

Anatomy of the SolarWinds Hack: Who What Where When How
Feb 1, 2021
Join Joel de la Garza, a former CISO and current a16z operating partner for security, and Steven Adair, founder of Volexity, as they delve into the massive SolarWinds hack. They unravel the art of cyber espionage, discussing the sophisticated tactics used by attackers and the extensive supply chain vulnerabilities. The conversation highlights critical security oversights, the importance of proactive measures, and strategies for navigating third-party risks. Ultimately, they emphasize that cybersecurity must be integral to business operations, not just an afterthought.
AI Snips
Chapters
Transcript
Episode notes
Initial Infiltration Test
- The SolarWinds attackers first tested their ability to modify the software in late 2019.
- This test involved non-malicious changes to confirm their access and went undetected.
Malware Terminology
- Avoiding common malware terms is not sophistication but a basic evasion tactic.
- Attackers use tools to check their code for detectability before deploying.
Expired Domains Tactic
- The SolarWinds attackers showed patience and stealth by using expired domains for command and control.
- These domains had a history, making them less suspicious, indicating long-term planning.