New York Cyber Security Firm Develops SolarWinds Breach Detection Tool; Sharing The Script Via GitHub
To comply with FTC regulations, all links could lead to commissions paid to the publisher. Please see Advertising Disclosure in sidebar.
HAUPPAUGE, NY – As news of the SolarWinds hack rocks the cyber security community, some companies have taken it upon themselves to provide new tools to combat cybercriminals. The New York based Stetson Cybergroup is sharing a script via GitHub that can download the Yara rules created by FireEye to detect indications of compromise (IoC).
CEO of Stetson Cybergroup and cybersecurity expert Brian Busto said,
“As soon as we heard about the breach and the potential impact, we immediately started working on a specific tool to run internally to detect the indications of compromise, or IoC’s, on our network and the clients we serve.”
The SolarWinds breach exposed thousands of clients in sensitive industries including Fortune 500 companies and government agencies. Among those who have acknowledged a data breach are the U.S. departments of Treasury and Commerce. SolarWinds claims that 18,000 of its 300,000 customers had downloaded the malicious code into updated versions of Orion, a network safety tool.
FREE DIGITAL SUBSCRIPTION: GET ONLY 'FEATURED' STORIES BY EMAIL
Big Tech is using a content filtering system for online censorship. Watch our short video about NewsGuard to learn how they control the narrative for the Lamestream Media and help keep you in the dark. NewsGuard works with Big-Tech to make it harder for you to find certain content they feel is 'missing context' or stories their editors deem "not in your best interest" - regardless of whether they are true and/or factually accurate. They also work with payment processors and ad-networks to cut off revenue streams to publications they rate poorly by their same bias standards. This should be criminal in America. You can bypass this third-world nonsense by signing up for featured stories by email and get the good stuff delivered right to your inbox.
Stetson Director of Cybersecurity Operations Joe Wagner cautioned,
“With an exploit in the wild like this, everyone should have access to a quick and easy way to determine if they have been compromised. We need to stop the bleeding. We need to find out how deep this got into our infrastructure, to make sure it is contained.”
The Stetson Cybergroup will continually update its detection tool with any new IoC’s that are discovered. For more information and links to the Stetson Cybergroup’s downloads go to SolarWindsIoCScanner.