The biggest hack ever in the digitized world: at least two independently operating hacking companies have been building backdoors into digitally signed updates to SolarWinds network software since mid-2019. Moreover, since the end of 2020, numerous Microsoft Exchange servers have been compromised by the hacker group Hafnium. Apparently, government agencies and the world’s largest companies across all industries (defense contractors, technology companies, banks, consultants, pharma/chemical, utilities, telecoms and commodities) in North America, Europe, Asia, the Middle East and also Germany have been affected – especially their cloud usage. There was access to classified data. This made it possible to manipulate not only IT but also production control systems. The extent of the damage is not even foreseeable, the attacks go on – may be for years! However, US authorities such as the FBI and others are already calling the attack the ‘Pearl Harbor of the information age’ and are anticipating further attackers and attacks.
How exactly could this happen? And how can such attacks using zero-day-vulnerabilities and backdoors be detected?
softScheck GmbH recaps this latest incident and explains the latest insights. In order to get a deeper understanding of the attack, the procedure of such a hack will be shown by a presentation, where a backdoor is injected into a Docker container via a signed update. Lessons will be drawn and explained how backdoors can be methodically identified and closed.
- Demo: installing backdoors
- Identifying backdoors
Date 2021: Thursday, May 27, 2021 5 p.m. UTC+2. Partner offer of the Alliance for Cyber Security
Duration: 1 Hour
Price: 185 € (plus VAT). Free of charge for Cyber Alliance members.
Prerequisites: Basic IT knowledge
Delivery: This workshop is offered as a webinar and therefore completely digital. This saves you time compared to the classic workshop: There is no need to travel to and from the workshop.
Technical requirements: The workshop is conducted using the browser-based software BigBlueButton.
- A common and up-to-date web browser (e.g. Mozilla Firefox – or also Google Chrome, Microsoft Edge)
- A fast and stable internet connection
- Headphones or speakers on your end device
In order to be able to clarify technical difficulties, we open the room an hour earlier. At the beginning of the webinar, we turn off all cameras and all microphones to protect your privacy. If you have any questions, you are of course welcome to ask them in text form in the chat, or with a short note very welcome in person – only for this we would turn on your camera and microphone after your explicit permission. At the end of the webinar, we re-enable your microphones and cameras to allow for an open Q&A session.