{"id":38681,"date":"2020-12-14T02:10:47","date_gmt":"2020-12-14T02:10:47","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/security-vendor-solarwinds-says-product-updates-were-subverted-by-nation-state-fireye-says-exploit-is-rampant\/"},"modified":"2020-12-14T02:10:47","modified_gmt":"2020-12-14T02:10:47","slug":"security-vendor-solarwinds-says-product-updates-were-subverted-by-nation-state-fireye-says-exploit-is-rampant","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/security-vendor-solarwinds-says-product-updates-were-subverted-by-nation-state-fireye-says-exploit-is-rampant\/","title":{"rendered":"Security vendor SolarWinds says product updates were subverted by nation-state, Fireye says exploit is rampant"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/regmedia.co.uk\/2020\/12\/14\/shutterstock_russia_bear_security_cyberattack.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p><span data-label=\"update\">UPDATE<\/span> Security vendor SolarWinds\u2019 \u201cOrion\u201d IT monitoring platform has been compromised, and speculation is swirling that it was used in attacks on major US government agencies that could also be linked to last week\u2019s <a href=\"https:\/\/www.theregister.com\/2020\/12\/09\/fireeye_tools_hacked\/\">revalation<\/a> that security vendor FireEye\u2019s top hacking tools have been accessed.<\/p>\n<p>A statement from Kevin Thompson, SolarWinds president and CEO says the company is &#8220;aware of a potential vulnerability which if present is currently believed to be related to updates which were released between March and June 2020 to our Orion monitoring products.&#8221;<\/p>\n<p>&#8220;We believe that this vulnerability is the result of a highly-sophisticated, targeted and manual supply chain attack by a nation state. We are acting in close coordination with FireEye, the Federal Bureau of Investigation, the intelligence community, and other law enforcement to investigate these matters. As such, we are limited as to what we can share at this time.\u201d<\/p>\n<p>As we report in our update to this story below, FireEye says it found the flaw in a compromised .dll file that was posted to the downloads section of SolarWinds&#8217; site.<\/p>\n<p><i>The Register<\/i> has asked SolarWinds for further detail, but evidence of updates in the relevant timeframe is not hard to find: here\u2019s a <a href=\"https:\/\/status.solarwindsmsp.com\/2020\/06\/15\/solarwinds-rmm-security-notice-regarding-an-agent-vulnerability-pre-v10-8-9\/#more-19721\">June 2020<\/a> patch to the company\u2019s remote monitoring agent for Windows.<\/p>\n<blockquote class=\"pullquote\" readability=\"7\">\n<p>If you\u2019re a SolarWinds customer, assume compromise and immediately activate your incident response team.<\/p>\n<\/blockquote>\n<p>News of the SolarWinds hack was broken by newswire <i>Reuters<\/i>, which also reports that US government agencies, among them Treasury and the Department of Commerce, have been hit with a hack so serious that the National Security Council met to discuss it on Saturday.<\/p>\n<p><i>The Washington Post<\/i> has <a href=\"https:\/\/www.washingtonpost.com\/national-security\/russian-government-spies-are-behind-a-broad-hacking-campaign-that-has-breached-us-agencies-and-a-top-cyber-firm\/2020\/12\/13\/d5a53b88-3d7d-11eb-9453-fc36ba051781_story.html\">reported<\/a> that the government hacks were made possible by flaws in SolarWinds products and that the attack was perpetrated by Russian hacking group APT29, aka Cozy Bear. US government officials have acknowledged the incidents, but have not offered further details.<\/p>\n<p>This situation is properly scary because a supply chain attack that poisons product updates issued by a major security vendor suggests that Cozy Bear could be deep inside all sorts of systems and vendors. If that doesn\u2019t scare you, maybe SolarWinds\u2019 <a href=\"https:\/\/www.solarwinds.com\/company\/customers\">customer list<\/a> will, as it mentions the following organisations are users.<\/p>\n<ul>\n<li>More than 425 of the US Fortune 500<\/li>\n<li>All ten of the top ten US telecommunications companies<\/li>\n<li>All five branches of the US Military<\/li>\n<li>The US Pentagon, State Department, NASA, NSA, Postal Service, NOAA, Department of Justice, and the Office of the President of the United States<\/li>\n<li>All five of the top five US accounting firms<\/li>\n<\/ul>\n<p>While the prospect of Cozy Bear rummaging around inside the abovementioned organisations is scary, security experts aren&#8217;t panicking.<\/p>\n<p>Security analyst Jake Williams has posted a <a href=\"https:\/\/twitter.com\/MalwareJake\/status\/1338278185692246016\">Twitter thread<\/a> pointing out that products like Orion are a fine jumping-off point for an attack but points out that many such products are implemented to observe IT infrastructure performance rather than actively change configurations. He therefore urges readers not to assume the attack automatically translates to an ability to control systems.<\/p>\n<p><a href=\"https:\/\/www.theregister.com\/2020\/11\/18\/trump_fires_krebs\/\">Former US Cybersecurity and Infrastructure Security Agency head Chris Krebs<\/a> suggested the attack has likely been under way for months, but that it should be possible to contain.<\/p>\n<p>&#8220;If you\u2019re a SolarWinds customer &amp; use the below product, assume compromise and immediately activate your incident response team,&#8221; he advised. &#8220;Odds are you\u2019re not affected, as this may be a resource intensive hack. Focus on your Crown Jewels. You can manage this.&#8221;<\/p>\n<blockquote class=\"twitter-tweet\" readability=\"9.21875\">\n<p lang=\"en\" dir=\"ltr\">As news breaks about what looks to be a pretty large-scale hack, I have the utmost confidence in the <a href=\"https:\/\/twitter.com\/CISAgov?ref_src=twsrc%5Etfw\">@CISAgov<\/a> team and other Federal partners. I&#8217;m sorry I&#8217;m not there with them, but they know how to do this. This thing is still early, I suspect. Let&#8217;s let the pros work it.<\/p>\n<p>\u2014 Chris Krebs (@C_C_Krebs) <a href=\"https:\/\/twitter.com\/C_C_Krebs\/status\/1338249463949893634?ref_src=twsrc%5Etfw\">December 13, 2020<\/a><\/p><\/blockquote>\n<p>Hopefully, Krebs and Williams are correct. But even if they are, the fact remains that two big security vendors \u2013 FireEye and SolarWinds \u2013 have been revealed to be cracked and <i>something<\/i> appears to have taken a bite out of the US government. And all of these organisations boast of having strong defences against such attacks. \u00ae<\/p>\n<p>UPDATE: 03:50 UTC, Monday December 14th.<\/p>\n<p>FireEye has posted an <a target=\"_blank\" href=\"https:\/\/www.fireeye.com\/blog\/threat-research\/2020\/12\/evasive-attacker-leverages-solarwinds-supply-chain-compromises-with-sunburst-backdoor.html\" rel=\"noopener noreferrer\">analysis<\/a> of the flaw in SolarWinds code that says the problem is present in a file called <code>SolarWinds.Orion.Core.BusinessLayer.dll<\/code> that it describes as a &#8220;digitally-signed component of the Orion software framework that contains a backdoor that communicates via HTTP to third party servers.&#8221;<\/p>\n<p>FireEye says that once the .dll reaches a machine it remains dormant for up to two weeks, but then comes to life and &#8220;retrieves and executes commands, called &#8216;Jobs&#8217;, that include the ability to transfer files, execute files, profile the system, reboot the machine, and disable system services.&#8221;<\/p>\n<p>&#8220;The malware masquerades its network traffic as the Orion Improvement Program (OIP) protocol and stores reconnaissance results within legitimate plugin configuration files allowing it to blend in with legitimate SolarWinds activity. The backdoor uses multiple obfuscated blocklists to identify forensic and anti-virus tools running as processes, services, and drivers.&#8221;<\/p>\n<p>FireEye continues: &#8220;The trojanized update file is a standard Windows Installer Patch file that includes compressed resources associated with the update, including the trojanized SolarWinds.Orion.Core.BusinessLayer.dll component. Once the update is installed, the malicious DLL will be loaded by the legitimate SolarWinds executable SolarWind.BusinessLayerHost.exe or SolarWindws.BusinessLayerHostx64.exe (depending on system configuration).&#8221;<\/p>\n<p>The malware then goes dormant for another fortnight before attempting to resolve a subdomain of avsvmcloud[.]com. &#8220;The DNS response will return a CNAME record that points to a Command and Control (C2) domain. The C2 traffic to the malicious domains is designed to mimic normal SolarWinds API communications.&#8221;<\/p>\n<p>FireEye says it has &#8220;detected this activity at multiple entities worldwide.&#8221;<\/p>\n<p>&#8220;The victims have included government, consulting, technology, telecom and extractive entities in North America, Europe, Asia and the Middle East. We anticipate there are additional victims in other countries and verticals.&#8221;<\/p>\n<p>Long story short, this is a bad one and made worse by the fact that SolarWinds offers infrastructure monitoring but appears not to have been able to keep its own website and APIs clean.<\/p>\n<p> READ MORE <a href=\"https:\/\/go.theregister.com\/feed\/www.theregister.com\/2020\/12\/14\/solarwinds_fireeye_cozybear\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Supply chain exploit linked to attacks on major US government possibly by Russia\u2019s Cozy Bear attack gang UPDATE\u00a0 Security vendor SolarWinds\u2019 \u201cOrion\u201d IT monitoring platform has been compromised, and speculation is swirling that it was used in attacks on major US government agencies that could also be linked to last week\u2019s revalation that security vendor FireEye\u2019s top hacking tools have been accessed.\u2026 READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":38682,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[63],"tags":[],"class_list":["post-38681","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-the-register"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Security vendor SolarWinds says product updates were subverted by nation-state, Fireye says exploit is rampant 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/security-vendor-solarwinds-says-product-updates-were-subverted-by-nation-state-fireye-says-exploit-is-rampant\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security vendor SolarWinds says product updates were subverted by nation-state, Fireye says exploit is rampant 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/security-vendor-solarwinds-says-product-updates-were-subverted-by-nation-state-fireye-says-exploit-is-rampant\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2020-12-14T02:10:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/12\/security-vendor-solarwinds-says-product-updates-were-subverted-by-nation-state-fireye-says-exploit-is-rampant.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/security-vendor-solarwinds-says-product-updates-were-subverted-by-nation-state-fireye-says-exploit-is-rampant\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/security-vendor-solarwinds-says-product-updates-were-subverted-by-nation-state-fireye-says-exploit-is-rampant\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Security vendor SolarWinds says product updates were subverted by nation-state, Fireye says exploit is rampant\",\"datePublished\":\"2020-12-14T02:10:47+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/security-vendor-solarwinds-says-product-updates-were-subverted-by-nation-state-fireye-says-exploit-is-rampant\\\/\"},\"wordCount\":1036,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/security-vendor-solarwinds-says-product-updates-were-subverted-by-nation-state-fireye-says-exploit-is-rampant\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/12\\\/security-vendor-solarwinds-says-product-updates-were-subverted-by-nation-state-fireye-says-exploit-is-rampant.jpg\",\"articleSection\":[\"The Register\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/security-vendor-solarwinds-says-product-updates-were-subverted-by-nation-state-fireye-says-exploit-is-rampant\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/security-vendor-solarwinds-says-product-updates-were-subverted-by-nation-state-fireye-says-exploit-is-rampant\\\/\",\"name\":\"Security vendor SolarWinds says product updates were subverted by nation-state, Fireye says exploit is rampant 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/security-vendor-solarwinds-says-product-updates-were-subverted-by-nation-state-fireye-says-exploit-is-rampant\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/security-vendor-solarwinds-says-product-updates-were-subverted-by-nation-state-fireye-says-exploit-is-rampant\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/12\\\/security-vendor-solarwinds-says-product-updates-were-subverted-by-nation-state-fireye-says-exploit-is-rampant.jpg\",\"datePublished\":\"2020-12-14T02:10:47+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/security-vendor-solarwinds-says-product-updates-were-subverted-by-nation-state-fireye-says-exploit-is-rampant\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/security-vendor-solarwinds-says-product-updates-were-subverted-by-nation-state-fireye-says-exploit-is-rampant\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/security-vendor-solarwinds-says-product-updates-were-subverted-by-nation-state-fireye-says-exploit-is-rampant\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/12\\\/security-vendor-solarwinds-says-product-updates-were-subverted-by-nation-state-fireye-says-exploit-is-rampant.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/12\\\/security-vendor-solarwinds-says-product-updates-were-subverted-by-nation-state-fireye-says-exploit-is-rampant.jpg\",\"width\":1200,\"height\":600},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/security-vendor-solarwinds-says-product-updates-were-subverted-by-nation-state-fireye-says-exploit-is-rampant\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security vendor SolarWinds says product updates were subverted by nation-state, Fireye says exploit is rampant\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Security vendor SolarWinds says product updates were subverted by nation-state, Fireye says exploit is rampant 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/security-vendor-solarwinds-says-product-updates-were-subverted-by-nation-state-fireye-says-exploit-is-rampant\/","og_locale":"en_US","og_type":"article","og_title":"Security vendor SolarWinds says product updates were subverted by nation-state, Fireye says exploit is rampant 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/security-vendor-solarwinds-says-product-updates-were-subverted-by-nation-state-fireye-says-exploit-is-rampant\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2020-12-14T02:10:47+00:00","og_image":[{"width":1200,"height":600,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/12\/security-vendor-solarwinds-says-product-updates-were-subverted-by-nation-state-fireye-says-exploit-is-rampant.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/security-vendor-solarwinds-says-product-updates-were-subverted-by-nation-state-fireye-says-exploit-is-rampant\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/security-vendor-solarwinds-says-product-updates-were-subverted-by-nation-state-fireye-says-exploit-is-rampant\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Security vendor SolarWinds says product updates were subverted by nation-state, Fireye says exploit is rampant","datePublished":"2020-12-14T02:10:47+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/security-vendor-solarwinds-says-product-updates-were-subverted-by-nation-state-fireye-says-exploit-is-rampant\/"},"wordCount":1036,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/security-vendor-solarwinds-says-product-updates-were-subverted-by-nation-state-fireye-says-exploit-is-rampant\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/12\/security-vendor-solarwinds-says-product-updates-were-subverted-by-nation-state-fireye-says-exploit-is-rampant.jpg","articleSection":["The Register"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/security-vendor-solarwinds-says-product-updates-were-subverted-by-nation-state-fireye-says-exploit-is-rampant\/","url":"https:\/\/www.threatshub.org\/blog\/security-vendor-solarwinds-says-product-updates-were-subverted-by-nation-state-fireye-says-exploit-is-rampant\/","name":"Security vendor SolarWinds says product updates were subverted by nation-state, Fireye says exploit is rampant 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/security-vendor-solarwinds-says-product-updates-were-subverted-by-nation-state-fireye-says-exploit-is-rampant\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/security-vendor-solarwinds-says-product-updates-were-subverted-by-nation-state-fireye-says-exploit-is-rampant\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/12\/security-vendor-solarwinds-says-product-updates-were-subverted-by-nation-state-fireye-says-exploit-is-rampant.jpg","datePublished":"2020-12-14T02:10:47+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/security-vendor-solarwinds-says-product-updates-were-subverted-by-nation-state-fireye-says-exploit-is-rampant\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/security-vendor-solarwinds-says-product-updates-were-subverted-by-nation-state-fireye-says-exploit-is-rampant\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/security-vendor-solarwinds-says-product-updates-were-subverted-by-nation-state-fireye-says-exploit-is-rampant\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/12\/security-vendor-solarwinds-says-product-updates-were-subverted-by-nation-state-fireye-says-exploit-is-rampant.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/12\/security-vendor-solarwinds-says-product-updates-were-subverted-by-nation-state-fireye-says-exploit-is-rampant.jpg","width":1200,"height":600},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/security-vendor-solarwinds-says-product-updates-were-subverted-by-nation-state-fireye-says-exploit-is-rampant\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Security vendor SolarWinds says product updates were subverted by nation-state, Fireye says exploit is rampant"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/38681","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=38681"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/38681\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/38682"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=38681"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=38681"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=38681"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}