SolarWinds Analysis
Infoblox also analyzed the devastating SolarWinds supply chain attack, in which a nation-state breached thousands of companies and agencies.
Infoblox noted that threat actors circumvented code-signing. Software designers use certificate-based digital signatures to ensure that users know the software came from the original source. However, these cybercriminals not only got around code-signing but managed to get a legitimate SolarWinds digital signature. From there, the malicious code entered into SolarWinds’ regular distribution and propogated.
The report authors urged software suppliers to re-examine their code signing policies.
“Crafting a strategy to breach a software provider’s most secured continuous integration/continuous delivery (CI/CD) pipeline means threat actors re aiming for the heart of cyber defenses,” the report concluded.