<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Developing Story - Treasury reportedly breached by hackers backed by foreign government in Industry News</title>
    <link>https://community.isc2.org/t5/Industry-News/FireEye-Hacked/m-p/41651#M5175</link>
    <description>&lt;P&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/690706113"&gt;@tmekelburg1&lt;/a&gt;&amp;nbsp;You bring up a good point, when companies display their clients so openly they make it easy for attacker to know who to go after. This is like how on LinkedIn profiles and looking at job descriptions you often get a pretty good idea of the technology that is being used inside a company so it make it much easier to craft attacks. I believe there should be a general rule that this type of disclosure should probably not be allow.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;John-&lt;/P&gt;</description>
    <pubDate>Mon, 14 Dec 2020 16:55:42 GMT</pubDate>
    <dc:creator>JKWiniger</dc:creator>
    <dc:date>2020-12-14T16:55:42Z</dc:date>
    <item>
      <title>FireEye Hacked</title>
      <link>https://community.isc2.org/t5/Industry-News/FireEye-Hacked/m-p/41468#M5125</link>
      <description>&lt;P&gt;&lt;A href="https://www.scmagazine.com/home/security-news/apts-cyberespionage/fireeye-hacked-red-team-tools-stolen/" target="_blank"&gt;https://www.scmagazine.com/home/security-news/apts-cyberespionage/fireeye-hacked-red-team-tools-stolen/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 08 Dec 2020 22:16:58 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/FireEye-Hacked/m-p/41468#M5125</guid>
      <dc:creator>AlecTrevelyan</dc:creator>
      <dc:date>2020-12-08T22:16:58Z</dc:date>
    </item>
    <item>
      <title>Re: FireEye Hacked</title>
      <link>https://community.isc2.org/t5/Industry-News/FireEye-Hacked/m-p/41470#M5126</link>
      <description>&lt;P&gt;The incident is more of a "statement against FireEye than a&amp;nbsp;catastrophe". Check out their "defensive tools" (yawn) released here&amp;nbsp;&lt;A href="https://github.com/fireeye/red_team_tool_countermeasures" target="_blank" rel="noopener"&gt;https://github.com/fireeye/red_team_tool_countermeasures&lt;/A&gt;&amp;nbsp;Seriously? They are nothing compared to the Shadow Brokers leak...&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 09 Dec 2020 02:50:06 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/FireEye-Hacked/m-p/41470#M5126</guid>
      <dc:creator>AppDefects</dc:creator>
      <dc:date>2020-12-09T02:50:06Z</dc:date>
    </item>
    <item>
      <title>Re: FireEye Hacked</title>
      <link>https://community.isc2.org/t5/Industry-News/FireEye-Hacked/m-p/41483#M5129</link>
      <description>&lt;P&gt;&lt;FONT face="arial,helvetica,sans-serif"&gt;This was my initial suspicion when the story first broke, the threat actors trying to gain access to FireEye's client vulnerability scans, network layout, etc. The red team tools are important but their customer data is even more valuable.&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;"Consistent with a nation-state cyber-espionage effort, the attacker primarily sought information related to certain government customers. While the attacker was able to access some of our internal systems, at this point in our investigation, we have seen no evidence that the attacker exfiltrated data from our primary systems that store customer information from our incident response or consulting engagements, or the metadata collected by our products in our dynamic threat intelligence systems. If we discover that customer information was taken, we will contact them directly."&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.fireeye.com/blog/products-and-services/2020/12/fireeye-shares-details-of-recent-cyber-attack-actions-to-protect-community.html" target="_blank" rel="noopener"&gt;FireEye Shares Details of Recent Cyber Attack, Actions to Protect Community&lt;/A&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 09 Dec 2020 13:57:39 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/FireEye-Hacked/m-p/41483#M5129</guid>
      <dc:creator>tmekelburg1</dc:creator>
      <dc:date>2020-12-09T13:57:39Z</dc:date>
    </item>
    <item>
      <title>Re: FireEye Hacked</title>
      <link>https://community.isc2.org/t5/Industry-News/FireEye-Hacked/m-p/41531#M5134</link>
      <description>&lt;P&gt;According to the Washington Post article, APT 29 Cozy Bear, are the ones responsible.&amp;nbsp;It'll be interesting to find out if any client data was breached and from who.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://attack.mitre.org/groups/G0016/" target="_blank" rel="noopener"&gt;MITRE ATT&amp;amp;CK APT29&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.washingtonpost.com/national-security/leading-cybersecurity-firm-fireeye-hacked/2020/12/08/a3369aaa-3988-11eb-98c4-25dc9f4987e8_story.html" target="_blank" rel="noopener"&gt;Spies with Russia’s foreign intelligence service believed to have hacked a top American cybersecurity firm and stolen its sensitive tools&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;"&lt;SPAN&gt;The breach was disclosed by FireEye on Tuesday, though the firm did not attribute it to Russia’s foreign intelligence service. It was detected in recent weeks, said one of the people, who like others interviewed for this story spoke on the condition of anonymity because the investigation is ongoing."&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;A href="https://www.wired.com/story/russia-fireeye-hack-statement-not-catastrophe/" target="_blank" rel="noopener"&gt;Russia's FireEye Hack Is a Statement—but Not a Catastrophe&lt;/A&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;“The most important data that a company like FireEye has is data about its customers. The second most important data they have are the sources and methods they use to protect their customers,” like threat intelligence data, says Richard Bejtlich, former chief security officer of Mandiant, the incident response division of FireEye, and principal security strategist at the network analysis firm Corelight. “Farther down the line are the red team tools, where they’re emulating adversaries.”&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 10 Dec 2020 14:05:41 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/FireEye-Hacked/m-p/41531#M5134</guid>
      <dc:creator>tmekelburg1</dc:creator>
      <dc:date>2020-12-10T14:05:41Z</dc:date>
    </item>
    <item>
      <title>Re: FireEye Hacked</title>
      <link>https://community.isc2.org/t5/Industry-News/FireEye-Hacked/m-p/41537#M5135</link>
      <description>&lt;P&gt;OK, I'll go there... to me this sounds like things being exaggerated to try to make the company look good. I would much sooner believe someone made a dumb mistake and it got exploited than this massive force they make the attack out to be. It seems like their way of trying to save credibility with their clients and admitting that even then best of us make dumb mistakes sometimes.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Just my .02&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;John-&lt;/P&gt;</description>
      <pubDate>Thu, 10 Dec 2020 16:21:09 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/FireEye-Hacked/m-p/41537#M5135</guid>
      <dc:creator>JKWiniger</dc:creator>
      <dc:date>2020-12-10T16:21:09Z</dc:date>
    </item>
    <item>
      <title>Re: FireEye Hacked</title>
      <link>https://community.isc2.org/t5/Industry-News/FireEye-Hacked/m-p/41543#M5137</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/1542574691"&gt;@JKWiniger&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;OK, I'll go there...&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;LOL, someone had to! It's hard to know what's true unless more information is released to the public. I'd wager you're onto something though.&lt;/P&gt;</description>
      <pubDate>Thu, 10 Dec 2020 18:17:42 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/FireEye-Hacked/m-p/41543#M5137</guid>
      <dc:creator>tmekelburg1</dc:creator>
      <dc:date>2020-12-10T18:17:42Z</dc:date>
    </item>
    <item>
      <title>Re: FireEye Hacked</title>
      <link>https://community.isc2.org/t5/Industry-News/FireEye-Hacked/m-p/41630#M5164</link>
      <description>&lt;P&gt;Seems it was a supply chain attack that affected a number of other organisations:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://thehackernews.com/2020/12/us-agencies-and-fireeye-were-hacked.html" target="_blank"&gt;https://thehackernews.com/2020/12/us-agencies-and-fireeye-were-hacked.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;SolarWinds users better get patching:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.solarwinds.com/securityadvisory" target="_blank"&gt;https://www.solarwinds.com/securityadvisory&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 14 Dec 2020 09:48:10 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/FireEye-Hacked/m-p/41630#M5164</guid>
      <dc:creator>AlecTrevelyan</dc:creator>
      <dc:date>2020-12-14T09:48:10Z</dc:date>
    </item>
    <item>
      <title>Re: FireEye Hacked</title>
      <link>https://community.isc2.org/t5/Industry-News/FireEye-Hacked/m-p/41633#M5165</link>
      <description>&lt;P&gt;Here's a breakdown from FireEye on the SUNBURST back door.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.fireeye.com/blog/threat-research/2020/12/evasive-attacker-leverages-solarwinds-supply-chain-compromises-with-sunburst-backdoor.html" target="_blank" rel="noopener"&gt;Highly Evasive Attacker Leverages SolarWinds Supply Chain to Compromise Multiple Global Victims With SUNBURST Backdoor&lt;/A&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 14 Dec 2020 13:29:02 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/FireEye-Hacked/m-p/41633#M5165</guid>
      <dc:creator>tmekelburg1</dc:creator>
      <dc:date>2020-12-14T13:29:02Z</dc:date>
    </item>
    <item>
      <title>Developing Story - Treasury reportedly breached by hackers backed by foreign government</title>
      <link>https://community.isc2.org/t5/Industry-News/FireEye-Hacked/m-p/41635#M5168</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Community,&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;We’re sure you’re watching the developing headlines that are emerging about a reported intrusion at the Commerce and Treasury departments that potentially involve compromised vendor software updates. &lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;What are your key takeaways so far? When announcements like these occur, what are the first steps you take to determine if your organization is at risk? How do you stay alert and informed?&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;While being widely reported, here are a few sources:&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://us-cert.cisa.gov/ncas/current-activity/2020/12/13/active-exploitation-solarwinds-software" target="_blank" rel="noopener"&gt;https://us-cert.cisa.gov/ncas/current-activity/2020/12/13/active-exploitation-solarwinds-software&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A title="https://protect-us.mimecast.com/s/njF8C73wPYuKR3vTW5V_d?domain=cyber.dhs.gov" href="https://protect-us.mimecast.com/s/njF8C73wPYuKR3vTW5V_d?domain=cyber.dhs.gov" target="_blank" rel="noopener"&gt;https://cyber.dhs.gov/ed/21-01/?fbclid=IwAR0Ss18TNd_7Ub37y9PNrgeBXYWskdhSItKVWfFkd6bxtDFetQaVBZ_kLas&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://www.reuters.com/article/usa-cyber-treasury/exclusive-u-s-treasury-breached-by-hackers-backed-by-foreign-government-sources-idUSL1N2IT0JG" target="_blank"&gt;https://www.reuters.com/article/usa-cyber-treasury/exclusive-u-s-treasury-breached-by-hackers-backed-by-foreign-government-sources-idUSL1N2IT0JG&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://www.cyberscoop.com/russian-hacking-treasury-commerce-fireeye/" target="_blank"&gt;https://www.cyberscoop.com/russian-hacking-treasury-commerce-fireeye/&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://www.cbsnews.com/news/solarwinds-orion-hack-government-agencies-treasury-fireeye/" target="_blank"&gt;https://www.cbsnews.com/news/solarwinds-orion-hack-government-agencies-treasury-fireeye/&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;</description>
      <pubDate>Mon, 14 Dec 2020 15:11:09 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/FireEye-Hacked/m-p/41635#M5168</guid>
      <dc:creator>AndreaMoore</dc:creator>
      <dc:date>2020-12-14T15:11:09Z</dc:date>
    </item>
    <item>
      <title>Re: Developing Story - Treasury reportedly breached by hackers backed by foreign government</title>
      <link>https://community.isc2.org/t5/Industry-News/FireEye-Hacked/m-p/41642#M5170</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/1086253963"&gt;@AndreaMoore&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;&lt;SPAN&gt;Community,&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;We’re sure you’re watching the developing headlines that are emerging about a reported intrusion at the Commerce and Treasury departments that potentially involve compromised vendor software updates. &lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;What are your key takeaways so far? When announcements like these occur, what are the first steps you take to determine if your organization is at risk? How do you stay alert and informed?&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&amp;nbsp;I immediately reach out to our MSP to make sure they were aware and a discovery on my part to see if they used SolarWinds to help protect their network. Us being breached through our MSP is what I worry about the most in these types of situations.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 14 Dec 2020 16:04:07 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/FireEye-Hacked/m-p/41642#M5170</guid>
      <dc:creator>tmekelburg1</dc:creator>
      <dc:date>2020-12-14T16:04:07Z</dc:date>
    </item>
    <item>
      <title>Re: Developing Story - Treasury reportedly breached by hackers backed by foreign government</title>
      <link>https://community.isc2.org/t5/Industry-News/FireEye-Hacked/m-p/41647#M5172</link>
      <description>&lt;P&gt;My first question of course would be do we use the product and if so shut it down! Second step would be to apply the rules provided on GitHub to block any infection if we do use the product. Then have everyone being vigilant about looking for suspect activities and reporting what is seen.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I do believe this might mark a turning point in the information security industry. When private companies are attacked that's one thing, but now that the government has been attacked we may see new laws coming out to help prevent this from happening in the future. I can't even imagine what kind of slip ups and checks did not occur for a piece of malware to get into an update and be digitally signed? Are there no scans or checks in place? This goes back to where I believe that companies and programers need to start being held accountable for releasing poor code. To make matter worse the creation of bug country programs to counter their own bad programing breeds and environment for people to learn and be encouraged to find ways to compromise things. From there it is only a fine ethical line from good intention to bad intention.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My .02&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;John-&lt;/P&gt;</description>
      <pubDate>Mon, 14 Dec 2020 16:32:15 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/FireEye-Hacked/m-p/41647#M5172</guid>
      <dc:creator>JKWiniger</dc:creator>
      <dc:date>2020-12-14T16:32:15Z</dc:date>
    </item>
    <item>
      <title>Re: Developing Story - Treasury reportedly breached by hackers backed by foreign government</title>
      <link>https://community.isc2.org/t5/Industry-News/FireEye-Hacked/m-p/41648#M5173</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/1542574691"&gt;@JKWiniger&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;I can't even imagine what kind of slip ups and checks did not occur for a piece of malware to get into an update and be digitally signed? Are there no scans or checks in place?&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;With the sophistication behind this attack, it kind of sounds like this specific tool was targeted because of it's penetration into fortune 500 and Government clients. They did have their biggest clients very brazenly listed on their webpage and recently took down. Anything specifically you can discuss about how your company or clients are handling this or thoughts on the matter?&amp;nbsp;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/809125741"&gt;@Caute_cautim&lt;/a&gt;&amp;nbsp;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/715155969"&gt;@dcontesti&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.solarwinds.com/company/customers" target="_blank" rel="noopener"&gt;https://www.solarwinds.com/company/customers&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 14 Dec 2020 16:50:43 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/FireEye-Hacked/m-p/41648#M5173</guid>
      <dc:creator>tmekelburg1</dc:creator>
      <dc:date>2020-12-14T16:50:43Z</dc:date>
    </item>
    <item>
      <title>Re: Developing Story - Treasury reportedly breached by hackers backed by foreign government</title>
      <link>https://community.isc2.org/t5/Industry-News/FireEye-Hacked/m-p/41651#M5175</link>
      <description>&lt;P&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/690706113"&gt;@tmekelburg1&lt;/a&gt;&amp;nbsp;You bring up a good point, when companies display their clients so openly they make it easy for attacker to know who to go after. This is like how on LinkedIn profiles and looking at job descriptions you often get a pretty good idea of the technology that is being used inside a company so it make it much easier to craft attacks. I believe there should be a general rule that this type of disclosure should probably not be allow.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;John-&lt;/P&gt;</description>
      <pubDate>Mon, 14 Dec 2020 16:55:42 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/FireEye-Hacked/m-p/41651#M5175</guid>
      <dc:creator>JKWiniger</dc:creator>
      <dc:date>2020-12-14T16:55:42Z</dc:date>
    </item>
    <item>
      <title>Re: Developing Story - Treasury reportedly breached by hackers backed by foreign government</title>
      <link>https://community.isc2.org/t5/Industry-News/FireEye-Hacked/m-p/41657#M5176</link>
      <description>&lt;P&gt;I can only think, "how do you establish defense-in-depth when something so central and this critical goes horribly wrong?".&lt;BR /&gt;&lt;BR /&gt;Written for 2020, "Did anyone have 'Premier monitoring and maintenance tool for managed services providers and governments alike becomes unwitting CozyBear agent for six months' on their bingo card?"&lt;/P&gt;</description>
      <pubDate>Mon, 14 Dec 2020 19:37:43 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/FireEye-Hacked/m-p/41657#M5176</guid>
      <dc:creator>ericgeater</dc:creator>
      <dc:date>2020-12-14T19:37:43Z</dc:date>
    </item>
    <item>
      <title>Re: Developing Story - Treasury reportedly breached by hackers backed by foreign government</title>
      <link>https://community.isc2.org/t5/Industry-News/FireEye-Hacked/m-p/41661#M5179</link>
      <description>&lt;P&gt;HI John,&amp;nbsp; Yes, specifically Whitelisting and Characterisation has been around for some time.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Some governments insist upon both whitelisting and Characterisation to put in place - it is difficult but not impossible.&amp;nbsp; It is part of the Australian Government Essential 8:&amp;nbsp; &lt;A href="https://www.sans.org/reading-room/whitepapers/critical/paper/38575" target="_blank"&gt;https://www.sans.org/reading-room/whitepapers/critical/paper/38575&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;NIST also have a paper on how to implement it too:&amp;nbsp; Some vendors i.e. Juniper for instance actually build into their products from the outset to identify malware or manipulation of the updates or source code.&amp;nbsp;&amp;nbsp; There are systems such as Carbon Black who provide good support, but it takes time - it frustrates Unix, Linux and Microsoft delivery teams having to deal with this, so they attempt to override it, but in fact as per the recent events, bypassing it can be extremely costly.&amp;nbsp; However, it is an important factor, trust nothing until proven it has not been manipulated or altered etc.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Ensure secure source of software updates, normally a secure proxy pointing to the known and confirmed vendor web site or portal etc.&amp;nbsp; Then validate current state, apply integrity checking of source and verify i.e. hashing, test and apply - it all takes time.&amp;nbsp;&amp;nbsp;&amp;nbsp; Automation and orchestration is a way forward, manual approach is extremely frustrating for support staff.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://csrc.nist.gov/publications/detail/sp/800-53/rev-5/final" target="_blank"&gt;https://csrc.nist.gov/publications/detail/sp/800-53/rev-5/final&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Some apply Tripwire or NTT Change Tracker R2 for instance which includes AI and is reasonably charged, whereas the Tripwire needs constant technical support from the internal staff from experience.&amp;nbsp;&amp;nbsp;&amp;nbsp; A lot of banks tend to use it, but they do train their internal staff very well too.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_cautim&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 14 Dec 2020 20:01:04 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/FireEye-Hacked/m-p/41661#M5179</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2020-12-14T20:01:04Z</dc:date>
    </item>
    <item>
      <title>Re: Developing Story - Treasury reportedly breached by hackers backed by foreign government</title>
      <link>https://community.isc2.org/t5/Industry-News/FireEye-Hacked/m-p/41665#M5182</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/809125741"&gt;@Caute_cautim&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;HI John,&amp;nbsp; Yes, specifically Whitelisting and Characterisation has been around for some time.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;Ensure secure source of software updates, normally a secure proxy pointing to the known and confirmed vendor web site or portal etc.&amp;nbsp; Then validate current state, apply integrity checking of source and verify i.e. hashing, test and apply - it all takes time.&amp;nbsp;&amp;nbsp;&amp;nbsp; Automation and orchestration is a way forward, manual approach is extremely frustrating for support staff.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;Would those software update checking programs have caught it if it was digitally signed by the owner?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;"SolarWinds.Orion.Core.BusinessLayer.dll is signed by SolarWinds, using the certificate with serial number 0f:e9:73:75:20:22:a6:06:ad:f2:a3:6e:34:5d:c0:ed. The file was signed on March 24, 2020."&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 14 Dec 2020 20:37:24 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/FireEye-Hacked/m-p/41665#M5182</guid>
      <dc:creator>tmekelburg1</dc:creator>
      <dc:date>2020-12-14T20:37:24Z</dc:date>
    </item>
    <item>
      <title>Re: Developing Story - Treasury reportedly breached by hackers backed by foreign government</title>
      <link>https://community.isc2.org/t5/Industry-News/FireEye-Hacked/m-p/41668#M5183</link>
      <description>&lt;P&gt;I guess having the mentality of do it right or don't do it at all leaves me a bit... I'm not sure what the right word would be... maybe annoyed. Far too often companies are just more concern with getting the product out and making money so they rely heavily on rapid application development and cut corners and I just don't agree with that. I feel like the burden gets put onto the end user / company to stay up on patch management when if the products where made better there wouldn't be such a high need. I just think places need to slow down and focus a bit more on the quality of the product and less about the quantity.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;John-&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 14 Dec 2020 21:19:00 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/FireEye-Hacked/m-p/41668#M5183</guid>
      <dc:creator>JKWiniger</dc:creator>
      <dc:date>2020-12-14T21:19:00Z</dc:date>
    </item>
    <item>
      <title>Re: Developing Story - Treasury reportedly breached by hackers backed by foreign government</title>
      <link>https://community.isc2.org/t5/Industry-News/FireEye-Hacked/m-p/41680#M5185</link>
      <description>&lt;P&gt;Just listened to&amp;nbsp;&lt;A href="https://www.sans.org/webcasts/emergency-webcast-about-solarwinds-supply-chain-attack-118015" target="_blank" rel="noopener"&gt;SANS Emergency Webcast: What you need to know about the SolarWinds Supply-Chain Attack&lt;/A&gt;&amp;nbsp;hosted by Rob Lee and presented by Jake Williams&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It's free to view after making an account or logging in. Key takeaways:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;FONT face="arial,helvetica,sans-serif"&gt;If you have SolarWinds Orion, assume compromise&lt;/FONT&gt;&lt;/LI&gt;&lt;LI&gt;&lt;FONT face="arial,helvetica,sans-serif"&gt;Check logs for C&amp;amp;C and Beacon domains released by FireEye&lt;/FONT&gt;&lt;/LI&gt;&lt;LI&gt;&lt;FONT face="arial,helvetica,sans-serif"&gt;If you have other SolarWinds products, assume those could be compromised as well. We don't know how SolarWinds was breached and if they tampered with other products&lt;/FONT&gt;&lt;/LI&gt;&lt;LI&gt;&lt;FONT face="arial,helvetica,sans-serif"&gt;Block your Network Management System (NMS) from the Internet or explicitly allow limited access to destinations (Zero Trust)&lt;/FONT&gt;&lt;/LI&gt;&lt;LI&gt;&lt;FONT face="arial,helvetica,sans-serif"&gt;Segment access within your NMS. One set of credentials to read and another to make changes (this can be further segmented as well)&lt;/FONT&gt;&lt;/LI&gt;&lt;LI&gt;&lt;FONT face="arial,helvetica,sans-serif"&gt;Attackers will retool, don't expect this group to use Sunburst malware going forward&lt;/FONT&gt;&lt;/LI&gt;&lt;LI&gt;&lt;FONT face="arial,helvetica,sans-serif"&gt;Attribution is not important, it shouldn't affect how you respond or mitigate&amp;nbsp;&lt;/FONT&gt;&lt;/LI&gt;&lt;/UL&gt;</description>
      <pubDate>Tue, 15 Dec 2020 16:54:08 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/FireEye-Hacked/m-p/41680#M5185</guid>
      <dc:creator>tmekelburg1</dc:creator>
      <dc:date>2020-12-15T16:54:08Z</dc:date>
    </item>
    <item>
      <title>Re: Developing Story - Treasury reportedly breached by hackers backed by foreign government</title>
      <link>https://community.isc2.org/t5/Industry-News/FireEye-Hacked/m-p/41681#M5186</link>
      <description>&lt;P&gt;This is a good opportunity to invoke "never let a perfectly good crisis go to waste".&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;CISA does have response &lt;A href="https://cyber.dhs.gov/ed/21-01/" target="_blank" rel="noopener"&gt;recommendations&lt;/A&gt;, but as CISSPs, our focus belongs more on the bigger picture than running the incident.&amp;nbsp; CISA's comment&amp;nbsp;“&lt;STRONG&gt;&lt;FONT color="#339966"&gt;Rebuild hosts monitored by the SolarWinds Orion monitoring software…&lt;/FONT&gt;&lt;/STRONG&gt;.” is a powerful statement from an influential organization,&amp;nbsp; basically asking you to rebuild everything you truly think important to your business (in some scenarios).&amp;nbsp; Coupled with the fact that your CIO is likely already asking if we are amongst their 300k customers creates a great opportunity for a "concentration of power" discussion.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Discussion points on the email I already sent to my colleagues:&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;Monitoring should be uncredentialled or read-only and any necessary accounts should have minimum privileges.&lt;/LI&gt;&lt;LI&gt;All High-privilege accounts should be stored in our secure privileged access vault with controls surrounding how they may be checked out, including by automated management systems such as Solar Winds.&lt;/LI&gt;&lt;LI&gt;Review controls surrounding our internal software packaging/distribution and our remote-admin tools, particularly those that work without user consent prior to each session.&lt;/LI&gt;&lt;LI&gt;Review our Solar winds architecture with respect to the CISA guidelines and to minimize its need for privileged access.&lt;/LI&gt;&lt;LI&gt;Ditto for all other system management tools, not just the monitoring tool.&lt;/LI&gt;&lt;LI&gt;Network segmentation/isolation for critical business applications (not just Solar winds)&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Oh, also don't forget that the reading/research you do for this (such as the &lt;A href="https://www.youtube.com/watch?v=qP3LQNsjKWw" target="_blank" rel="noopener"&gt;SANs video&lt;/A&gt;) are good for CPEs.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Finally, I do note that this attack comes at a particularly interesting time for the USA, politically speaking, and involves an fascinating set of actors, but the conspiracy theories surrounding that belong somewhere other than this community.&lt;/P&gt;</description>
      <pubDate>Tue, 15 Dec 2020 17:07:26 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/FireEye-Hacked/m-p/41681#M5186</guid>
      <dc:creator>denbesten</dc:creator>
      <dc:date>2020-12-15T17:07:26Z</dc:date>
    </item>
    <item>
      <title>Fireeye and Solarwinds</title>
      <link>https://community.isc2.org/t5/Industry-News/FireEye-Hacked/m-p/41688#M5191</link>
      <description>&lt;P&gt;Hi All&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Those of you who have been asleep at the wheel focusing on other things, had best look at this over 18000 companies have been compromised using the tools stolen from Fireeye recently.&amp;nbsp;&amp;nbsp; Solarwinds is just one of those IT monitoring system many companies use.&amp;nbsp;&amp;nbsp; So patch now and be vigilant, this is not going away.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Look at the effect on their value in the market - excellent examples for your respective organisations.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://seekingalpha-com.cdn.ampproject.org/c/s/seekingalpha.com/amp/article/4394717-solarwinds-hack-long-list-of-potential-victims" target="_blank"&gt;https://seekingalpha-com.cdn.ampproject.org/c/s/seekingalpha.com/amp/article/4394717-solarwinds-hack-long-list-of-potential-victims&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_cautim&lt;/P&gt;</description>
      <pubDate>Mon, 09 Oct 2023 09:43:55 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/FireEye-Hacked/m-p/41688#M5191</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2023-10-09T09:43:55Z</dc:date>
    </item>
  </channel>
</rss>

