SolarWinds malware was sneaked out of the firm’s Orion build environment 6 months before anyone realised it was there – report

The malware that was utilised to hack SolarWinds checked to see whether software used to compile the firm’s Orion product was running before deploying its payload, according to Crowdstrike. In a blog post late last night, the infosec firm said the Orion-targeting malware, which it codenamed Sunspot, had “several safeguards”

Read full article on The Register