As part of its investigation, Microsoft said it had observed the hacking group targeting organizations in the US military research and development and software sectors. The company has designated the actor as DEV-0322 in reference to its status as an unidentified “development group.” Microsoft explained that it uses the label prior to reaching high confidence about the origin or identity of a hacker. The group operating out of China is using commercial VPN solutions and compromised consumer routers to carry out their attacks, Microsoft said. Those affected have been notified and assisted in their response, the company noted.
SolarWinds confirmed on the weekend that it was notified by Microsoft of a security vulnerability in its Serv-U software. The flaw was related to the product’s managed file transfer and secured FTP, which it has since patched.
SolarWinds gained overnight notoriety in December after it became the subject of a supply chain cyberattack that impacted 18,000 of its customers, including nine US government agencies. US intelligence released a joint statement in January naming Russia as the most likely source of the hack. The following month, Reuters reported that suspected Chinese hackers had exploited a separate flaw in SolarWinds’ software to to help breach US government computers last year. The latest vulnerability is not related to the so-called Sunburst supply chain attack, SolarWinds said.
All products recommended by Engadget are selected by our editorial team, independent of our parent company. Some of our stories include affiliate links. If you buy something through one of these links, we may earn an affiliate commission.
social experiment by Livio Acerbo #greengroundit #engadget https://www.engadget.com/microsoft-solarwinds-exploit-china-hack-092547713.html?src=rss