SecLytics’ Augur Predicts IOCs used in SolarWinds Hack
By:
In a powerful demonstration of the value of predictive intelligence, SecLytics’ Augur Predictive Threat Intelligence Platform accurately flagged significant command and control (C2) infrastructure used as part of the Sunburst malware hack of SolarWinds’ Orion software.
Where traditional threat intelligence solutions could only warn once the supply chain hack had been publicly identified, Augur users got advance warnings. Clients using Augur’s Firewall and other endpoint integrations were also protected by automated blocking of beaconing routes.
In Q1 2020, Augur detected the build-up of attack infrastructure attributed to two command and control infrastructure nodes associated with the Sunburst malware - eight months before the hack was made public. By zero-day, according to some reports, nearly 18,000 systems may have been infected.
By Identifying threat groups and associated infrastructure build-up, Augur can accurately predict attacks before they occur. Augur provides SOC teams with a critical tool for improving overall security posture and minimizing risk from zero-day attacks.
If you want to talk to an expert about how Augur’s predictive intelligence can improve your overall security posture, email us at augur@seclytics.com.