Posted on 12/14/2020 5:54:33 PM PST by Kevin in California
Last night the Cybersecurity and Infrastructure Security Agency (CISA) issued a rare Emergency Directive 21-01, in response to a KNOWN COMPROMISE involving SolarWinds Orion products.
This was only the fifth Emergency Directive issued by CISA under the authorities granted by Congress in the Cybersecurity Act of 2015.
CISA reported a breach of the SolarWinds Orion products.
This Emergency Directive called on all federal civilian agencies to review their networks for indicators of compromise and disconnect or power down SolarWinds Orion products immediately.
p
SolarWinds and Pulse Secure. Two products NO ONE should ever deploy in their data centers ever again.
Only indirectly.
There was a major breach within the internet security community reported this weekend.
The breach happened back in March 2020 and it was deliberate and evasive.
Those who setup the breach used Solarwinds software.
So did Dominion.
So did lots of companies.
The key seems to be they used Microsoft OS update to distribute their spyware.
Archive of the Dominion Voting Systems page showing a Solarwinds copyright.
You had to go to the mobile page to see it, here:
https://dvsfileshare.dominionvoting.com/Web%20Client/Mobile/MLogin.htm
I doubt that's still live, but it was c. 6AM.
it happened
Good find!
You were right, it’s not on that mobile page anymore.
It should stay on the archive.today page though.
Is gateway pundit that bad?
They’ve had quite a few breaking stories in the last couple of weeks that turned out to be true.
I really don’t follow them that closely.
No they are not too bad. In fact they have been really good with BREAKING! stories about 30 minutes to an hour after the story was already being discussed here on freerepublic.
Do you actually read any of the GP articles? I’ve rarely read one what wasn’t factual. Maybe overblown headlines, but never read anything that was not factual.
I didn’t even bother to look, I was so sure.
some names:
9 Dec: Marketwatch: Press release: SolarWinds Appoints Sudhakar Ramakrishna as New President and Chief Executive Officer
“Following an extensive and thorough search, we are delighted to welcome Sudhakar Ramakrishna as SolarWinds’ new CEO as we embark on an exciting new chapter in the company’s history,” said Bill Bock, Chairman of the Board of SolarWinds.“...
Bock continued, “We would also like to thank Kevin Thompson for his many years of service to SolarWinds. Under his guidance, SolarWinds has grown into a leader in IT infrastructure management with a portfolio of products designed to meet the real world needs of IT professionals who manage today’s complex IT environments...
As the company continues to pursue its strategic objectives, SolarWinds is pleased to announce the diversification of its shareholders base with an approximately $315 million secondary investment from Canada Pension Plan Investment Board (CPP Investments), a professional investment organization.
Following closing, CPP Investments’ ownership in SolarWinds will be approximately 5% and the position was acquired through the acquisition of a portion of the existing stake owned by Silver Lake, Thoma Bravo and their respective co-investors...
Investors:
Howard Ma
Phone: 512.498.6707
ir@solarwinds.comMedia:
Tiffany Nels
Phone: 512.682.9535
pr@solarwinds.com
https://www.marketwatch.com/press-release/solarwinds-appoints-sudhakar-ramakrishna-as-new-president-and-chief-executive-officer-2020-12-09
https://www.zdnet.com/article/microsoft-fireeye-confirm-solarwinds-supply-chain-attack/
https://www.fireeye.com/blog/threat-research/2020/12/evasive-attacker-leverages-solarwinds-supply-chain-compromises-with-sunburst-backdoor.html
A hack initially corrupted a Solarwinds file, after which, that corrupted Solarwinds file had/has been installed on various Windows OS based machines as a part of routine updating.
The hacked file hatches, you might say, active hack commands that find certain files and deletes those certain files.
The hack tries to hide its tracks, and then force a reboot of the Windows OS based machine.
It is a cover-up.
Hannity caller claims FBI and Texas Rangers visited SolarWinds
Sensational News: FBI and TEXAS RANGERS VISIT SolarWinds
or..... BREAKING NEWS!!!!!! FBI AND TEXAS RANGERS RAID SOLARWINDS.
They don't give the source as they would have to change the headline to "SOMEBODY ELSE'S BREAKING NEWS" but in this case, I believe the source to be Hannitys shows. "Sean. I'm here in Texas. I have a good friend who's a ranger who passed to me that the FBI, the Texas Rangers and the US Marshals are all at the SolarWinds headquarters in Austin, Texas and they are currently looking"
Considering that this Solarwinds issue allowed a Hack into the US Treasury and into the US Military for months, yeah, I’m going to assume that Solarwinds had feds crawling all over them!
No one has to - they do that themselves.
Tweet: NetworkSecurityMonkey
Connection of SolarWinds Hacking and US Elections Explained...
14 Dec 2020
DOCUMENT
https://twitter.com/Netguy73/status/1338675924401733632
So, a Chinese company with an Indian executive. Glanced around no one else is talking about anybody raiding the location.
I think there are some Canadian Pension Plan Board members who should be fired.
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.