![]() ![]() SolarWinds told CRN a significant majority of the executive compensation disclosed Friday relates to equity grants issued during the first quarter of 2020 or grants modified during the year due to COVID-19. In total, SolarWinds’ top six executives earned a combined $65.03 million in 2020, with $59.66 million – or nearly 92 percent – of it coming in the form of stock-based compensation. But half the SolarWinds executives in charge at the time of the hack won’t be impacted by future cuts since CEO Kevin Thompson and CTO Woong Joseph Kim have already left the company, while SolarWinds MSP President John Pagliuca will move to N-able once the spin-off is complete. SolarWinds told investors the cyberattack may impact future decisions about the company’s executive compensation program. SolarWinds has already spent at least $21.5 million to clean up and recover from the cyberattack, which includes $3.5 million in expenses incurred in December 2020. The embattled IT infrastructure management vendor said Friday that it didn’t make any adjustments to its 2020 performance-based executive compensation after the hack, according to a filing with the U.S. On its website, the NFC says it “services more than 160 diverse agencies, providing payroll services to more than 600,000 Federal employees.SolarWinds paid its top leaders more than $65 million in total last year despite a colossal breach that exposed 18,000 customers to Russian foreign intelligence service hackers. Records held by the NFC include federal employee social security numbers, phone numbers and personal email addresses as well as banking information. The NFC is responsible for handling the payroll of multiple government agencies, including several involved in national security, such as the FBI, State Department, Homeland Security Department and Treasury Department, the former officials said. But the potential impact could be “massive,” former U.S. Reuters could not determine what information the attackers were able to steal from the National Finance Center (NFC) or how deep they burrowed into its systems. The connection between the second set of attacks on SolarWinds customers and suspected Chinese hackers was only discovered in recent weeks, according to security analysts investigating alongside the U.S. While the alleged Russian hackers penetrated deep into SolarWinds network and hid a “back door” in Orion software updates which were then sent to customers, the suspected Chinese group exploited a separate bug in Orion’s code to help spread across networks they had already compromised, the sources said. ![]() government, they were separate and distinctly different operations, according to four people who have investigated the attacks and outside experts who reviewed the code used by both sets of hackers. SolarWinds did not say how the hackers first got in, except to say it was “in a way that was unrelated to SolarWinds.”Īlthough the two espionage efforts overlap and both targeted the U.S. In the case of the sole client it knew about, SolarWinds said the hackers only abused its software once inside the client’s network. banner hangs at the New York Stock Exchange (NYSE) on the IPO day of the company in New York, U.S., October 19, 2018. The sources, who spoke on condition of anonymity to discuss ongoing investigations, said the attackers used computer infrastructure and hacking tools previously deployed by state-backed Chinese cyberspies.įILE PHOTO: SolarWinds Corp. Reuters was not able to establish how many organizations were compromised by the suspected Chinese operation. government breach have not been previously reported. Security researchers have previously said a second group of hackers was abusing SolarWinds’ software at the same time as the alleged Russian hack, but the suspected connection to China and ensuing U.S. The software flaw exploited by the suspected Chinese group is separate from the one the United States has accused Russian government operatives of using to compromise up to 18,000 SolarWinds customers, including sensitive federal agencies, by hijacking the company’s Orion network monitoring software. Department of Agriculture, was among the affected organizations, raising fears that data on thousands of government employees may have been compromised. Two people briefed on the case said FBI investigators recently found that the National Finance Center, a federal payroll agency inside the U.S.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |