This week’s report of a cybersecurity attack targeting multiple U.S. companies and government networks is another reminder of the importance of maintaining a strong security posture. As it has been widely reported, hackers breached software provider SolarWinds and, subsequently, the company’s Orion software application. The intruders leveraged a planned Orion software update to users as a “trojan horse” to infect victims’ networks and steal data.
While Splunk was not impacted as our own corporate and Splunk Cloud environments do not utilize SolarWinds Orion products, we certainly empathize with those organizations targeted by the attack and stand ready to assist. Our own security researcher Ryan Kovar shared this post yesterday containing guidance on how to protect (and detect activity on) networks from the Solarwinds Supply Chain Attack using Splunk.
We are committed to supporting our customers at all times, but in particular when they are facing the toughest of security challenges. Please do not hesitate to reach out to your Splunk account manager, our Support team or any member of the Customer Success organization – Splunk is here to help. If you have been impacted by this attack or have any questions, please reach out to sunburst@splunk.com.
----------------------------------------------------
Thanks!
John Sabino
The Splunk platform removes the barriers between data and action, empowering observability, IT and security teams to ensure their organizations are secure, resilient and innovative.
Founded in 2003, Splunk is a global company — with over 7,500 employees, Splunkers have received over 1,020 patents to date and availability in 21 regions around the world — and offers an open, extensible data platform that supports shared data across any environment so that all teams in an organization can get end-to-end visibility, with context, for every interaction and business process. Build a strong data foundation with Splunk.