<img src="https://ws.zoominfo.com/pixel/JrRu3vUM8j33QSR7Bwxw" width="1" height="1" style="display: none;">

In The News

December 28, 2020

ATT&CK: Identifying UNC2452-Related Techniques for ATT&CK

ReversingLabs’ analysis of how the attackers compromised the SolarWinds Orion software release process by blending in with the affected code base, mimicking the developer’s coding style and naming standards.
December 22, 2020

Security Week: Sophos, ReversingLabs Release 20 Million Sample Dataset for Malware Research

Sophos and ReversingLabs on Monday announced SoReL-20M, a database of 20 million Windows Portable Executable files, including 10 million malware samples.
December 22, 2020

Security Affairs: SoReL-20M Sophos & ReversingLabs release 10 million disarmed samples for malware study

Sophos and ReversingLabs released SoReL-20M, a database containing 20 million Windows Portable Executable files, including 10M malware samples.
December 22, 2020

Domaintools: Continuous Eruption: Further Analysis of the SolarWinds Supply Chain Incident

While SUNBURST activity was only identified in December 2020, analysis of campaign details and further analysis of SolarWinds software indicates the event may have started, at least in preparatory phases, over a year prior.
December 22, 2020

Security Week: SolarWinds Likely Hacked at Least One Year Before Breach Discovery

An investigation conducted by threat intelligence firm ReversingLabs showed that the first version of the Orion software modified by the hackers was actually from October 2019.
December 21, 2020

Cloud7: New details of SolarWinds hack revealed

ReversingLabs discloses compilation artifacts confirming that Orion source code was directly modified to include a malicious backdoor