NATO announced it is checking its systems after the SolarWinds supply chain attack to determine if they were infected with a backdoor.
“At this time, no evidence of compromise has been found on any NATO networks. Our experts continue to assess the situation, with a view to identifying and mitigating any potential risks to our networks,” a NATO official told AFP.
“NATO also has cyber rapid reaction teams on standby to assist Allies 24 hours a day, and our Cyberspace Operations Centre is operational,” said the official, who was not identified in line with NATO’s policy.
This means that NATO is one of the customers of SolarWinds, but its experts immediately launched an investigation into the attack to determine the potential impact on its infrastructure.
SolarWinds confirmed that up to 18,000 customers, including government agencies and Fortune 500 companies, were impacted by the attack.
Other clients of SolarWinds are the U.K. National Health Service, European Parliament, and NATO.
“The U.K. government is a significant client of SolarWinds. According to marketing materials and procurement documents, the Orion platform is used by Home Office as well as regional police forces.” reported Bloomberg. “The U.K. agency that regulates medicines and medical devices is a client, while AstraZeneca Plc, the company behind a potential Covid-19 vaccine, recently advertised for a senior consultant role that required experience working with SolarWinds’ products.”
(SecurityAffairs – hacking, SolarWinds)