{"id":38861,"date":"2020-12-21T09:30:36","date_gmt":"2020-12-21T09:30:36","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/well-on-the-bright-side-the-solarwinds-sunburst-attack-will-spur-the-cybersecurity-field-to-evolve-all-over-again\/"},"modified":"2020-12-21T09:30:36","modified_gmt":"2020-12-21T09:30:36","slug":"well-on-the-bright-side-the-solarwinds-sunburst-attack-will-spur-the-cybersecurity-field-to-evolve-all-over-again","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/well-on-the-bright-side-the-solarwinds-sunburst-attack-will-spur-the-cybersecurity-field-to-evolve-all-over-again\/","title":{"rendered":"Well, on the bright side, the SolarWinds Sunburst attack will spur the cybersecurity field to evolve all over again"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/regmedia.co.uk\/2017\/02\/06\/solar_storm_shutterstock.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p><span data-label=\"column\">Column<\/span> One of the great threats to our civilization is space weather. Specifically, the Sun&#8217;s proven ability to target the planet with a tremendous cosmic belch of radiation, knocking out satellites, power grids, and networks worldwide.<\/p>\n<p>In that context, SolarWinds&#8217; choice of company name seems gruesomely apt. We still don&#8217;t know the full harm done by <a target=\"_blank\" href=\"https:\/\/www.theregister.com\/2020\/12\/18\/solarwinds_nnsa_microsoft_cisa\/\" rel=\"noopener noreferrer\">Sunburst<\/a>, the splendidly evil hack of its Orion network monitoring platform, but it was global in scope, deep in reach, and hit only the highest-value assets. For months, the internal networks of government, military, and agency were compromised.<\/p>\n<p>From the quality of the threat design, the range of techniques used, and the nature of its victims, this was a nation state at work and in MO and capabilities most likely Russia. It revealed a very good knowledge of not only the fabric of modern IT infrastructure, but the psychology of those who develop for and maintain it. Beautifully obfuscated, delicate in its use of steganography and layers of diversion. Sunburst will trigger another round in the arms race between hackers and opsec researchers.<\/p>\n<p>Perhaps the most chilling aspect of the attack was how it propagated itself by installing itself as part of SolarWinds&#8217; standard distribution and update system. This is a very old trick \u2013 anecdotally, mainframes in the 1960s were compromised by carefully faked system patch tapes sent to companies by mail \u2013 but of course rendered much more powerful by the automation and patch-quickly culture of today&#8217;s IT.<\/p>\n<p>At the time of writing, it&#8217;s not clear whether the compromised .dll at the heart of the hack was built on SolarWinds&#8217; own servers using the company&#8217;s own source, or whether a trojanised version was somehow signed and uploaded. As with so many complex infrastructure compromises, it doesn&#8217;t really matter and knowing the answer won&#8217;t do much to help understand the scope of the attack or the damage done. It does highlight, however, the central problem of trust.<\/p>\n<p>There is no defence customers can deploy against a compromised vendor or supply chain that delivers what looks like legitimate code or services. Checksums and hashes only work if the reference isn&#8217;t despoiled; signed code is merely a special case of that concept of a chain of trust. Open source is more resilient in proportion to the size and interest of its community, but by no means immune.<\/p>\n<p>Supply-chain attacks are insanely tempting to bad actors because they act like tapeworms, endoparasites that survive in their hosts because they can deactivate parts of the immune system. The downside to the worm is that if you knock out that part of their defences, which you can with a single dose of the right medicine, they have no further defences. Is there a one-dose pill for supply-chain attacks?<\/p>\n<p>It is possible to create arbitrarily complex internal checks that what you&#8217;re shipping to your customers is what you think it is. CI\/CD pipelines with their devoperatic test suites don&#8217;t in general retest code once it&#8217;s built, certified, and deployed, and their automation and high volume of updates pushed live create a high bandwidth channel to the customer base that is hard to monitor for subversion. Efficiency becomes a weapon in the hands of an enemy.<\/p>\n<p>But a parallel pipeline that rebuilds everything continually and checks against the live files, with significant isolation from the production network and a second-pair-of-eyeballs policy for checking files in, could be made quite resilient to external attack. Not immune, but the idea is to build not just strong checks but ones that are themselves strongly defended. It&#8217;s parallel so it won&#8217;t impact on CI\/CD efficiency, automated so the configuration can easily track the live system, and the whole thing not ridiculously resource-hungry.<\/p>\n<p>Is that approach proportionate? Is it itself robust against attack? Would it catch the sort of mishap \u2013 SolarWinds build system FTP credentials being published in a repo \u2013 that may have led to Sunburst being opportunistically created? Does a company where that happens have bigger problems? Supply your own answers.<\/p>\n<p>There&#8217;s little doubt, though, that the growth of automated, continual, distribution and patch systems bring up security problems of their own that in today&#8217;s very dynamic, adversarial infosec environment need to be considered afresh. Not just in how to fight the last war, but in designing for resilience from the outset. How to model the chain of trust and verification, internal to the vendor and in their complete customer community. How to balance the move towards frictionless continuous deployment with security that itself is continuous and frictionless. How to build security that isn&#8217;t just layered and deep, but redundant and self-checking.<\/p>\n<p>At every stage in our evolution as a data-driven culture, we&#8217;ve had to evolve new security ideas \u2013 and usually, because we&#8217;re like that, after some disaster. The best aspect of Sunburst, which will become apparent over time, is that it is a highly evolved real disaster of substantial impact. Those of us on the side of the angels have to take this chance to evolve ourselves. \u00ae<\/p>\n<p> READ MORE <a href=\"https:\/\/go.theregister.com\/feed\/www.theregister.com\/2020\/12\/21\/solarwinds_sunburst_evolve\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>We have to be smarter than the baddies and expect the unexpected Column\u00a0 One of the great threats to our civilization is space weather. Specifically, the Sun&#8217;s proven ability to target the planet with a tremendous cosmic belch of radiation, knocking out satellites, power grids, and networks worldwide.\u2026  READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":38862,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[63],"tags":[],"class_list":["post-38861","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-the-register"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Well, on the bright side, the SolarWinds Sunburst attack will spur the cybersecurity field to evolve all over again 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/well-on-the-bright-side-the-solarwinds-sunburst-attack-will-spur-the-cybersecurity-field-to-evolve-all-over-again\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Well, on the bright side, the SolarWinds Sunburst attack will spur the cybersecurity field to evolve all over again 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/well-on-the-bright-side-the-solarwinds-sunburst-attack-will-spur-the-cybersecurity-field-to-evolve-all-over-again\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2020-12-21T09:30:36+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/12\/well-on-the-bright-side-the-solarwinds-sunburst-attack-will-spur-the-cybersecurity-field-to-evolve-all-over-again.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"648\" \/>\n\t<meta property=\"og:image:height\" content=\"439\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/well-on-the-bright-side-the-solarwinds-sunburst-attack-will-spur-the-cybersecurity-field-to-evolve-all-over-again\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/well-on-the-bright-side-the-solarwinds-sunburst-attack-will-spur-the-cybersecurity-field-to-evolve-all-over-again\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Well, on the bright side, the SolarWinds Sunburst attack will spur the cybersecurity field to evolve all over again\",\"datePublished\":\"2020-12-21T09:30:36+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/well-on-the-bright-side-the-solarwinds-sunburst-attack-will-spur-the-cybersecurity-field-to-evolve-all-over-again\\\/\"},\"wordCount\":874,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/well-on-the-bright-side-the-solarwinds-sunburst-attack-will-spur-the-cybersecurity-field-to-evolve-all-over-again\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/12\\\/well-on-the-bright-side-the-solarwinds-sunburst-attack-will-spur-the-cybersecurity-field-to-evolve-all-over-again.jpg\",\"articleSection\":[\"The Register\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/well-on-the-bright-side-the-solarwinds-sunburst-attack-will-spur-the-cybersecurity-field-to-evolve-all-over-again\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/well-on-the-bright-side-the-solarwinds-sunburst-attack-will-spur-the-cybersecurity-field-to-evolve-all-over-again\\\/\",\"name\":\"Well, on the bright side, the SolarWinds Sunburst attack will spur the cybersecurity field to evolve all over again 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/well-on-the-bright-side-the-solarwinds-sunburst-attack-will-spur-the-cybersecurity-field-to-evolve-all-over-again\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/well-on-the-bright-side-the-solarwinds-sunburst-attack-will-spur-the-cybersecurity-field-to-evolve-all-over-again\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/12\\\/well-on-the-bright-side-the-solarwinds-sunburst-attack-will-spur-the-cybersecurity-field-to-evolve-all-over-again.jpg\",\"datePublished\":\"2020-12-21T09:30:36+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/well-on-the-bright-side-the-solarwinds-sunburst-attack-will-spur-the-cybersecurity-field-to-evolve-all-over-again\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/well-on-the-bright-side-the-solarwinds-sunburst-attack-will-spur-the-cybersecurity-field-to-evolve-all-over-again\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/well-on-the-bright-side-the-solarwinds-sunburst-attack-will-spur-the-cybersecurity-field-to-evolve-all-over-again\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/12\\\/well-on-the-bright-side-the-solarwinds-sunburst-attack-will-spur-the-cybersecurity-field-to-evolve-all-over-again.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/12\\\/well-on-the-bright-side-the-solarwinds-sunburst-attack-will-spur-the-cybersecurity-field-to-evolve-all-over-again.jpg\",\"width\":648,\"height\":439},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/well-on-the-bright-side-the-solarwinds-sunburst-attack-will-spur-the-cybersecurity-field-to-evolve-all-over-again\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Well, on the bright side, the SolarWinds Sunburst attack will spur the cybersecurity field to evolve all over again\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Well, on the bright side, the SolarWinds Sunburst attack will spur the cybersecurity field to evolve all over again 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/well-on-the-bright-side-the-solarwinds-sunburst-attack-will-spur-the-cybersecurity-field-to-evolve-all-over-again\/","og_locale":"en_US","og_type":"article","og_title":"Well, on the bright side, the SolarWinds Sunburst attack will spur the cybersecurity field to evolve all over again 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/well-on-the-bright-side-the-solarwinds-sunburst-attack-will-spur-the-cybersecurity-field-to-evolve-all-over-again\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2020-12-21T09:30:36+00:00","og_image":[{"width":648,"height":439,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/12\/well-on-the-bright-side-the-solarwinds-sunburst-attack-will-spur-the-cybersecurity-field-to-evolve-all-over-again.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/well-on-the-bright-side-the-solarwinds-sunburst-attack-will-spur-the-cybersecurity-field-to-evolve-all-over-again\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/well-on-the-bright-side-the-solarwinds-sunburst-attack-will-spur-the-cybersecurity-field-to-evolve-all-over-again\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Well, on the bright side, the SolarWinds Sunburst attack will spur the cybersecurity field to evolve all over again","datePublished":"2020-12-21T09:30:36+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/well-on-the-bright-side-the-solarwinds-sunburst-attack-will-spur-the-cybersecurity-field-to-evolve-all-over-again\/"},"wordCount":874,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/well-on-the-bright-side-the-solarwinds-sunburst-attack-will-spur-the-cybersecurity-field-to-evolve-all-over-again\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/12\/well-on-the-bright-side-the-solarwinds-sunburst-attack-will-spur-the-cybersecurity-field-to-evolve-all-over-again.jpg","articleSection":["The Register"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/well-on-the-bright-side-the-solarwinds-sunburst-attack-will-spur-the-cybersecurity-field-to-evolve-all-over-again\/","url":"https:\/\/www.threatshub.org\/blog\/well-on-the-bright-side-the-solarwinds-sunburst-attack-will-spur-the-cybersecurity-field-to-evolve-all-over-again\/","name":"Well, on the bright side, the SolarWinds Sunburst attack will spur the cybersecurity field to evolve all over again 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/well-on-the-bright-side-the-solarwinds-sunburst-attack-will-spur-the-cybersecurity-field-to-evolve-all-over-again\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/well-on-the-bright-side-the-solarwinds-sunburst-attack-will-spur-the-cybersecurity-field-to-evolve-all-over-again\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/12\/well-on-the-bright-side-the-solarwinds-sunburst-attack-will-spur-the-cybersecurity-field-to-evolve-all-over-again.jpg","datePublished":"2020-12-21T09:30:36+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/well-on-the-bright-side-the-solarwinds-sunburst-attack-will-spur-the-cybersecurity-field-to-evolve-all-over-again\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/well-on-the-bright-side-the-solarwinds-sunburst-attack-will-spur-the-cybersecurity-field-to-evolve-all-over-again\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/well-on-the-bright-side-the-solarwinds-sunburst-attack-will-spur-the-cybersecurity-field-to-evolve-all-over-again\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/12\/well-on-the-bright-side-the-solarwinds-sunburst-attack-will-spur-the-cybersecurity-field-to-evolve-all-over-again.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/12\/well-on-the-bright-side-the-solarwinds-sunburst-attack-will-spur-the-cybersecurity-field-to-evolve-all-over-again.jpg","width":648,"height":439},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/well-on-the-bright-side-the-solarwinds-sunburst-attack-will-spur-the-cybersecurity-field-to-evolve-all-over-again\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Well, on the bright side, the SolarWinds Sunburst attack will spur the cybersecurity field to evolve all over again"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/38861","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=38861"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/38861\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/38862"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=38861"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=38861"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=38861"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}