Microsoft
is aware of a sophisticated attack that utilizes malicious SolarWinds software.
On December 17, 2020, Brad Smith posted a blog sharing the most up to date information
and detailed technical information for defenders.
As this is an ongoing investigation, Microsoft cybersecurity teams continue to
act as first responders to these attacks. We know that customers and partners
will have ongoing questions and Microsoft is committed to providing timely
updates as new information becomes available. We will make updates through our
Microsoft Security Response Center (MSRC) blog at https://aka.ms/solorigate.
There are a number of published resources to assist customers in securing their
environments:
• |
We have published a blog outlining this dynamic threat landscape |
• |
We have published an anchor blog with technical details of the attack. |
• |
Microsoft Defender antivirus and Microsoft Defender for |
• |
Microsoft Azure Sentinel has released guidance to help Azure Sentinel customers |
• |
Microsoft 365 Defender and Microsoft Defender for Endpoint |
• |
For any Microsoft Threat Experts (MTE) customers, where we |
• |
If a customer has any product support related needs, please |
• |
For Identity professionals and Microsoft 365 admin, we have |
Microsoft Blog Posts
Advisories
& Additional Resources
• |
If your customer has a specific question regarding FireEye, |
• |
If your customer has a specific question regarding SolarWinds, |
• |
The Cybersecurity and Infrastructure Security Agency (CISA) |