Blog | G5 Cyber Security

How SolarWinds Busted Up Our Assumptions About Code Signing

Four malware strains have been identified, one being Sunspot, which was installed on the SolarWinds build server that developers use to piece together software applications. An attacker that can inject changes into a software build pipeline or continuous integration (CI) process will be able to make changes that are included in the signed final product. Software vendors may not have thought to take great care in securing their software release pipeline, but these recent attacks have more and more taking a deep look at how they can do that effectively.”]

Source: https://www.darkreading.com/attacks-breaches/how-solarwinds-busted-up-our-assumptions-about-code-signing

Exit mobile version