Post Mortem: The First 72 Hours of SUNBURST Threat Intelligence Research

Logo
Presented by

Tanner Payne, Sr. Sales Engineer at ExtraHop

About this talk

On December 13, 2020 when the SolarWinds Orion SUNBURST backdoor vulnerability was disclosed, the entire security community sprung into action. The attack had potential to do immense damage, and everyone worked tirelessly to respond fast. FireEye and ExtraHop were among the first to release SUNBURST associated domains and IP addresses to be used for threat intel, forensic investigation, and response. This session will cover: - Background on the SUNBURST attack and how it was so stealthy and hard to detect - How ExtraHop uncovered new threat intelligence for use in investigating and responding to SUNBURST - Why internal network traffic is such a strong data source for detecting and responding to supply chain attacks like SUNBURST.
Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (131)
Subscribers (11594)
The prevention and protection model of cybersecurity isn’t working: between the cloud, IoT, and the sheer pace of change, the enterprise is no longer built to be walled in. This channel provides educational webinars to help SecOps (SOC) and NetOps (NOC) teams, from CIOs and CISOs to analysts and practitioners, change their perspective in order to identify, investigate, and respond to threats across the modern attack surface. We explore how cloud-native network detection and response (NDR) provides the complete visibility, real-time threat detection, and intelligent response you need to secure your hybrid environment. You’ll also find product information about ExtraHop Reveal(x) which enables you to: Eliminate blind spots: Cover 100% of your hybrid environment, Detect what matters: Find threats 95% faster, and Act quickly: Respond to breaches 70% faster. Learn more at www.extrahop.com