The U.S. Cybersecurity & Infrastructure Security Agency (CISA) has released "What Every Leader Needs to Know About the Ongoing APT Cyber Activity," a warning that details the risks associated with advanced persistent threats (APT).
The warning comes after FireEye's discovery that an APT actor has been exploiting SolarWinds Orion software.
During the SolarWinds incident, an APT actor inserted malicious code into Orion software updates, according to CISA. Once these updates were applied, an APT actor could use them to access customer networks.
To date, the APT actor involved in the SolarWinds incident has only targeted certain organizations, CISA stated. However, all organizations that have installed compromised Orion updates remain at risk.
How to Remediate Risk Following the SolarWinds Security Incident
CISA offered the following recommendations to help organizations remediate risk following the SolarWinds incident:
In addition, CISA has created a new Supply Chain Compromise webpage to consolidate all of the resources it has released relating to the SolarWinds incident. CISA also will continue to update the webpage to include new cyber community partner resources.
SolarWinds Statements About Orion Security Incident
Meanwhile, SolarWinds has provided the following updates to partners and customers: