Anatomy of the SolarWinds Hack: Who What Where When How
The a16z Show1 Helmi 2021

Anatomy of the SolarWinds Hack: Who What Where When How

In this special “3x”-long episode of our (otherwise shortform) news analysis show 16 Minutes -- past such 2-3X explainer episodes have covered section 230, Tiktok, GPT-3, the opioid crisis, more -- we cover the SolarWinds hack, one of the largest (if not the largest!) publicly known hacks of all time... and the ripple effects are only now starting to be revealed. Just this week, the U.S. Cybersecurity and Infrastructure Security Agency shared (as reported in the Wall Street Journal) that approximately 30% of both private-sector and government victims linked to the hack had no direct connection to SolarWinds. So who was compromised, do they even know, can they even know?!

Because this hack is a supply-chain compromise involving various third-party software and services all connected together in a "chain of chains", the knock-on effects of it will be revealed (or not!) for years to come. So what do companies -- whether large enterprise, mid-sized startup, or small business -- do? What actually happened, and when does the timeline really begin? While first publicly revealed in December 2020 -- we first covered the news in episode #49 here when it first broke, and there have been countless headlines since (about early known government agency victims, company investigations, other tool investigations, debates over who and how and so on) -- the hack actually began not just a few months but years earlier, involving early tests, legit domains, and a very long game.

We help cut through the headline fatigue of it all, tease apart what's hype/ what's real, and do an "anatomy of a hack" step-by-step teardown -- the who, what, where, when, how; from the chess moves to technical details -- in an in-depth yet accessible way with Sonal Chokshi in conversation with a16z expert and former CSO Joel de la Garza and outside expert Steven Adair, founder and president of Volexity. The information security firm (which specializes in incident response, digital forensics/ memory analysis, network monitoring, and more) not only posted guidance for responding to such attacks, but also an analysis based on working three separate incidents involving the SolarWinds hackers. But how did they know it was the same group? And why was it not quite the perfect crime?

image: Heliophysics Systems Observatory spacecraft characterize, in the highest cadence, the constant stream of particles exploding from the sun affect Earth, the planets, and beyond via NASA Goddard Space Flight Center / Flickr

Stay Updated:

Find a16z on YouTube: YouTube

Find a16z on X

Find a16z on LinkedIn

Listen to the a16z Show on Spotify

Listen to the a16z Show on Apple Podcasts

Follow our host: https://twitter.com/eriktorenberg

Please note that the content here is for informational purposes only; should NOT be taken as legal, business, tax, or investment advice or be used to evaluate any investment or security; and is not directed at any investors or potential investors in any a16z fund. a16z and its affiliates may maintain investments in the companies discussed. For more details please see a16z.com/disclosures.


Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Jaksot(1000)

a16z Podcast: Why SaaS Revenue is Worth More Than Traditional Software Sales

a16z Podcast: Why SaaS Revenue is Worth More Than Traditional Software Sales

Andreessen Horowitz Managing Partner Scott Kupor and NetSuite CFO Ron Gill get into the weeds on SaaS valuations, and how public and private SaaS companies think differently about the recurring revenu...

16 Touko 201526min

a16z Podcast: Verizon Plus AOL -- Why? -- The Short Answer is Mobile

a16z Podcast: Verizon Plus AOL -- Why? -- The Short Answer is Mobile

The battle of the pipes has shifted to mobile. Verizon caught plenty of people by surprise when it announced it was buying AOL for $4.4 billion in cash (the cash part deserves a short moment to sink i...

12 Touko 201512min

a16z Podcast: Good Bubbles, Bad Bubbles -- and Where Unicorns Come from

a16z Podcast: Good Bubbles, Bad Bubbles -- and Where Unicorns Come from

Venture capital and investing in startups is the (modern) classic case of decision making under uncertainty. As new players and sources of capital enter the market, however, how do we hedge against th...

11 Touko 201535min

a16z Podcast: Making Security More Useable

a16z Podcast: Making Security More Useable

The days of cramming security down employees’ throats or sending out best-practices advice emails are over. “You have to make security more useable,” says Pindrop CEO and co-founder Vijay Balasubraman...

8 Touko 201530min

a16z Podcast: Barbarians at the Gate -- How to Think About Enterprise Security Today

a16z Podcast: Barbarians at the Gate -- How to Think About Enterprise Security Today

Enterprises large and small run their applications and infrastructure at a whole new level of agility and speed. But unfortunately, security doesn’t like speed. “The faster you go, the harder it is to...

7 Touko 201525min

a16z Podcast: Making Sense of Big Data, Machine Learning, and Deep Learning

a16z Podcast: Making Sense of Big Data, Machine Learning, and Deep Learning

"Machine learning is to big data as human learning is to life experience," says Christopher Nguyen, the co-founder and CEO of big data intelligence company Adatao. Sure, but then, what IS big data? (e...

1 Touko 201527min

a16z Podcast: Software and Overcoming the Randomness of Birthplace

a16z Podcast: Software and Overcoming the Randomness of Birthplace

If your income can flow from any place on the globe, and you can earn your money on the Internet, the question for individuals and startup teams alike increasingly is: where do I go? In the tech indus...

30 Huhti 201535min

a16z Podcast: Getting Security Right Isn’t as Hard as You Think (But the Effort Never Ends)

a16z Podcast: Getting Security Right Isn’t as Hard as You Think (But the Effort Never Ends)

The paradox of security is we pretty much know what we are supposed to do most of the time -- but we don’t do it. If you examine all the recent high profile attacks, somebody in the organization knew ...

29 Huhti 201528min

Suosittua kategoriassa Liike-elämä ja talous

sijotuskasti
rss-rahapodi
psykopodiaa-podcast
mimmit-sijoittaa
rss-oivalluksia-rahasta-elamasta
hyva-paha-johtaminen
rss-rahamania
rss-paasipodi
ostan-asuntoja-podcast
rahapuhetta
rss-sisalto-kuntoon
herrasmieshakkerit
leadcast
lakicast
rss-lahtijat
rss-startup-ministerio
rss-kaikki-somesta
rss-karon-grilli
rss-inderes
rss-set-for-life-sijoita-ja-vaurastu