SolarWinds Supply Chain Attack Compromised Multiple Global Victims With SUNBURST Backdoor
The attacker’s post-compromise activity leverages multiple techniques to evade detection and obscure their activity, but these efforts also offer some opportunities for detection.