Current Security Advisory – SolarWinds & FireEye

December 17, 2020

As you’ve likely seen reported, SolarWinds discovered a supply chain attack compromising their Orion business software updates that distributed malware known as SUNBURST. The malware permits an attacker to gain access to network traffic management systems, and the attacker can leverage this to gain elevated credentials. This compromise was used to target the cybersecurity firm FireEye, as well as multiple U.S. government agencies.

CTN does not use any SolarWinds or FireEye products. As you’ve likely seen reported, SolarWinds discovered a supply chain attack compromising their Orion business software updates that distributed malware known as SUNBURST. The malware permits an attacker to gain access to network traffic management systems, and the attacker can leverage this to gain elevated credentials. This compromise was used to target the cybersecurity firm FireEye, as well as multiple U.S. government agencies.

CTN does not use any SolarWinds or FireEye products. However, we are following the developments of this news closely, ensuring that we validate our processes and environment as new information becomes publicly available. The security of our products, our clients, and our clients’ data is of critical importance, and while we have no evidence to suggest that any of our systems are involved or impacted, we are proactively taking actions while this cyber event unfolds.

SolarWinds Orion is used mainly by IT professionals to monitor corporate and government networks. It is not part of the toolset which is typically used by managed IT services providers (MSPs) to monitor SMB networks. Again, CTN Solutions does not use SolarWinds tools for the services we provide to our clients.

 

Contact CTN

Office

610 Sentry Parkway

Suite 110

Blue Bell, Pennsylvania 19422

Call Us

(610) 828- 5500

15 + 14 =

Skip to content