Znaczenie cyberataku na SolarWinds

2021
online paper
other article
dc.abstract.enOn December 13th, 2020, a news of a security breach in the unclassified networks of several government agencies swept through the media. As it soon turned out, it was one of the most perilous and sophisticated attacks the public opinion has heard of in recent years. The list of victims included many US Departments including the Department of Homeland Security (DHS) and the Cyber Security and Infrastructure Agency (CISA). At least several hundred private companies around the world were also compromised. There were several vectors of the attack. But they all add up to the most dangerous type of attack, the Advanced Persistent Threat (APT). The entire operation may have started as early as in mid-2018 (the date of the creation of the first domain included in the botnet's control network, command, and control, C2), although the attack itself began in March 2020 and continued until June of that year, when the malware was inserted into the source code of an update for the Orion network management software manufactured by SolarWinds, a US-based company. As a result, 18,000 entities downloaded and installed the update exposing their own systems to the attack.pl
dc.affiliationWydział Studiów Międzynarodowych i Politycznych : Instytut Nauk Politycznych i Stosunków Międzynarodowychpl
dc.contributor.authorSajduk, Błażej - 174202 pl
dc.date.accession2023-03-08pl
dc.date.accessioned2023-03-08T12:35:15Z
dc.date.available2023-03-08T12:35:15Z
dc.date.issued2021pl
dc.date.openaccess0
dc.description.accesstimew momencie opublikowania
dc.description.additionalKomentarz KBN nr 1 (73) / 2021, data opublikowania online: 12 stycznia 2021pl
dc.description.physical1-5pl
dc.description.versionostateczna wersja wydawcy
dc.identifier.urihttps://ruj.uj.edu.pl/xmlui/handle/item/308817
dc.identifier.weblinkhttps://zbn.inp.uj.edu.pl/documents/92718966/141790378/Komentarz73-Sajduk.pdf/604cbd11-339b-4380-8003-61bad1e3fc98pl
dc.languagepolpl
dc.rightsUdzielam licencji. Uznanie autorstwa - Użycie niekomercyjne - Na tych samych warunkach 4.0 Międzynarodowa*
dc.rights.licenceCC-BY-NC-SA
dc.rights.urihttp://creativecommons.org/licenses/by-nc-sa/4.0/legalcode.pl*
dc.share.typeinne
dc.subtypeOtherArticlepl
dc.titleZnaczenie cyberataku na SolarWindspl
dc.title.alternativeThe significance of the cyber-attack on SolarWindspl
dc.title.containerKatedra Bezpieczeństwa Narodowego UJpl
dc.typeOnlinePaperpl
dspace.entity.typePublication
dc.abstract.enpl
On December 13th, 2020, a news of a security breach in the unclassified networks of several government agencies swept through the media. As it soon turned out, it was one of the most perilous and sophisticated attacks the public opinion has heard of in recent years. The list of victims included many US Departments including the Department of Homeland Security (DHS) and the Cyber Security and Infrastructure Agency (CISA). At least several hundred private companies around the world were also compromised. There were several vectors of the attack. But they all add up to the most dangerous type of attack, the Advanced Persistent Threat (APT). The entire operation may have started as early as in mid-2018 (the date of the creation of the first domain included in the botnet's control network, command, and control, C2), although the attack itself began in March 2020 and continued until June of that year, when the malware was inserted into the source code of an update for the Orion network management software manufactured by SolarWinds, a US-based company. As a result, 18,000 entities downloaded and installed the update exposing their own systems to the attack.
dc.affiliationpl
Wydział Studiów Międzynarodowych i Politycznych : Instytut Nauk Politycznych i Stosunków Międzynarodowych
dc.contributor.authorpl
Sajduk, Błażej - 174202
dc.date.accessionpl
2023-03-08
dc.date.accessioned
2023-03-08T12:35:15Z
dc.date.available
2023-03-08T12:35:15Z
dc.date.issuedpl
2021
dc.date.openaccess
0
dc.description.accesstime
w momencie opublikowania
dc.description.additionalpl
Komentarz KBN nr 1 (73) / 2021, data opublikowania online: 12 stycznia 2021
dc.description.physicalpl
1-5
dc.description.version
ostateczna wersja wydawcy
dc.identifier.uri
https://ruj.uj.edu.pl/xmlui/handle/item/308817
dc.identifier.weblinkpl
https://zbn.inp.uj.edu.pl/documents/92718966/141790378/Komentarz73-Sajduk.pdf/604cbd11-339b-4380-8003-61bad1e3fc98
dc.languagepl
pol
dc.rights*
Udzielam licencji. Uznanie autorstwa - Użycie niekomercyjne - Na tych samych warunkach 4.0 Międzynarodowa
dc.rights.licence
CC-BY-NC-SA
dc.rights.uri*
http://creativecommons.org/licenses/by-nc-sa/4.0/legalcode.pl
dc.share.type
inne
dc.subtypepl
OtherArticle
dc.titlepl
Znaczenie cyberataku na SolarWinds
dc.title.alternativepl
The significance of the cyber-attack on SolarWinds
dc.title.containerpl
Katedra Bezpieczeństwa Narodowego UJ
dc.typepl
OnlinePaper
dspace.entity.type
Publication
Affiliations

* The migration of download and view statistics prior to the date of April 8, 2024 is in progress.

Views
23
Views per month
Views per city
Warsaw
8
Katowice
2
Krakow
2
Balatonalmádi
1
Borkowo Lostowickie
1
Bytom
1
Münster
1
Rzeszów
1
Wroclaw
1
Zator
1
Downloads
sajduk_znaczenie_cyberataku_na_solarwinds_2021.pdf
366