Microsoft offers free tool to detect signs of SolarWinds malware code

Microsoft is helping organizations that are investigating whether they are victims of the Solorigate attack by offering them a free tool, the CodeQL queries that the company used to scan its source code for after the attack. the queries Microsoft used with CodeQL identify any code that is similar in pattern and function to the SolarWinds malware. So, these queries can be used on any software to do the same.

Meanwhile, security researchers from SecurityScorecard say that they have found a piece of malware used in the attack that dates back to almost four years ago. The malware, dubbed Teardrop, profiles a victim’s system and network, and this dates back all the way to 2017.

Ryan Sherstobitoff, vice president of cyberthreat research and intelligence at SecurityScorecard derived from this fact that Teardrop was likely used in other APT operations before SolarWinds by this nation-state hacking team.

Notably, when FireEye went public about suffering the data breach in December 2020, the company described Teardrop as a piece of malware that they have not seen before.

Comments

comments

1 Star2 Stars3 Stars4 Stars5 Stars (No Ratings Yet)