{"id":3607,"date":"2021-01-18T08:42:37","date_gmt":"2021-01-18T07:42:37","guid":{"rendered":"https:\/\/xopero.com\/blog\/?p=3607"},"modified":"2024-05-15T16:11:35","modified_gmt":"2024-05-15T14:11:35","slug":"solarleaks-a-new-chapter-in-the-solarwinds-data-breach","status":"publish","type":"post","link":"https:\/\/xopero.com\/blog\/en\/solarleaks-a-new-chapter-in-the-solarwinds-data-breach\/","title":{"rendered":"SolarLeaks &#8211; a new chapter in the SolarWinds data breach"},"content":{"rendered":"\n<p>SolarWinds data breach every week returns like a boomerang &#8211; this time with SolarLeaks [.]net website, whose owners claim to be selling the stolen data from Microsoft, Cisco, FireEye, and SolarWinds. And it seems there were the same attackers who abused one of Mimecast\u2019s certificates to access M365 accounts\u2026 And it\u2019s not the end of Microsoft\u2019s problems described today\u2026<\/p>\n\n\n\n<p>What more? Capcom, game manufacturer and publisher (i.e. Resident Evil, Street Fighter) released a new update for their ransomware attack and data breach investigation. The incident was worse than initially thought&#8230;<\/p>\n\n\n\n<!--more-->\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<a name=\"paragraph-1\"><\/a>\n\n\n<h2 class=\"wp-block-heading\" id=\"solarleaks-site-claims-to-sell-data-stolen-in-solarwinds-attacks\"><strong>SolarLeaks site claims to sell data stolen in SolarWinds attacks<\/strong><\/h2>\n\n\n<p>Yes, there are still rumours about SolarWinds hack and a sophisticated cyberattack that led to a supply chain attack affecting 18,000 customers. On Tuesday, a solarleaks [.]net website was launched that claims to be selling the stolen data from Microsoft, Cisco, FireEye, and SolarWinds. All of these companies are known to have been breached during the supply chain attack.<\/p>\n\n\n\n<p>The website claims to be selling Microsoft source code and repositories for $600,000. As we mentioned <a href=\"https:\/\/xopero.com\/blog\/en\/ongoing-solarwinds-breach-paypal-smishing-babuk-locker\/#paragraph-1\" target=\"_blank\" rel=\"noreferrer noopener\">in the last edition of Xopero Security Center<\/a>, Microsoft confirmed that threat actors accessed their source code during their SolarWinds breach. The threat actors also claim to be selling the source code for multiple Cisco products, even more concerning, the company&#8217;s internal bug tracker. However, the company states that there is no evidence that attackers stole their source code.<\/p>\n\n\n\n<p>What about FireEye? The website also claims to be selling the private red team tools, and source code that FireEye disclosed were stolen during their attack for $50,000.<\/p>\n\n\n\n<p>Finally, the website sells SolarWinds source code and a dump of the customer portal for $250,000.<\/p>\n\n\n\n<p>Oh, and there is a volume discount! For $1 million, you get all of the leaked data.<\/p>\n\n\n\n<p>The SolarLeaks actors state that they will be selling the stolen data in batches, and more will be released at a later date.&nbsp;<\/p>\n\n\n\n<p>When looking at the WHOIS record for solarleaks[.]net, the assigned name servers also taunt researchers with the statement &#8222;You Can Get No Info&#8221;. It is not confirmed if this site is legitimate and if the site owners have the data they are selling.<\/p>\n\n\n\n<p>Couple days later the SolarLeaks site was updated to include a new message stating that ProtonMail shutdown their email, and that buyers who want to see a sample of the data should send 100 XMR, or approximately $16,000, to a listed Monero address.<\/p>\n\n\n\n<p>To make matters worse, a copycat site at SolarLeak[.]net has been created with the same website content, but a different Monero address.&nbsp;<\/p>\n\n\n\n<p>To be continued.&nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/solarleaks-site-claims-to-sell-data-stolen-in-solarwinds-attacks\/\" target=\"_blank\" rel=\"noreferrer noopener\">Source<\/a><\/p>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<a name=\"paragraph-2\"><\/a>\n\n\n<h2 class=\"wp-block-heading\" id=\"hackers-abused-one-of-mimecasts-certificates-to-access-microsoft-365-accounts-they-could-be-the-solarwinds-attackers\"><strong>Hackers abused one of Mimecast\u2019s certificates to access Microsoft 365 accounts. They could be the SolarWinds attackers<\/strong><\/h2>\n\n\n<p>Mimecast, a company that makes cloud email management software, on Tuesday, 12th, disclosed a security incident, alerting customers that &#8222;a sophisticated threat actor&#8221; has obtained one of its digital certificates and abused it to gain access to some of its clients&#8217; Microsoft 365 accounts. The company said it learned of the incident from Microsoft after the tech giant detected unauthorized access to some accounts.<\/p>\n\n\n\n<p>The London-based email software company said the certificate in question was used by several of its products to connect to Microsoft infrastructure &#8211; including Mimecast Sync and Recover, Continuity Monitor and IEP products.<\/p>\n\n\n\n<p>The company said that around 10% of all its customers used the affected products with this particular certificate, however, the &#8222;sophisticated threat actor&#8221; abused the certificate to gain access to only a handful of these customers&#8217; Microsoft 365 accounts.<\/p>\n\n\n\n<p>The company is now asking all other customers to &#8222;immediately delete the existing connection within their M365 tenant and re-establish a new certificate-based connection using the new certificate [they]&#8217;ve made available.&#8221;<\/p>\n\n\n\n<p>An investigation into the incident is ongoing, with the company noting that it will work closely with Microsoft and law enforcement as appropriate. Interesting is that the tools and techniques used in this attack link these operators to those who recently targeted SolarWinds, The Wall Street Journal reports. Mimecast was a SolarWinds customer in the past but no longer uses the Orion software. The company has not determined how attackers got in or whether its earlier use of SolarWinds could have left it vulnerable.&nbsp;<\/p>\n\n\n\n<p>Source: <a href=\"https:\/\/www.zdnet.com\/article\/mimecast-says-hackers-abused-one-of-its-certificates-to-access-microsoft-accounts\/\" target=\"_blank\" rel=\"noreferrer noopener\">1<\/a> |&nbsp;<a href=\"https:\/\/www.darkreading.com\/threat-intelligence\/solarwinds-attackers-may-have-hit-mimecast-driving-new-concerns\/d\/d-id\/1339895\" target=\"_blank\" rel=\"noreferrer noopener\">2<\/a><\/p>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<a name=\"paragraph-3\"><\/a>\n\n\n<h2 class=\"wp-block-heading\" id=\"sophisticated-hacking-campaign-uses-windows-and-android-zerodays\"><strong>Sophisticated hacking campaign uses Windows and Android zero-days<\/strong><\/h2>\n\n\n<p>The Google Project Zero team together with the Google Threat Analysis Group (TAG), discovered a watering hole attack targeting Windows and Android systems that was carried out by a highly sophisticated actor.<\/p>\n\n\n\n<p>Threat actors behind the attacks exploited multiple vulnerabilities in Android, Windows, and chained them with Chrome flaws. The attackers exploited both zero-days and n-days exploits for the initial remote code execution to finally take over the victim\u2019s devices<\/p>\n\n\n\n<p>The attacks employed two exploit servers that were triggering multiple vulnerabilities through different exploit chains in watering hole attacks.&nbsp;<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter is-resized\"><img decoding=\"async\" src=\"https:\/\/lh6.googleusercontent.com\/YX7aLf_eAH_HyY16lMHm8sPu9D8OVX6hofGzZcRyWiSDD8YNJi9gqz1k2e-4mui7i8-FbkmRFtbVeaIsto_WjEkoP7r0IZUg4wKVXNSF5NKqDw3UJ5eJubT2IDBK6gx7Zu7bjR5g\" alt=\"\" width=\"716\" height=\"292\"\/><\/figure><\/div>\n\n\n\n<p>The experts were able to extract the following code from the exploit servers:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Renderer exploits for four bugs in Chrome, one of which was still a 0-day at the time of the discovery.<\/li><li>Two sandbox escape exploits abusing three 0-day vulnerabilities in Windows.<\/li><li>A \u201cprivilege escalation kit\u201d composed of publicly known n-day exploits for older versions of Android.<\/li><\/ul>\n\n\n\n<p>The chains used by the attackers included the following 0-days flaws:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>CVE-2020-6418 \u2013 Chrome Vulnerability in TurboFan (fixed February 2020)<\/li><li>CVE-2020-0938 \u2013 Font Vulnerability on Windows (fixed April 2020)<\/li><li>CVE-2020-1020 \u2013 Font Vulnerability on Windows (fixed April 2020)<\/li><li>CVE-2020-1027 \u2013 Windows CSRSS Vulnerability (fixed April 2020)<\/li><\/ul>\n\n\n\n<p>Google highlighted the level of sophistication of this campaign, the threat actors appear to be well resourced and the overall operations well-engineered.<\/p>\n\n\n\n<p><strong>Note: <\/strong>In another campaign hackers are actively exploiting Windows Defender Zero-Day Bug, which has been patched by Microsoft together with 83 other vulnerabilities within their products. Please update now!&nbsp;<\/p>\n\n\n\n<p>Source: <a href=\"https:\/\/securityaffairs.co\/wordpress\/113342\/hacking\/project-zero-watering-hole-attack.html\" target=\"_blank\" rel=\"noreferrer noopener\">1<\/a> |&nbsp;<a href=\"https:\/\/www.infosecurity-magazine.com\/news\/microsoft-fixes-windows-defender\/\" target=\"_blank\" rel=\"noreferrer noopener\">2<\/a><\/p>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<a name=\"paragraph-4\"><\/a>\n\n\n<h2 class=\"wp-block-heading\" id=\"capcom-390000-people-may-be-affected-in-the-recent-ransomware-attack\"><strong>Capcom: 390,000 people may be affected in the recent ransomware attack<\/strong><\/h2>\n\n\n<p>On November 2nd, Capcom suffered a cyberattack by the Ragnar Locker ransomware operation who stated they stole 1TB of data from the company. The ransomware operation demanded an $11 million ransom in bitcoins to not release the stolen files and provide a decrypter.<\/p>\n\n\n\n<p>The company has developed multiple multi-million-selling game franchises, including Street Fighter, Mega Man, Resident Evil, Darkstalkers, Devil May Cry, Dino Crisis, Onimusha, Dead Rising,&nbsp; Ghosts \u2018n Goblins, Sengoku Basara, Monster Hunter, Breath of Fire, and Ace Attorney as well as games based on Disney animated properties<\/p>\n\n\n\n<p>Last week, Capcom released a new update for their data breach investigation, that revealed the incident was worse than initially thought. The company stated that they have confirmed 16 415 people whose personal information was exposed with a possible total number of 390,000 people! Including business partners, former employees, employees and related parties.&nbsp;<\/p>\n\n\n\n<p>For the confirmed 16,406 people, Capcom states the exposed data could be a mix of names, addresses, phone numbers, email addresses and business information (sales reports, financial information, game development documents and more).<\/p>\n\n\n\n<p>BleepingComputer has been told by ransomware gangs that they save more valuable data for online auctions or to use in further attacks. This means that the data that was leaked may not be all of the data that they stole.<\/p>\n\n\n\n<p>The company pointed out that the investigation is still ongoing and that new fact may come to light.<\/p>\n\n\n\n<p><strong>Have you played Capcom games?<\/strong> Then it is safer to assume that your data was breached during the attack. Be vigilant on further phishing attacks. Better change your Capcom password, and if used at other sites, change them there as well.&nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/capcom-390-000-people-may-be-affected-by-ransomware-data-breach\/\" target=\"_blank\" rel=\"noreferrer noopener\">Source<\/a><\/p>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<a name=\"paragraph-5\"><\/a>\n\n\n<h2 class=\"wp-block-heading\" id=\"do-you-have-thirst-for-knowledge-there-are-ten-more-cybersecurity-stories-below\">Do you have thirst for knowledge? There are ten more cybersecurity stories below<\/h2>\n\n\n<p>1. Authorities take down World&#8217;s largest illegal Dark Web Marketplace (<a href=\"https:\/\/thehackernews.com\/2021\/01\/authorities-take-down-worlds-largest.html\" target=\"_blank\" rel=\"noreferrer noopener\">The Hacker News<\/a>)<strong><br><\/strong>2. EMA: Some of Pfizer\/BioNTech COVID-19 vaccine data was leaked online (<a href=\"https:\/\/securityaffairs.co\/wordpress\/113326\/data-breach\/ema-data-breach.html\" target=\"_blank\" rel=\"noreferrer noopener\">Security Affairs<\/a>)<br>3. United Nations security flaw exposed 100K staff records (<a href=\"https:\/\/www.darkreading.com\/threat-intelligence\/united-nations-security-flaw-exposed-100k-staff-records\/d\/d-id\/1339882\" target=\"_blank\" rel=\"noreferrer noopener\">DarkReading<\/a>)<br>4. Adobe fixes critical code execution vulnerabilities in 2021&#8217;s first major patch round (<a href=\"https:\/\/www.zdnet.com\/article\/adobe-patches-code-execution-vulnerabilities-in-the-first-security-update-of-2021\/\" target=\"_blank\" rel=\"noreferrer noopener\">ZDNet<\/a>)<br>5. Operation Spalax: Targeted malware attacks in Colombia (<a href=\"https:\/\/www.welivesecurity.com\/2021\/01\/12\/operation-spalax-targeted-malware-attacks-colombia\/\" target=\"_blank\" rel=\"noreferrer noopener\">WeLiveSecurity<\/a>)<br>6. SolarWinds hack investigation reveals new Sunspot malware (<a href=\"https:\/\/www.helpnetsecurity.com\/2021\/01\/12\/solarwinds-sunspot\/\" target=\"_blank\" rel=\"noreferrer noopener\">Help Net Security<\/a>)<br>7. Chinese Startup Leaks Social Profiles of 214 Million Users (<a href=\"https:\/\/www.infosecurity-magazine.com\/news\/chinese-startup-leaks-social\/\" target=\"_blank\" rel=\"noreferrer noopener\">Infosecurity Magazine<\/a>)<br>8. It&#8217;s finally over! Time to uninstall Adobe Flash Player (<a href=\"https:\/\/www.bleepingcomputer.com\/news\/software\/its-finally-over-time-to-uninstall-adobe-flash-player\/\" target=\"_blank\" rel=\"noreferrer noopener\">Bleeping Computer<\/a>)<br>9. SolarWinds Hack Potentially Linked to Turla APT (<a href=\"https:\/\/threatpost.com\/solarwinds-hack-linked-turla-apt\/162918\/\" target=\"_blank\" rel=\"noreferrer noopener\">Threat Post<\/a>)<br>10. 'Chimera&#8217; Threat Group Abuses Microsoft &amp; Google Cloud Services (<a href=\"https:\/\/www.darkreading.com\/threat-intelligence\/chimera-threat-group-abuses-microsoft-and-google-cloud-services\/d\/d-id\/1339905\" target=\"_blank\" rel=\"noreferrer noopener\">DarkReading<\/a>)<\/p>\n","protected":false},"excerpt":{"rendered":"<p>SolarWinds data breach every week returns like a boomerang &#8211; this time with SolarLeaks [.]net website, whose owners claim to be selling the stolen data from Microsoft, Cisco, FireEye, and SolarWinds. And it seems there were the same attackers who abused one of Mimecast\u2019s certificates to access M365 accounts\u2026 And it\u2019s not the end of Microsoft\u2019s problems described today\u2026 What more? Capcom, game manufacturer and publisher (i.e. Resident Evil, Street Fighter) released a new update for their ransomware attack and data breach investigation. The incident was worse than initially thought&#8230;<\/p>\n","protected":false},"author":1,"featured_media":2447,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[470],"tags":[],"class_list":["post-3607","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersec-news","post--single"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>SolarLeaks - a new chapter in the SolarWinds data breach - Xopero Blog<\/title>\n<meta name=\"description\" content=\"SolarWinds data breach every week returns like a boomerang - this time with SolarLeaks [.]net website, whose owners claim to be selling\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/xopero.com\/blog\/en\/solarleaks-a-new-chapter-in-the-solarwinds-data-breach\/\" \/>\n<meta property=\"og:locale\" content=\"pl_PL\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"SolarLeaks - a new chapter in the SolarWinds data breach - Xopero Blog\" \/>\n<meta property=\"og:description\" content=\"SolarWinds data breach every week returns like a boomerang - this time with SolarLeaks [.]net website, whose owners claim to be selling\" \/>\n<meta property=\"og:url\" content=\"https:\/\/xopero.com\/blog\/en\/solarleaks-a-new-chapter-in-the-solarwinds-data-breach\/\" \/>\n<meta property=\"og:site_name\" content=\"Xopero Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/XoperoSoftware\/\" \/>\n<meta property=\"article:published_time\" content=\"2021-01-18T07:42:37+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-05-15T14:11:35+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/04\/security-center-en.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1843\" \/>\n\t<meta property=\"og:image:height\" content=\"481\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"xopero_blogger\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@xoperobackup\" \/>\n<meta name=\"twitter:site\" content=\"@xoperobackup\" \/>\n<meta name=\"twitter:label1\" content=\"Napisane przez\" \/>\n\t<meta name=\"twitter:data1\" content=\"xopero_blogger\" \/>\n\t<meta name=\"twitter:label2\" content=\"Szacowany czas czytania\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minut\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/solarleaks-a-new-chapter-in-the-solarwinds-data-breach\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/solarleaks-a-new-chapter-in-the-solarwinds-data-breach\\\/\"},\"author\":{\"name\":\"xopero_blogger\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#\\\/schema\\\/person\\\/cab3d3cda6e8a1aecfa8abea8827b17c\"},\"headline\":\"SolarLeaks &#8211; a new chapter in the SolarWinds data breach\",\"datePublished\":\"2021-01-18T07:42:37+00:00\",\"dateModified\":\"2024-05-15T14:11:35+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/solarleaks-a-new-chapter-in-the-solarwinds-data-breach\\\/\"},\"wordCount\":1364,\"publisher\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/solarleaks-a-new-chapter-in-the-solarwinds-data-breach\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/security-center-en.png\",\"articleSection\":[\"Cybersec news\"],\"inLanguage\":\"pl-PL\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/solarleaks-a-new-chapter-in-the-solarwinds-data-breach\\\/\",\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/solarleaks-a-new-chapter-in-the-solarwinds-data-breach\\\/\",\"name\":\"SolarLeaks - a new chapter in the SolarWinds data breach - Xopero Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/solarleaks-a-new-chapter-in-the-solarwinds-data-breach\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/solarleaks-a-new-chapter-in-the-solarwinds-data-breach\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/security-center-en.png\",\"datePublished\":\"2021-01-18T07:42:37+00:00\",\"dateModified\":\"2024-05-15T14:11:35+00:00\",\"description\":\"SolarWinds data breach every week returns like a boomerang - this time with SolarLeaks [.]net website, whose owners claim to be selling\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/solarleaks-a-new-chapter-in-the-solarwinds-data-breach\\\/#breadcrumb\"},\"inLanguage\":\"pl-PL\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/solarleaks-a-new-chapter-in-the-solarwinds-data-breach\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pl-PL\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/solarleaks-a-new-chapter-in-the-solarwinds-data-breach\\\/#primaryimage\",\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/security-center-en.png\",\"contentUrl\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/security-center-en.png\",\"width\":1843,\"height\":481},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/solarleaks-a-new-chapter-in-the-solarwinds-data-breach\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Strona g\u0142\u00f3wna\",\"item\":\"https:\\\/\\\/xopero.com\\\/blog\\\/pl\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"SolarLeaks &#8211; a new chapter in the SolarWinds data breach\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/\",\"name\":\"Xopero Blog\",\"description\":\"Backup &amp; Recovery\",\"publisher\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/xopero.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pl-PL\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#organization\",\"name\":\"Xopero Software\",\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pl-PL\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/xopero-niebieskie.png\",\"contentUrl\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/xopero-niebieskie.png\",\"width\":500,\"height\":132,\"caption\":\"Xopero Software\"},\"image\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/XoperoSoftware\\\/\",\"https:\\\/\\\/x.com\\\/xoperobackup\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/opero-sp-z-o-o-\\\/?viewAsMember=true\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCRPWyeo1apjSgkDW3hZpB9g?reload=9\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#\\\/schema\\\/person\\\/cab3d3cda6e8a1aecfa8abea8827b17c\",\"name\":\"xopero_blogger\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pl-PL\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g\",\"caption\":\"xopero_blogger\"},\"sameAs\":[\"https:\\\/\\\/xopero.com\"],\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/author\\\/xopero_blogger\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"SolarLeaks - a new chapter in the SolarWinds data breach - Xopero Blog","description":"SolarWinds data breach every week returns like a boomerang - this time with SolarLeaks [.]net website, whose owners claim to be selling","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/xopero.com\/blog\/en\/solarleaks-a-new-chapter-in-the-solarwinds-data-breach\/","og_locale":"pl_PL","og_type":"article","og_title":"SolarLeaks - a new chapter in the SolarWinds data breach - Xopero Blog","og_description":"SolarWinds data breach every week returns like a boomerang - this time with SolarLeaks [.]net website, whose owners claim to be selling","og_url":"https:\/\/xopero.com\/blog\/en\/solarleaks-a-new-chapter-in-the-solarwinds-data-breach\/","og_site_name":"Xopero Blog","article_publisher":"https:\/\/www.facebook.com\/XoperoSoftware\/","article_published_time":"2021-01-18T07:42:37+00:00","article_modified_time":"2024-05-15T14:11:35+00:00","og_image":[{"width":1843,"height":481,"url":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/04\/security-center-en.png","type":"image\/png"}],"author":"xopero_blogger","twitter_card":"summary_large_image","twitter_creator":"@xoperobackup","twitter_site":"@xoperobackup","twitter_misc":{"Napisane przez":"xopero_blogger","Szacowany czas czytania":"7 minut"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/xopero.com\/blog\/en\/solarleaks-a-new-chapter-in-the-solarwinds-data-breach\/#article","isPartOf":{"@id":"https:\/\/xopero.com\/blog\/en\/solarleaks-a-new-chapter-in-the-solarwinds-data-breach\/"},"author":{"name":"xopero_blogger","@id":"https:\/\/xopero.com\/blog\/#\/schema\/person\/cab3d3cda6e8a1aecfa8abea8827b17c"},"headline":"SolarLeaks &#8211; a new chapter in the SolarWinds data breach","datePublished":"2021-01-18T07:42:37+00:00","dateModified":"2024-05-15T14:11:35+00:00","mainEntityOfPage":{"@id":"https:\/\/xopero.com\/blog\/en\/solarleaks-a-new-chapter-in-the-solarwinds-data-breach\/"},"wordCount":1364,"publisher":{"@id":"https:\/\/xopero.com\/blog\/#organization"},"image":{"@id":"https:\/\/xopero.com\/blog\/en\/solarleaks-a-new-chapter-in-the-solarwinds-data-breach\/#primaryimage"},"thumbnailUrl":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/04\/security-center-en.png","articleSection":["Cybersec news"],"inLanguage":"pl-PL"},{"@type":"WebPage","@id":"https:\/\/xopero.com\/blog\/en\/solarleaks-a-new-chapter-in-the-solarwinds-data-breach\/","url":"https:\/\/xopero.com\/blog\/en\/solarleaks-a-new-chapter-in-the-solarwinds-data-breach\/","name":"SolarLeaks - a new chapter in the SolarWinds data breach - Xopero Blog","isPartOf":{"@id":"https:\/\/xopero.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/xopero.com\/blog\/en\/solarleaks-a-new-chapter-in-the-solarwinds-data-breach\/#primaryimage"},"image":{"@id":"https:\/\/xopero.com\/blog\/en\/solarleaks-a-new-chapter-in-the-solarwinds-data-breach\/#primaryimage"},"thumbnailUrl":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/04\/security-center-en.png","datePublished":"2021-01-18T07:42:37+00:00","dateModified":"2024-05-15T14:11:35+00:00","description":"SolarWinds data breach every week returns like a boomerang - this time with SolarLeaks [.]net website, whose owners claim to be selling","breadcrumb":{"@id":"https:\/\/xopero.com\/blog\/en\/solarleaks-a-new-chapter-in-the-solarwinds-data-breach\/#breadcrumb"},"inLanguage":"pl-PL","potentialAction":[{"@type":"ReadAction","target":["https:\/\/xopero.com\/blog\/en\/solarleaks-a-new-chapter-in-the-solarwinds-data-breach\/"]}]},{"@type":"ImageObject","inLanguage":"pl-PL","@id":"https:\/\/xopero.com\/blog\/en\/solarleaks-a-new-chapter-in-the-solarwinds-data-breach\/#primaryimage","url":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/04\/security-center-en.png","contentUrl":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/04\/security-center-en.png","width":1843,"height":481},{"@type":"BreadcrumbList","@id":"https:\/\/xopero.com\/blog\/en\/solarleaks-a-new-chapter-in-the-solarwinds-data-breach\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Strona g\u0142\u00f3wna","item":"https:\/\/xopero.com\/blog\/pl\/"},{"@type":"ListItem","position":2,"name":"SolarLeaks &#8211; a new chapter in the SolarWinds data breach"}]},{"@type":"WebSite","@id":"https:\/\/xopero.com\/blog\/#website","url":"https:\/\/xopero.com\/blog\/","name":"Xopero Blog","description":"Backup &amp; Recovery","publisher":{"@id":"https:\/\/xopero.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/xopero.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pl-PL"},{"@type":"Organization","@id":"https:\/\/xopero.com\/blog\/#organization","name":"Xopero Software","url":"https:\/\/xopero.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"pl-PL","@id":"https:\/\/xopero.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2019\/03\/xopero-niebieskie.png","contentUrl":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2019\/03\/xopero-niebieskie.png","width":500,"height":132,"caption":"Xopero Software"},"image":{"@id":"https:\/\/xopero.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/XoperoSoftware\/","https:\/\/x.com\/xoperobackup","https:\/\/www.linkedin.com\/company\/opero-sp-z-o-o-\/?viewAsMember=true","https:\/\/www.youtube.com\/channel\/UCRPWyeo1apjSgkDW3hZpB9g?reload=9"]},{"@type":"Person","@id":"https:\/\/xopero.com\/blog\/#\/schema\/person\/cab3d3cda6e8a1aecfa8abea8827b17c","name":"xopero_blogger","image":{"@type":"ImageObject","inLanguage":"pl-PL","@id":"https:\/\/secure.gravatar.com\/avatar\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g","caption":"xopero_blogger"},"sameAs":["https:\/\/xopero.com"],"url":"https:\/\/xopero.com\/blog\/author\/xopero_blogger\/"}]}},"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/posts\/3607","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/comments?post=3607"}],"version-history":[{"count":7,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/posts\/3607\/revisions"}],"predecessor-version":[{"id":5866,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/posts\/3607\/revisions\/5866"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/media\/2447"}],"wp:attachment":[{"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/media?parent=3607"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/categories?post=3607"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/tags?post=3607"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}