{"id":38871,"date":"2020-12-24T17:48:13","date_gmt":"2020-12-24T17:48:13","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/31879\/SolarWinds-Hack-Continues-To-Spread-What-You-Need-To-Know.html"},"modified":"2020-12-24T17:48:13","modified_gmt":"2020-12-24T17:48:13","slug":"solarwinds-hack-continues-to-spread-what-you-need-to-know","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/solarwinds-hack-continues-to-spread-what-you-need-to-know\/","title":{"rendered":"SolarWinds Hack Continues To Spread: What You Need To Know"},"content":{"rendered":"<figure class=\"image image-large pull-none hasCaption shortcode\" section=\"shortcodeImage\"><span class=\"imageContainer\"><span><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/cnet2.cbsistatic.com\/img\/JmGTs2gagZ3mbhUUu4cfNR3mF9k=\/1092x0\/2020\/01\/28\/77a89682-009e-478b-92fc-c56d2bb072c8\/eyes-surveillance-security.jpg\" class alt=\"eyes-surveillance-security\" height=\"0\" width=\"1092\"><\/span><\/span><figcaption readability=\"1\"><span class=\"caption\" readability=\"2\"><\/p>\n<p>A Russian hacking campaign has struck multiple federal agencies.<\/p>\n<p><\/span><span class=\"credit\"> Angela Lang\/CNET <\/span><\/figcaption><\/figure>\n<p class=\"speakableTextP1\">A Russian intelligence agency has carried out a <a href=\"https:\/\/www.zdnet.com\/article\/microsoft-fireeye-confirm-solarwinds-supply-chain-attack\/\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">sophisticated malware campaign<\/a>, impacting local, state and federal agencies in the US and private companies including Microsoft, according to the State Department, the <a href=\"https:\/\/www.cisa.gov\/supply-chain-compromise\" rel=\"noopener noreferrer nofollow\" target=\"_blank\" data-component=\"externalLink\">Cybersecurity and Infrastructure Security Agency (CISA)<\/a>&nbsp;and security firms. The massive breach, which reportedly included an&nbsp;<a href=\"https:\/\/www.nytimes.com\/2020\/12\/21\/us\/politics\/russia-hack-treasury.html\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">email system<\/a>&nbsp;used by <span class=\"link\" section=\"shortcodeLink\"><a href=\"https:\/\/www.cnet.com\/news\/treasury-department-leaders-targeted-in-solarwinds-hack-report-says\/\">senior leadership at the Treasury Department<\/a><\/span>, started earlier this year, when hackers compromised IT management software from SolarWinds.&nbsp;<\/p>\n<p class=\"speakableTextP2\">Austin, Texas-based SolarWinds sells software that lets an organization see what&#8217;s happening on its computer networks. Hackers inserted malicious code into an update of that software, which is called Orion. Around <a href=\"https:\/\/www.zdnet.com\/article\/sec-filings-solarwinds-says-18000-customers-are-impacted-by-recent-hack\/\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">18,000 SolarWinds customers installed<\/a> the tainted update onto their systems, the company said. The compromised update has had a sweeping impact, the scale of which keeps growing as new information emerges. <\/p>\n<div class=\"c-reengageNewsletter shortcode hasNewsletter newsletter-subscribe-form desktop e703\" data-component=\"newsletterAndInterest\" data-newsletter-and-interest-options=\"{&quot;id&quot;:&quot;c008d557-f313-11e2-8262-0291187b029a_CNET_TAG&quot;,&quot;name&quot;:&quot;Cisco&quot;,&quot;type&quot;:&quot;specific&quot;,&quot;isBroadInterest&quot;:false,&quot;hasNotifTextHed&quot;:&quot;For more like this&quot;,&quot;hasNotifTextDek&quot;:&quot;Subscribe to the CNET Daily News newsletter, receive notifications and see related stories on CNET.&quot;}\" readability=\"7\">\n<h5 data-reengage-hed=\"null\">Stay in the know<\/h5>\n<p>Get the latest tech stories with CNET Daily News every weekday.<\/p>\n<\/p><\/div>\n<p>On Dec. 19, President Donald Trump floated on Twitter the idea that <a href=\"https:\/\/twitter.com\/realDonaldTrump\/status\/1340333618691002368\" rel=\"noopener noreferrer\" target=\"_blank\" data-component=\"externalLink\">China might be behind the attack<\/a>. Trump, who didn&#8217;t provide evidence to support the suggestion of Chinese involvement, tagged Secretary of State Mike Pompeo, who had earlier said in a radio interview that &#8220;<a href=\"https:\/\/www.marklevinshow.com\/2020\/12\/18\/my-interview-with-secretary-of-state-mike-pompeo\/\" rel=\"noopener noreferrer nofollow\" target=\"_blank\" data-component=\"externalLink\">we can say pretty clearly that it was the Russians that engaged in this activity<\/a>.&#8221;<\/p>\n<p>In a joint statement, US national security agencies have called the breach &#8220;<a href=\"https:\/\/www.cisa.gov\/news\/2020\/12\/16\/joint-statement-federal-bureau-investigation-fbi-cybersecurity-and-infrastructure\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">significant and ongoing<\/a>.&#8221; It&#8217;s still unclear how many agencies are affected or what information hackers might have stolen so far. But by all accounts, the malware is extremely powerful. According to an analysis by Microsoft and security firm FireEye, both of which were <span class=\"link\" section=\"shortcodeLink\"><a href=\"https:\/\/www.cnet.com\/news\/fireeye-hack-cybersecurity-firm-says-nation-state-stole-attacking-tools\/\">infected<\/a><\/span>, the&nbsp;<a href=\"https:\/\/www.reuters.com\/article\/global-cyber-microsoft-idUSL1N2IX33C\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">malware<\/a>&nbsp;gives hackers <a href=\"https:\/\/www.fireeye.com\/blog\/threat-research\/2020\/12\/evasive-attacker-leverages-solarwinds-supply-chain-compromises-with-sunburst-backdoor.html\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">broad reach into impacted systems<\/a>.<\/p>\n<p>Microsoft said it had identified <span class=\"link\" section=\"shortcodeLink\"><a href=\"https:\/\/www.cnet.com\/news\/microsoft-discovers-40-customers-targeted-in-massive-hack-campaign\/\">more than 40 customers<\/a><\/span> that were targeted in the hack. More information is likely to emerge about the hack and its aftermath. Here&#8217;s what you need to know about the&nbsp; hack:<\/p>\n<h2>How did hackers sneak malware into a software update?<br \/><\/h2>\n<p>Hackers managed to access a system that SolarWinds uses to put together updates to its Orion product, the company <a href=\"https:\/\/www.sec.gov\/Archives\/edgar\/data\/0001739942\/000162828020017451\/swi-20201214.htm\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">explained in a Dec. 14 filing<\/a> with the SEC. From there, they inserted malicious code into otherwise legitimate software update. This is known as a <a href=\"https:\/\/www.fireeye.com\/blog\/products-and-services\/2020\/12\/global-intrusion-campaign-leverages-software-supply-chain-compromise.html\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">supply-chain attack<\/a>&nbsp;since it infects software as it&#8217;s under assembly.<\/p>\n<p>It&#8217;s a big coup for hackers to pull off a supply-chain attack because it packages their malware inside a trusted piece of software. Instead of having to trick individual targets into downloading malicious software with a phishing campaign, the hackers could just rely on several government agencies and companies to install the Orion update at SolarWinds&#8217; prompting.&nbsp;<\/p>\n<p>The approach is especially powerful in this case because thousands of companies and government agencies around the world reportedly use the Orion software. With the release of the tainted software update, SolarWinds&#8217; vast customer list became potential hacking targets.<\/p>\n<h2>Which government agencies were infected with the malware?<br \/><\/h2>\n<p>According to reports from <a href=\"https:\/\/www.reuters.com\/article\/us-usa-cyber-amazon-com-exclsuive-idUSKBN28N0PG\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">Reuters<\/a>, <a href=\"https:\/\/www.washingtonpost.com\/national-security\/russian-government-spies-are-behind-a-broad-hacking-campaign-that-has-breached-us-agencies-and-a-top-cyber-firm\/2020\/12\/13\/d5a53b88-3d7d-11eb-9453-fc36ba051781_story.html\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">The Washington Post<\/a> and <a href=\"https:\/\/www.wsj.com\/articles\/agencies-hacked-in-foreign-cyber-espionage-campaign-11607897866\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">The Wall Street Journal<\/a>, the malware affected the US departments of&nbsp;<a href=\"https:\/\/www.reuters.com\/article\/us-global-cyber-usa-dhs-idUSKBN28O2LY\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">Homeland Security<\/a>, <a href=\"https:\/\/www.washingtonpost.com\/national-security\/dhs-is-third-federal-agency-hacked-in-major-russian-cyberespionage-campaign\/2020\/12\/14\/41f8fc98-3e3c-11eb-8bc0-ae155bee4aff_story.html\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">State<\/a>, Commerce and Treasury, as well as the National Institutes of Health. <a href=\"https:\/\/www.politico.com\/news\/2020\/12\/17\/nuclear-agency-hacked-officials-inform-congress-447855\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">Politico reported on Dec. 17<\/a>&nbsp;that nuclear programs run by the US Department of Energy and the National Nuclear Security Administration were also targeted.&nbsp;<\/p>\n<p><a href=\"https:\/\/www.reuters.com\/article\/us-global-cyber-usa\/u-s-cyber-agency-says-solarwinds-hackers-are-impacting-state-local-governments-idUSKBN28Y09L\" rel=\"noopener noreferrer nofollow\" target=\"_blank\" data-component=\"externalLink\">Reuters<\/a>&nbsp;reported on Dec. 23 that CISA has added local and state governments to the list of victims. According to <a href=\"https:\/\/www.cisa.gov\/supply-chain-compromise\" rel=\"noopener noreferrer nofollow\" target=\"_blank\" data-component=\"externalLink\">CISA&#8217;s website<\/a>, the agency is &#8220;tracking a significant cyber incident impacting enterprise networks across federal, state, and local governments, as well as critical infrastructure entities and other private sector organizations.&#8221;<\/p>\n<p>It&#8217;s still unclear what information, if any, was stolen from government agencies, but the amount of access appears to be broad.<\/p>\n<p>Though the <a href=\"https:\/\/www.reuters.com\/article\/us-usa-cyber-breach-doe\/u-s-energy-department-says-cyber-hack-limited-to-business-networks-only-idUSKBN28R3AZ\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">Energy Department<\/a> and the <a href=\"https:\/\/www.nytimes.com\/2020\/12\/13\/us\/politics\/russian-hackers-us-government-treasury-commerce.html\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">Commerce Department<\/a>&nbsp;and <a href=\"https:\/\/twitter.com\/ReutersTech\/status\/1342144201874690049\" rel=\"noopener noreferrer\" target=\"_blank\" data-component=\"externalLink\">Treasury Department<\/a> have acknowledged the hacks, there&#8217;s no official confirmation that other specific federal agencies have been hacked. However, the <a href=\"https:\/\/www.cisa.gov\/\" rel=\"noopener noreferrer nofollow\" target=\"_blank\" data-component=\"externalLink\">Cybersecurity and Infrastructure Security Agency<\/a> put out an advisory urging federal agencies to mitigate the malware, noting that it&#8217;s &#8220;<a href=\"https:\/\/cyber.dhs.gov\/ed\/21-01\/#\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">currently being exploited<\/a> by malicious actors.&#8221; <\/p>\n<p>In a statement on Dec. 17, President-elect Joe Biden said his administration will &#8220;make <a href=\"https:\/\/buildbackbetter.gov\/press-releases\/statement-by-president-elect-joe-biden-on-cybersecurity\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">dealing with this breach<\/a> a top priority from the moment we take office.&#8221;<\/p>\n<h2>Why is the hack a big deal?<br \/><\/h2>\n<p>In addition to gaining access to several government systems, the hackers turned a run-of-the-mill software update into a weapon. That weapon was pointed at thousands of groups, not just the agencies and companies that the hackers focused on after they installed the tainted Orion update. <\/p>\n<p>Microsoft President Brad Smith called this an &#8220;<a href=\"https:\/\/blogs.microsoft.com\/on-the-issues\/2020\/12\/17\/cyberattacks-cybersecurity-solarwinds-fireeye\/\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">act of recklessness<\/a>&#8221; in a wide-ranging blog post on Dec. 17 that explored the ramifications of the hack. He didn&#8217;t directly attribute the hack to Russia, but described its previous alleged hacking campaigns as proof of an increasingly fraught cyber conflict.<\/p>\n<p>&#8220;This is not just an attack on specific targets,&#8221; Smith said, &#8220;but on the trust and reliability of the world&#8217;s critical infrastructure in order to advance one nation&#8217;s intelligence agency.&#8221; He went on to call for international agreements to limit the creation of hacking tools that undermine global cybersecurity.<\/p>\n<p>Former Facebook cybersecurity chief Alex Stamos said Dec. 18 on Twitter that the hack could lead to supply-chain attacks <a href=\"https:\/\/twitter.com\/alexstamos\/status\/1340021070175162368\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">becoming more common<\/a>. However, he <a href=\"https:\/\/twitter.com\/alexstamos\/status\/1340027541860446208\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">questioned whether the hack<\/a> was anything out of the ordinary for a well-resourced intelligence agency. <\/p>\n<p>&#8220;So far, all of the activity that has been publicly discussed has fallen into the boundaries of what the US does regularly,&#8221; Stamos <a href=\"https:\/\/twitter.com\/alexstamos\/status\/1340027541860446208\" rel=\"noopener noreferrer\" target=\"_blank\" data-component=\"externalLink\">tweeted<\/a>. &nbsp;<\/p>\n<h2>Were private companies or other governments hit with the malware?<br \/><\/h2>\n<p>Yes. Microsoft confirmed on Dec. 17 that it found <a href=\"https:\/\/www.zdnet.com\/article\/microsoft-was-also-breached-in-recent-solarwinds-supply-chain-hack-report\/\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">indicators of the malware in its systems<\/a>, after confirming several days earlier that the breach was affecting its customers. A <a href=\"https:\/\/www.reuters.com\/article\/global-cyber-microsoft-idUSL1N2IX33C\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">Reuters report<\/a> also said that Microsoft&#8217;s own systems were used to further the hacking campaign, but Microsoft denied this claim to news agencies. On Dec. 16, the company began <a href=\"https:\/\/www.zdnet.com\/article\/microsoft-to-quarantine-solarwinds-apps-linked-to-recent-hack-starting-tomorrow\/\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">quarantining the versions of Orion<\/a> known to contain the malware, in order to cut hackers off from its customers&#8217; systems. <\/p>\n<p>FireEye also confirmed that it was infected with the malware and was seeing the infection in customer systems as well. <\/p>\n<p>On Dec. 21, The Wall Street Journal said it had <a href=\"https:\/\/www.wsj.com\/articles\/solarwinds-hack-victims-from-tech-companies-to-a-hospital-and-university-11608548402\" rel=\"noopener noreferrer nofollow\" target=\"_blank\" data-component=\"externalLink\">uncovered at least 24 companies<\/a> that had installed the malicious software. These include tech companies Cisco, Intel, Nvidia, VMware and Belkin, according to the Journal. The hackers also reportedly had access to the California Department of State Hospitals and Kent State University.<\/p>\n<p>It&#8217;s unclear which of SolarWinds&#8217; other private sector customers saw malware infections. The&nbsp;<a href=\"https:\/\/web.archive.org\/web\/20201214065921\/https:\/\/www.solarwinds.com\/company\/customers\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">company&#8217;s customer list<\/a> includes large corporations, such as AT&amp;T, Procter &amp; Gamble and McDonald&#8217;s. The company also counts governments and private companies around the world as customers. FireEye says many of those customers were infected.<\/p>\n<h2>What do we know about Russian involvement in the hack?<br \/><\/h2>\n<p>On Dec. 18, Pompeo attributed the hack to Russia. That came after news outlets reported throughout the week that government officials said a hacking group believed to be a Russian intelligence agency is responsible for the malware campaign. SolarWinds and cybersecurity firms have attributed the hack to &#8220;nation-state actors&#8221; but haven&#8217;t named a country directly.<\/p>\n<p>In a Dec. 13&nbsp;<a href=\"https:\/\/www.facebook.com\/RusEmbUSA\/posts\/1488755328001519\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">statement on Facebook<\/a>, the Russian embassy in the US denied responsibility for the SolarWinds hacking campaign. &#8220;Malicious activities in the information space contradict the principles of the Russian foreign policy, national interests and our understanding of interstate relations,&#8221; the embassy said, adding, &#8220;Russia does not conduct offensive operations in the cyber domain.&#8221;<\/p>\n<p>Nicknamed APT29 or CozyBear, the hacking group pointed to by news reports has previously been blamed for targeting email systems at the State Department and White House during the administration of President Barack Obama. It was also named by US intelligence agencies as one of the groups that <span class=\"link\" section=\"shortcodeLink\"><a href=\"https:\/\/www.cnet.com\/news\/dnc-says-russian-hackers-hit-it-with-phishing-effort-after-midterms\/\">infiltrated the email systems<\/a><\/span>&nbsp;of the <span class=\"link\" section=\"shortcodeLink\"><a href=\"https:\/\/www.cnet.com\/news\/how-experts-decided-russia-hacked-dnc-election\/\">Democratic National Committee in 2015<\/a><\/span>, but the leaking of those emails isn&#8217;t attributed to CozyBear. (Another Russian agency was blamed for that.)<\/p>\n<p>More recently, the US, UK and Canada have identified the group as responsible for hacking efforts that tried to access <span class=\"link\" section=\"shortcodeLink\"><a href=\"https:\/\/www.cnet.com\/news\/russian-hackers-allegedly-behind-cyberattacks-to-steal-covid-19-vaccine\/\">information about COVID-19 vaccine research<\/a><\/span>.<\/p>\n<p><strong>Correction, Dec. 23<\/strong>: This story has been updated to clarify that SolarWinds makes IT management software. An earlier version of the story misstated the purpose of its products.<\/p>\n<p> READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/31879\/SolarWinds-Hack-Continues-To-Spread-What-You-Need-To-Know.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":38872,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[277],"tags":[9118],"class_list":["post-38871","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-blogs","tag-headlinehackermalwarerussiadata-lossflawbackdoor"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>SolarWinds Hack Continues To Spread: What You Need To Know 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/solarwinds-hack-continues-to-spread-what-you-need-to-know\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"SolarWinds Hack Continues To Spread: What You Need To Know 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/solarwinds-hack-continues-to-spread-what-you-need-to-know\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2020-12-24T17:48:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/12\/solarwinds-hack-continues-to-spread-what-you-need-to-know.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1092\" \/>\n\t<meta property=\"og:image:height\" content=\"728\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/solarwinds-hack-continues-to-spread-what-you-need-to-know\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/solarwinds-hack-continues-to-spread-what-you-need-to-know\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"SolarWinds Hack Continues To Spread: What You Need To Know\",\"datePublished\":\"2020-12-24T17:48:13+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/solarwinds-hack-continues-to-spread-what-you-need-to-know\\\/\"},\"wordCount\":1401,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/solarwinds-hack-continues-to-spread-what-you-need-to-know\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/12\\\/solarwinds-hack-continues-to-spread-what-you-need-to-know.jpg\",\"keywords\":[\"headline,hacker,malware,russia,data loss,flaw,backdoor\"],\"articleSection\":[\"CyberSecurity Blogs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/solarwinds-hack-continues-to-spread-what-you-need-to-know\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/solarwinds-hack-continues-to-spread-what-you-need-to-know\\\/\",\"name\":\"SolarWinds Hack Continues To Spread: What You Need To Know 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/solarwinds-hack-continues-to-spread-what-you-need-to-know\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/solarwinds-hack-continues-to-spread-what-you-need-to-know\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/12\\\/solarwinds-hack-continues-to-spread-what-you-need-to-know.jpg\",\"datePublished\":\"2020-12-24T17:48:13+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/solarwinds-hack-continues-to-spread-what-you-need-to-know\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/solarwinds-hack-continues-to-spread-what-you-need-to-know\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/solarwinds-hack-continues-to-spread-what-you-need-to-know\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/12\\\/solarwinds-hack-continues-to-spread-what-you-need-to-know.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/12\\\/solarwinds-hack-continues-to-spread-what-you-need-to-know.jpg\",\"width\":1092,\"height\":728},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/solarwinds-hack-continues-to-spread-what-you-need-to-know\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,hacker,malware,russia,data loss,flaw,backdoor\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlinehackermalwarerussiadata-lossflawbackdoor\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"SolarWinds Hack Continues To Spread: What You Need To Know\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"SolarWinds Hack Continues To Spread: What You Need To Know 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/solarwinds-hack-continues-to-spread-what-you-need-to-know\/","og_locale":"en_US","og_type":"article","og_title":"SolarWinds Hack Continues To Spread: What You Need To Know 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/solarwinds-hack-continues-to-spread-what-you-need-to-know\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2020-12-24T17:48:13+00:00","og_image":[{"width":1092,"height":728,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/12\/solarwinds-hack-continues-to-spread-what-you-need-to-know.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/solarwinds-hack-continues-to-spread-what-you-need-to-know\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/solarwinds-hack-continues-to-spread-what-you-need-to-know\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"SolarWinds Hack Continues To Spread: What You Need To Know","datePublished":"2020-12-24T17:48:13+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/solarwinds-hack-continues-to-spread-what-you-need-to-know\/"},"wordCount":1401,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/solarwinds-hack-continues-to-spread-what-you-need-to-know\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/12\/solarwinds-hack-continues-to-spread-what-you-need-to-know.jpg","keywords":["headline,hacker,malware,russia,data loss,flaw,backdoor"],"articleSection":["CyberSecurity Blogs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/solarwinds-hack-continues-to-spread-what-you-need-to-know\/","url":"https:\/\/www.threatshub.org\/blog\/solarwinds-hack-continues-to-spread-what-you-need-to-know\/","name":"SolarWinds Hack Continues To Spread: What You Need To Know 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/solarwinds-hack-continues-to-spread-what-you-need-to-know\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/solarwinds-hack-continues-to-spread-what-you-need-to-know\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/12\/solarwinds-hack-continues-to-spread-what-you-need-to-know.jpg","datePublished":"2020-12-24T17:48:13+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/solarwinds-hack-continues-to-spread-what-you-need-to-know\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/solarwinds-hack-continues-to-spread-what-you-need-to-know\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/solarwinds-hack-continues-to-spread-what-you-need-to-know\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/12\/solarwinds-hack-continues-to-spread-what-you-need-to-know.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/12\/solarwinds-hack-continues-to-spread-what-you-need-to-know.jpg","width":1092,"height":728},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/solarwinds-hack-continues-to-spread-what-you-need-to-know\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,hacker,malware,russia,data loss,flaw,backdoor","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinehackermalwarerussiadata-lossflawbackdoor\/"},{"@type":"ListItem","position":3,"name":"SolarWinds Hack Continues To Spread: What You Need To Know"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/38871","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=38871"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/38871\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/38872"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=38871"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=38871"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=38871"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}