<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Solarwinds supply chain attack -  still a good idea to whitelist thirdparty applications at AV? in Threats</title>
    <link>https://community.isc2.org/t5/Threats/Solarwinds-supply-chain-attack-still-a-good-idea-to-whitelist/m-p/41780#M172</link>
    <description>Definitely an important question. Whitelisting should be done carefully,&lt;BR /&gt;particularly with applications which require pervasive permissions, and, in this&lt;BR /&gt;case, it still would have been extemely difficult to detect the attack, since it was&lt;BR /&gt;properly signed and authenticated.&lt;BR /&gt;&lt;BR /&gt;====================== (quote inserted randomly by Pegasus Mailer)&lt;BR /&gt;rslade@gmail.com rmslade@outlook.com rslade@computercrime.org&lt;BR /&gt;Great spirits have always encountered violent opposition from&lt;BR /&gt;mediocre minds. - Albert Einstein&lt;BR /&gt;victoria.tc.ca/techrev/rms.htm &lt;A href="http://twitter.com/rslade" target="_blank"&gt;http://twitter.com/rslade&lt;/A&gt;&lt;BR /&gt;&lt;A href="http://blogs.securiteam.com/index.php/archives/author/p1/" target="_blank"&gt;http://blogs.securiteam.com/index.php/archives/author/p1/&lt;/A&gt;&lt;BR /&gt;&lt;A href="https://community.isc2.org/t5/forums/recentpostspage/user-id/1324864413" target="_blank"&gt;https://community.isc2.org/t5/forums/recentpostspage/user-id/1324864413&lt;/A&gt;</description>
    <pubDate>Fri, 18 Dec 2020 19:07:19 GMT</pubDate>
    <dc:creator>rslade</dc:creator>
    <dc:date>2020-12-18T19:07:19Z</dc:date>
    <item>
      <title>Solarwinds supply chain attack - still a good idea to whitelist thirdparty applications at AV?</title>
      <link>https://community.isc2.org/t5/Threats/Solarwinds-supply-chain-attack-still-a-good-idea-to-whitelist/m-p/41766#M169</link>
      <description>&lt;P&gt;I had always been wondering if it is a good idea allow whitelisting of certain third party application and folders at anti-malware platform so that it can run smoothly without interference from AV scanning.&amp;nbsp; With whitelisting a requirement for the solarwind onion platform, whitelisting would had prevented the anti-malware from detecting malicious activities originating from the compromise software.&amp;nbsp; So should be put a stop to all such whitelisting?&amp;nbsp; Is there a good reason and guidelines to allow whitelisting safely?&lt;/P&gt;</description>
      <pubDate>Fri, 18 Dec 2020 03:23:23 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Threats/Solarwinds-supply-chain-attack-still-a-good-idea-to-whitelist/m-p/41766#M169</guid>
      <dc:creator>CY</dc:creator>
      <dc:date>2020-12-18T03:23:23Z</dc:date>
    </item>
    <item>
      <title>Re: Solarwinds supply chain attack - still a good idea to whitelist thirdparty applications at AV?</title>
      <link>https://community.isc2.org/t5/Threats/Solarwinds-supply-chain-attack-still-a-good-idea-to-whitelist/m-p/41767#M170</link>
      <description>&lt;P&gt;Not necessarily. I put many of these types of software on a bit higher scrutiny. WAF, outer ring before the next protection zone, higher degree of logging etc. as a matter of best practice beginning after the Target fiasco. Have I found the magic bad packet? No, eventually I will or someone will get lazy and miss something stupid.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am just waiting for the final forensics on this and FireEye before jumping to any conclusions, though.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Happy reading!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;b/eads&lt;/P&gt;</description>
      <pubDate>Fri, 18 Dec 2020 03:40:04 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Threats/Solarwinds-supply-chain-attack-still-a-good-idea-to-whitelist/m-p/41767#M170</guid>
      <dc:creator>Beads</dc:creator>
      <dc:date>2020-12-18T03:40:04Z</dc:date>
    </item>
    <item>
      <title>Re: Solarwinds supply chain attack - still a good idea to whitelist thirdparty applications at AV?</title>
      <link>https://community.isc2.org/t5/Threats/Solarwinds-supply-chain-attack-still-a-good-idea-to-whitelist/m-p/41770#M171</link>
      <description>&lt;P&gt;Early this week, FireEye said that the hackers were infecting targets using Orion, a widely used network management tool from SolarWinds. After taking control of the Orion update mechanism, the attackers were using it to install a backdoor that FireEye researchers are calling Sunburst.&lt;/P&gt;</description>
      <pubDate>Fri, 18 Dec 2020 06:10:47 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Threats/Solarwinds-supply-chain-attack-still-a-good-idea-to-whitelist/m-p/41770#M171</guid>
      <dc:creator>Carleton</dc:creator>
      <dc:date>2020-12-18T06:10:47Z</dc:date>
    </item>
    <item>
      <title>Re: Solarwinds supply chain attack -  still a good idea to whitelist thirdparty applications at AV?</title>
      <link>https://community.isc2.org/t5/Threats/Solarwinds-supply-chain-attack-still-a-good-idea-to-whitelist/m-p/41780#M172</link>
      <description>Definitely an important question. Whitelisting should be done carefully,&lt;BR /&gt;particularly with applications which require pervasive permissions, and, in this&lt;BR /&gt;case, it still would have been extemely difficult to detect the attack, since it was&lt;BR /&gt;properly signed and authenticated.&lt;BR /&gt;&lt;BR /&gt;====================== (quote inserted randomly by Pegasus Mailer)&lt;BR /&gt;rslade@gmail.com rmslade@outlook.com rslade@computercrime.org&lt;BR /&gt;Great spirits have always encountered violent opposition from&lt;BR /&gt;mediocre minds. - Albert Einstein&lt;BR /&gt;victoria.tc.ca/techrev/rms.htm &lt;A href="http://twitter.com/rslade" target="_blank"&gt;http://twitter.com/rslade&lt;/A&gt;&lt;BR /&gt;&lt;A href="http://blogs.securiteam.com/index.php/archives/author/p1/" target="_blank"&gt;http://blogs.securiteam.com/index.php/archives/author/p1/&lt;/A&gt;&lt;BR /&gt;&lt;A href="https://community.isc2.org/t5/forums/recentpostspage/user-id/1324864413" target="_blank"&gt;https://community.isc2.org/t5/forums/recentpostspage/user-id/1324864413&lt;/A&gt;</description>
      <pubDate>Fri, 18 Dec 2020 19:07:19 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Threats/Solarwinds-supply-chain-attack-still-a-good-idea-to-whitelist/m-p/41780#M172</guid>
      <dc:creator>rslade</dc:creator>
      <dc:date>2020-12-18T19:07:19Z</dc:date>
    </item>
    <item>
      <title>Re: Solarwinds supply chain attack - still a good idea to whitelist thirdparty applications at AV?</title>
      <link>https://community.isc2.org/t5/Threats/Solarwinds-supply-chain-attack-still-a-good-idea-to-whitelist/m-p/41835#M173</link>
      <description>Very valid question, the direction is Zero Trust and SDP.</description>
      <pubDate>Mon, 21 Dec 2020 10:35:58 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Threats/Solarwinds-supply-chain-attack-still-a-good-idea-to-whitelist/m-p/41835#M173</guid>
      <dc:creator>manickamk</dc:creator>
      <dc:date>2020-12-21T10:35:58Z</dc:date>
    </item>
  </channel>
</rss>

