Threat Hunter TeamSymantecPosted: 22 Jan, 20213 Min ReadThreat IntelligenceSolarWinds: How Sunburst Sends Data Back to the AttackersIn the fourth of a series of follow-up analysis on the SolarWinds attacks, we detail how data is sent to the attackers.SolarWinds: How Sunburst Sends Data Back to the Attackers
Threat Hunter TeamSymantecPosted: 22 Jan, 20213 Min ReadSolarWinds: How Sunburst Sends Data Back to the AttackersIn the fourth of a series of follow-up analysis on the SolarWinds attacks, we detail how data is sent to the attackers.SolarWinds: How Sunburst Sends Data Back to the Attackers
Threat Hunter TeamSymantecPosted: 18 Jan, 20215 Min ReadRaindrop: New Malware Discovered in SolarWinds InvestigationTool was used to spread onto other computers in victims’ networks.Raindrop: New Malware Discovered in SolarWinds Investigation
Threat Hunter TeamSymantecPosted: 15 Jan, 20215 Min ReadSolarWinds: Insights into Attacker Command and Control ProcessIn the third of a series of follow-up analysis on the SolarWinds attacks, we investigate how the attackers controlled the Sunburst malware.SolarWinds: Insights into Attacker Command and Control Process
Threat Hunter TeamSymantecPosted: 7 Jan, 20215 Min ReadSolarWinds: How a Rare DGA Helped Attacker Communications Fly Under the RadarIn the second of a series of follow-up analysis on the SolarWinds attacks, we examine how the attackers made command and control communications particularly stealthy.SolarWinds: How a Rare DGA Helped Attacker Communications Fly Under the Radar
Kevin HaleyDirector, Symantec Security ResponsePosted: 22 Dec, 20203 Min ReadHow SES Complete Can Protect Against Sophisticated Attacks Such As SunburstSymantec Endpoint Security Complete addresses your blind spotsHow SES Complete Can Protect Against Sophisticated Attacks Such As Sunburst