Bitdefender’s Response to Fire Eye and SolarWinds Breaches and Recommendations for Organizations

  • Bitdefender Labs has been working around the clock updating our technologies including antimalware engines and detect and response solutions to identify the leaked FireEye tools and any of their associated behaviors.
  • Our threat hunters are leveraging the latest threat intelligence and indicators of compromise associated with the attacks to proactively protect customer environments.
  • We have launched our own investigations including reverse engineering of the malware and backdoor samples collected from these attacks and will share any new findings with law enforcement and the greater cybersecurity community.
  • An audit of our suppliers, partners, contractors and outsourcers concluded SolarWinds solutions are not incorporated into any products or services we procure.
  • Although Bitdefender does not use any SolarWinds solutions in its operations, a thorough systems check concluded no indication of compromise from the attack.
  • We have hardened our environment against specific techniques used in this attack and will continue to fortify through evaluations and tabletop exercises as new information becomes available.
  • Perform a thorough risk assessment to identify potential security gaps and weaknesses across your entire supply chain at least once a year.
  • For organizations that develop software, implement software procedures that require validation through multiple reviews before new code reaches production.
  • For organizations with production software environments as part of their core business, incorporate periodic security testing that looks for anomalous processes and network traffic behaviors in addition to classic application bugs.



Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Gigasec Services Limited

Gigasec Services Limited

We design solutions that enable our clients monitor and control assets and resources in the field from anywhere leveraging on Internet Protocol Technology.