PULSE NAME
Operation WilySupply software supply chain cyberattack
WHITE bartblaze 2017-05-04 Modified: 2017-05-04
0
IOCs
LOW VOLUME
An unknown attacker was taking advantage of a silent yet effective attack vector: the compromised update mechanism or software supply chain for a third-party editing tool. The software vendor that develops the editing tool was unaware of the issue. In fact, while their software supply chain served as a channel for attacking other organizations, they themselves were also under attack. This cyberattack could have been much more problematic if it had gone undetected. Its early discovery allowed incident responders—a collaboration of security experts from the targeted industries and developers working for the third-party software vendor—to work with Microsoft security researchers to promptly identify and neutralize the activities associated with this cyberespionage campaign.
Indicators of Compromise (0)
All
No indicators.