounts that had Multi-Factor Authentication by trying to bypass it altogether. They only relied on malicious payload as a last resort. They mainly attempt to extract email communication by monitoring weekly emails and operation patterns. The group UNC2452 or Dark Halo has been pretty active. “Our internal systems showed no evidence of unauthorized access or compromise in any on-premises and production environments,” Marcin Kleczynski, Co-Founder and CEO Malwarebytes, said. Taking cue from the SolarWinds breach, which had severly impacted SolarWinds supply chain products, Malwarebytes themselves performed a stringent audit of their products and source code. However, the investigation soon revealed that Dark Halo had only managed to hack into very few internal email accounts. They wanted to assess exactly how much damage the breach had caused.
MALWAREBYTES SOLARWINDS AZURE FULL
Soon after learning of the security breach, Malwarebytes launched a full scale internal investigation. MSRC already suspected some illicit activities being carried out by taking advantage of dormant Office 365 security apps. Malwarebytes originally became aware of the security breach through Microsoft’s Security Response Center (MSRC) back in December 2020. The intrusion operated using malicious apps created by the SolarWinds hackers, who’ve become infamous in the security world as UNC2452 or Dark Halo. In fact, Microsoft itself was in the process of revising the security measures of its Office 365 and Azure services, because these showed signed of an intrusion.

Also, Malwarebytes realized it was not the only company targeted by this particular case of cyber-attack. The security breach, as it quickly found out, came from a dormant O365 security app. Malwarebytes has clarified that there isn’t any linkage between the original breach at SolarWinds. How did this security breach impact Malwarebytes?

How did this security breach impact Malwarebytes?.
