Kaspersky researchers identify a government agency and a big U.S. telco that were flagged for further exploitation in the spy campaign. The Sunburst backdoor, a.k.a. Solorigate, is the malware used as the tip of the spear in the campaign. It was pushed out via trojanized product updates to almost 18,000 organizations around the globe, starting nine months ago. The campaign is known to have affected six federal departments, Microsoft, FireEye and dozens of others.
Source: https://threatpost.com/sunburst-c2-secrets-rsolarwinds-victims/162426/

