{"id":38828,"date":"2020-12-21T13:30:07","date_gmt":"2020-12-21T13:30:07","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/solarwinds-releases-known-attack-timeline-new-data-suggests-hackers-may-have-done-a-dummy-run-last-year\/"},"modified":"2020-12-21T13:30:07","modified_gmt":"2020-12-21T13:30:07","slug":"solarwinds-releases-known-attack-timeline-new-data-suggests-hackers-may-have-done-a-dummy-run-last-year","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/solarwinds-releases-known-attack-timeline-new-data-suggests-hackers-may-have-done-a-dummy-run-last-year\/","title":{"rendered":"SolarWinds releases known attack timeline, new data suggests hackers may have done a dummy run last year"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/regmedia.co.uk\/2020\/12\/19\/windmill.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p><span data-label=\"in brief\">In brief<\/span> In an 8-K filing to the US Securities and Exchange Commission, SolarWinds has given more details on exactly how it learned its servers were spewing out malware.<\/p>\n<p>The notice [<a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/d18rn0p25nwr6d.cloudfront.net\/CIK-0001739942\/6dd04fe2-7d10-4632-89f1-eb8f932f6e94.pdf\">PDF<\/a>] says that FireEye notified the network management biz&#8217;s CEO (who had only been <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/investors.solarwinds.com\/news\/news-details\/2020\/SolarWinds-Appoints-Sudhakar-Ramakrishna-as-New-President-and-Chief-Executive-Officer\/default.aspx\">on the job<\/a> for three days) of a serious security issue on 12 December. But by then the SUNBURST malware had already spread to around 18,000 customers.<\/p>\n<p>&#8220;The vulnerability has only been identified in updates to the Orion Platform products delivered between March and June 2020, but our investigations are still ongoing,&#8221; the filing said.<\/p>\n<p>&#8220;Also, while we are still investigating our non-Orion products, to date we have not seen evidence that they are impacted by SUNBURST. The vulnerability was not evident in the Orion Platform products&#8217; source code but appears to have been inserted during the Orion software build process.&#8221;<\/p>\n<p>The 12 December date could be very important to SolarWinds&#8217; two largest shareholders. On 7 December Silver Lake and Thoma Bravo sold <a target=\"_blank\" href=\"https:\/\/www.theregister.com\/2020\/12\/16\/solarwinds_stock_sale\/\" rel=\"noopener noreferrer\">$286m worth<\/a> of shares in the company. Those shares are now worth around 20 per cent less now than they were then, and an SEC inquiry has been mulled.<\/p>\n<p>But a new <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/news.yahoo.com\/hackers-last-year-conducted-a-dry-run-of-solar-winds-breach-215232815.html\">report<\/a> on Friday suggested that the attackers may have had access to SolarWinds&#8217; system back in October 2019. Sources familiar with the matter said the hackers injected non-malicious files into SolarWinds&#8217; systems, possibly as a dummy run to see if the intrusion would be detected.<\/p>\n<h3 class=\"crosshead\"> <span>Bad winds blocked, for now<\/span><br \/>\n<\/h3>\n<p>Security shop FireEye, as well as other sources, have confirmed that the main malware controller being used in the SolarWinds attack has been killed off this week.<\/p>\n<p>Hackers unknown, believed to be state-sponsored, have been romping through some 18,000 of SolarsWinds&#8217; Origin customer servers using malware installed via an update server. FireEye, Microsoft and GoDaddy believe the avsvmcloud domain has been used to coordinate attacks and it&#8217;s now under Redmond&#8217;s control.<\/p>\n<p>&#8220;Sunburst is the malware that was distributed through SolarWinds software. As part of FireEye&#8217;s analysis of Sunburst, we identified a killswitch that would prevent Sunburst from continuing to operate,&#8221; the company told <i>The Reg<\/i>.<\/p>\n<p>&#8220;Depending on the IP address returned when the malware resolves avsvmcloud[.]com, under certain conditions, the malware would terminate itself and prevent further execution. FireEye collaborated with GoDaddy and Microsoft to deactivate Sunburst infections.&#8221;<\/p>\n<p>FireEye said that the loss of the avsvmcloud domain will stop infected systems from communicating but that it isn&#8217;t a silver bullet. The team behind this hack has proved adept at installing secondary or tertiary backdoors after gaining initial access.<\/p>\n<h3 class=\"crosshead\"> <span>Mobile hackers crack Channel Island telco<\/span><br \/>\n<\/h3>\n<p>Rayzone Group, an Israeli private investigations firm, has been accused of infiltrating a small UK telco.<\/p>\n<p>Sure Guernsey, a mobile operator in the Channel Islands, leased an access point to its network to a third party, who, it is claimed, then let Rayzone use it. Thanks to <a target=\"_blank\" href=\"https:\/\/www.theregister.com\/2017\/05\/03\/hackers_fire_up_ss7_flaw\/\" rel=\"noopener noreferrer\">long-standing<\/a> flaws in the Signaling System 7 protocol used by network operators, this could have been used to track almost any handset in the world, intercept messages, and defeat two-factor authentication.<\/p>\n<p>&#8220;Sure does not lease access to global titles directly or knowingly to organisations for the purposes of locating and tracking individuals or for intercepting communications content,&#8221; the telco <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/www.theguardian.com\/world\/2020\/dec\/16\/israeli-spy-firm-suspected-accessing-global-telecoms-channel-islands\">told<\/a> <i>The Guardian<\/i>, adding that it has since terminated the access point and is monitoring its network for suspicious behavior.<\/p>\n<h3 class=\"crosshead\"> <span>Chrome and Edge extensions infect three million<\/span><br \/>\n<\/h3>\n<p>Czech security shop Avast issued a <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/press.avast.com\/third-party-browser-extensions-from-instagram-facebook-vimeo-and-others-infected-with-malware\">warning<\/a> that up to three million Chrome and Edge users could have been infected with malware hidden in browser extensions.<\/p>\n<p>The dodgy Javascript-based extensions include Video Downloader for Facebook, Vimeo Video Downloader, Instagram Story Downloader, and VK Unblock for Chrome and some unnamed Edge versions. Once installed they redirect advertising and harvest some personal data, including email addresses, app login details, active devices per account and IP address data.<\/p>\n<p>&#8220;Our hypothesis is that either the extensions were deliberately created with the malware built in, or the author waited for the extensions to become popular, and then pushed an update containing the malware,&#8221; said Jan Rub\u00edn, malware researcher at Avast.<\/p>\n<p>The malware is also cunning in that it shuts down its activities if it suspects the user might have noticed something, for example if they search for one of the domain names the code uses or start checking information on the extension itself.<\/p>\n<p>The extensions are still live at the moment but Google and Microsoft said they are investigating.<\/p>\n<h3 class=\"crosshead\"> <span>China accused of hacking African Union with secret servers<\/span><br \/>\n<\/h3>\n<p>A report from the African Union <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/www.reuters.com\/article\/ethiopia-african-union-cyber\/exclusive-suspected-chinese-hackers-stole-camera-footage-from-african-union-memo-idUKL1N2GS2BM\">seen<\/a> by Reuters suggested that a Chinese hacking group dubbed &#8220;Bronze President&#8221; set up a server farm to siphon off camera footage from the AU&#8217;s last annual summit of the continent&#8217;s leaders.<\/p>\n<p>After getting a tipoff from Japan&#8217;s Computer Emergency Response Team, the AU&#8217;s staff found a cluster of servers hidden in the basement of a building on the AU&#8217;s Addis Ababa campus that were forwarding footage from meeting rooms and offices \u2013 &#8220;a huge volume of traffic&#8221;. It hid the outgoing data in normal network activity, even to the extent of slowing the flow during lunch hours.<\/p>\n<p>The claims are similar to those made by <a target=\"_blank\" href=\"https:\/\/www.lemonde.fr\/afrique\/article\/2018\/01\/26\/a-addis-abeba-le-siege-de-l-union-africaine-espionne-par-les-chinois_5247521_3212.html\" rel=\"noopener noreferrer\">Le Monde in 2018<\/a>. In that instance, servers were allegedly found in the AU&#8217;s new Chinese-built conference center that were sending home copies of server activity every night. The building was also claimed to be riddled with listening devices.<\/p>\n<p>&#8220;We never interfere in Africa&#8217;s internal affairs and wouldn&#8217;t do anything that harms the interests of the African side,&#8221; the Chinese mission to the AU said in a statement. \u00ae<\/p>\n<p> READ MORE <a href=\"https:\/\/go.theregister.com\/feed\/www.theregister.com\/2020\/12\/21\/in_brief_security\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>And SS7 telco hack rears its ugly head yet again In brief\u00a0 In an 8-K filing to the US Securities and Exchange Commission, SolarWinds has given more details on exactly how it learned its servers were spewing out malware.\u2026 READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":38829,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[63],"tags":[],"class_list":["post-38828","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-the-register"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>SolarWinds releases known attack timeline, new data suggests hackers may have done a dummy run last year 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/solarwinds-releases-known-attack-timeline-new-data-suggests-hackers-may-have-done-a-dummy-run-last-year\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"SolarWinds releases known attack timeline, new data suggests hackers may have done a dummy run last year 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/solarwinds-releases-known-attack-timeline-new-data-suggests-hackers-may-have-done-a-dummy-run-last-year\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2020-12-21T13:30:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/12\/solarwinds-releases-known-attack-timeline-new-data-suggests-hackers-may-have-done-a-dummy-run-last-year.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"504\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/solarwinds-releases-known-attack-timeline-new-data-suggests-hackers-may-have-done-a-dummy-run-last-year\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/solarwinds-releases-known-attack-timeline-new-data-suggests-hackers-may-have-done-a-dummy-run-last-year\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"SolarWinds releases known attack timeline, new data suggests hackers may have done a dummy run last year\",\"datePublished\":\"2020-12-21T13:30:07+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/solarwinds-releases-known-attack-timeline-new-data-suggests-hackers-may-have-done-a-dummy-run-last-year\\\/\"},\"wordCount\":954,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/solarwinds-releases-known-attack-timeline-new-data-suggests-hackers-may-have-done-a-dummy-run-last-year\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/12\\\/solarwinds-releases-known-attack-timeline-new-data-suggests-hackers-may-have-done-a-dummy-run-last-year.jpg\",\"articleSection\":[\"The Register\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/solarwinds-releases-known-attack-timeline-new-data-suggests-hackers-may-have-done-a-dummy-run-last-year\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/solarwinds-releases-known-attack-timeline-new-data-suggests-hackers-may-have-done-a-dummy-run-last-year\\\/\",\"name\":\"SolarWinds releases known attack timeline, new data suggests hackers may have done a dummy run last year 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/solarwinds-releases-known-attack-timeline-new-data-suggests-hackers-may-have-done-a-dummy-run-last-year\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/solarwinds-releases-known-attack-timeline-new-data-suggests-hackers-may-have-done-a-dummy-run-last-year\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/12\\\/solarwinds-releases-known-attack-timeline-new-data-suggests-hackers-may-have-done-a-dummy-run-last-year.jpg\",\"datePublished\":\"2020-12-21T13:30:07+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/solarwinds-releases-known-attack-timeline-new-data-suggests-hackers-may-have-done-a-dummy-run-last-year\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/solarwinds-releases-known-attack-timeline-new-data-suggests-hackers-may-have-done-a-dummy-run-last-year\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/solarwinds-releases-known-attack-timeline-new-data-suggests-hackers-may-have-done-a-dummy-run-last-year\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/12\\\/solarwinds-releases-known-attack-timeline-new-data-suggests-hackers-may-have-done-a-dummy-run-last-year.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/12\\\/solarwinds-releases-known-attack-timeline-new-data-suggests-hackers-may-have-done-a-dummy-run-last-year.jpg\",\"width\":1000,\"height\":504},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/solarwinds-releases-known-attack-timeline-new-data-suggests-hackers-may-have-done-a-dummy-run-last-year\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"SolarWinds releases known attack timeline, new data suggests hackers may have done a dummy run last year\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"SolarWinds releases known attack timeline, new data suggests hackers may have done a dummy run last year 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/solarwinds-releases-known-attack-timeline-new-data-suggests-hackers-may-have-done-a-dummy-run-last-year\/","og_locale":"en_US","og_type":"article","og_title":"SolarWinds releases known attack timeline, new data suggests hackers may have done a dummy run last year 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/solarwinds-releases-known-attack-timeline-new-data-suggests-hackers-may-have-done-a-dummy-run-last-year\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2020-12-21T13:30:07+00:00","og_image":[{"width":1000,"height":504,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/12\/solarwinds-releases-known-attack-timeline-new-data-suggests-hackers-may-have-done-a-dummy-run-last-year.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/solarwinds-releases-known-attack-timeline-new-data-suggests-hackers-may-have-done-a-dummy-run-last-year\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/solarwinds-releases-known-attack-timeline-new-data-suggests-hackers-may-have-done-a-dummy-run-last-year\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"SolarWinds releases known attack timeline, new data suggests hackers may have done a dummy run last year","datePublished":"2020-12-21T13:30:07+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/solarwinds-releases-known-attack-timeline-new-data-suggests-hackers-may-have-done-a-dummy-run-last-year\/"},"wordCount":954,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/solarwinds-releases-known-attack-timeline-new-data-suggests-hackers-may-have-done-a-dummy-run-last-year\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/12\/solarwinds-releases-known-attack-timeline-new-data-suggests-hackers-may-have-done-a-dummy-run-last-year.jpg","articleSection":["The Register"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/solarwinds-releases-known-attack-timeline-new-data-suggests-hackers-may-have-done-a-dummy-run-last-year\/","url":"https:\/\/www.threatshub.org\/blog\/solarwinds-releases-known-attack-timeline-new-data-suggests-hackers-may-have-done-a-dummy-run-last-year\/","name":"SolarWinds releases known attack timeline, new data suggests hackers may have done a dummy run last year 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/solarwinds-releases-known-attack-timeline-new-data-suggests-hackers-may-have-done-a-dummy-run-last-year\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/solarwinds-releases-known-attack-timeline-new-data-suggests-hackers-may-have-done-a-dummy-run-last-year\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/12\/solarwinds-releases-known-attack-timeline-new-data-suggests-hackers-may-have-done-a-dummy-run-last-year.jpg","datePublished":"2020-12-21T13:30:07+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/solarwinds-releases-known-attack-timeline-new-data-suggests-hackers-may-have-done-a-dummy-run-last-year\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/solarwinds-releases-known-attack-timeline-new-data-suggests-hackers-may-have-done-a-dummy-run-last-year\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/solarwinds-releases-known-attack-timeline-new-data-suggests-hackers-may-have-done-a-dummy-run-last-year\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/12\/solarwinds-releases-known-attack-timeline-new-data-suggests-hackers-may-have-done-a-dummy-run-last-year.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/12\/solarwinds-releases-known-attack-timeline-new-data-suggests-hackers-may-have-done-a-dummy-run-last-year.jpg","width":1000,"height":504},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/solarwinds-releases-known-attack-timeline-new-data-suggests-hackers-may-have-done-a-dummy-run-last-year\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"SolarWinds releases known attack timeline, new data suggests hackers may have done a dummy run last year"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/38828","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=38828"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/38828\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/38829"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=38828"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=38828"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=38828"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}