{"id":411863,"date":"2021-01-11T08:03:20","date_gmt":"2021-01-11T13:03:20","guid":{"rendered":"http:\/\/www.marketnewsdesk.com\/?p=411863"},"modified":"2021-01-11T08:03:20","modified_gmt":"2021-01-11T13:03:20","slug":"kaspersky-experts-connect-solarwinds-attack-with-kazuar-backdoor","status":"publish","type":"post","link":"https:\/\/www.marketnewsdesk.com\/index.php\/kaspersky-experts-connect-solarwinds-attack-with-kazuar-backdoor\/","title":{"rendered":"Kaspersky experts connect SolarWinds attack with Kazuar backdoor"},"content":{"rendered":"<div class=\"mw_release\">\n<p>Woburn, MA, Jan.  11, 2021  (GLOBE NEWSWIRE) &#8212; On December 13, 2020, FireEye, Microsoft and SolarWinds <a href=\"https:\/\/www.globenewswire.com\/Tracker?data=CgU6dt6ZZdAjhDUGDSwLc8NmTOJoOj6_H6QaCxzWCI_eTxIXgxcvD_-Nw_qGIpUy89kE8ya9WzD2uxrBRQPHcIjECaf6HqEjaK0gj5zLbuKzc3OQRmIxuAdY33CqYcg1BlkHpgRK_-WURf-0Y6q3ymtN5yB3mKeUxurHcNoz6l-6vNQpuiftXu5ix2_MzaF2\" rel=\"nofollow noopener noreferrer\" target=\"_blank\">announced<\/a> the discovery of a large, sophisticated supply chain attack that deployed a new, previously unknown malware, Sunburst, against SolarWinds\u2019 Orion IT customers. Today, <a href=\"https:\/\/www.globenewswire.com\/Tracker?data=eyt9Uv5GZobLl9x7S2CNMCp2QGaVWfPETm5UhLbqSC8wJPRMrSoTfSKCZQ-SrrFfTPBNt_wHSVllBUl-MSUYTw==\" rel=\"nofollow noopener noreferrer\" target=\"_blank\">Kaspersky<\/a> announced that its experts found various specific code similarities between Sunburst and known versions of Kazuar backdoors \u2013 malware that provides remote access to a victim\u2019s machine. The <a href=\"https:\/\/www.globenewswire.com\/Tracker?data=tI_8SAFUtfIr7-kopXZcpfPUuVoLUXfRMHzJsANHBAqDZc0v50eH6uty8aVqivOA2ga3qQFfLs6FoT9t61IsG_4Oqh1EE0TieLFVsfPIg74CHm4_ZSOv8VjONv0dDVCLu_pvzKo7jQfVXK123vEomg==\" rel=\"nofollow noopener noreferrer\" target=\"_blank\">new findings provide insights<\/a> that can help researchers move forward in the investigation of the attack.<\/p>\n<p>While studying the Sunburst backdoor, Kaspersky experts discovered a number of features that overlap with Kazuar, which has been previously identified as a backdoor written using the .NET framework. It was first <a href=\"https:\/\/www.globenewswire.com\/Tracker?data=NDTz9wj09tNOXVPGq5Ae7SKOJuu2p5IMKk7Fz2PSkSoPcalNyBdwwIXQt-_zDnORgu2euOUsCDdVf7DPxNo4OFxKmE20IDGDUCVTt_guOIse-EB9wg4NG1N9OhckrNjZN7SsqYfpqTka38-mrj9LKpakdeDhV-bVz_wRCMCqG_Qbjp-nIml5MpHbfY68LvwRPofsCBXZDGdDC80CoDqqPg==\" rel=\"nofollow noopener noreferrer\" target=\"_blank\">reported by Palo Alto in 2017<\/a> and used in cyber-espionage attacks across the globe. Multiple similarities in code suggest a connection between Kazuar and Sunburst, albeit of an undetermined nature.<\/p>\n<p>The overlapping features between Sunburst and Kazuar include the victim UID generation algorithm, the sleeping algorithm and the extensive usage of the FNV-1a hash. According to the experts, these code fragments are not 100% identical, suggesting Kazuar and Sunburst may be related, though the nature of this relation is still not entirely clear.<\/p>\n<p>After the Sunburst malware was first deployed in February 2020, Kazuar continued to evolve and later 2020 variants are even more similar, in some respects, to Sunburst.<\/p>\n<p>Overall, during the years of Kazuar\u2019s evolution, the experts observed continuous development, in which significant features bearing resemblance to Sunburst were added. While these similarities between Kazuar and Sunburst are notable, there could be a lot of reasons for their existence, including Sunburst being developed by the same group as Kazuar, Sunburst\u2019s developers using Kazuar as inspiration, a Kazuar developer moving to the Sunburst team or both groups behind Sunburst and Kazuar having obtained their malware from the same source.<\/p>\n<p>\u201cThe identified connection does not give away who was behind the SolarWinds attack, however, it provides more insights that can help researchers move forward in this investigation,\u201d said Costin Raiu, director of Kaspersky\u2019s Global Research and Analysis Team. \u201cWe believe it\u2019s important that other researchers around the world investigate these similarities and attempt to discover more facts about Kazuar and the origin of Sunburst, the malware used in the SolarWinds breach. Judging from past experience, for instance, looking back to the WannaCry attack, in the early days, there were very few facts linking it to the Lazarus group. In time, more evidence appeared and allowed us, and others, to link them together with high confidence. Further research on this topic will be crucial for connecting the dots.\u201d<\/p>\n<p>Learn more technical details about the similarities between Sunburst and Kazuar in this report on <a href=\"https:\/\/www.globenewswire.com\/Tracker?data=wygEbvRTR9lSRAEX7ftnL6uOPmqkFcpcQpk7rPuRjl1Opd2Tt9EXL-3GEymO7BVQwchlOWTMomsgGxks-KsOz527RICkT_mvPH4RDmEnQ2i_sZU03glNMCQ-LfBmI8xg\" rel=\"nofollow noopener noreferrer\" target=\"_blank\">Securelist<\/a>. Read more Kaspersky research about Sunburst <a href=\"https:\/\/www.globenewswire.com\/Tracker?data=mIemEe9qjh3SmbrW-GhiFV5elPH1AWn8ZIPv2H0Pki816_BNQN6GzLQqeK06_cKvluVQBw6T-2yGMZIwMoYLXzWOO-jQVYm1fs8lK6af1-A0dIxZPsarTo8RbxdbG8MPFDgLn6pvg5YNvjKdirwPqw==\" rel=\"nofollow noopener noreferrer\" target=\"_blank\">here<\/a> and learn how Kaspersky protects its customers against the Sunburst backdoor <a href=\"https:\/\/www.globenewswire.com\/Tracker?data=DDq1_tdW0eTLl9DDLMMxFw7gwM0P1_unVLOosEyFnL2ewQAUNQqNdl17W3W5PTL8dV86cW05vZYiugRelnwxrnzJTFNU610f5kGKAAQItKe1_hcMql9NxQA-IHeDQJ3U\" rel=\"nofollow noopener noreferrer\" target=\"_blank\">here<\/a>.<\/p>\n<p>To avoid risks of being infected by malware such as the Sunburst backdoor, Kaspersky recommends:<\/p>\n<ul>\n<li>Provide your SOC team with access to the latest threat intelligence (TI). The <a href=\"https:\/\/www.kaspersky.com\/enterprise-security\/threat-intelligence-subscription\" rel=\"nofollow noopener noreferrer\" target=\"_blank\">Kaspersky Threat Intelligence Portal<\/a> grants access to the company\u2019s TI, providing cyberattack data and insights gathered by Kaspersky for more than 20 years. Free access to its curated features that allow users to check files, URLs and IP addresses is available <a href=\"https:\/\/opentip.kaspersky.com\/\" rel=\"nofollow noopener noreferrer\" target=\"_blank\">here<\/a>.<\/li>\n<li>Organizations that would like to conduct their own investigations will benefit from the <a href=\"https:\/\/www.kaspersky.com\/enterprise-security\/cyber-attack-attribution-tool\" rel=\"nofollow noopener noreferrer\" target=\"_blank\">Kaspersky Threat Attribution Engine.<\/a> It matches discovered malicious code against malware databases and, based on code similarities, attributes it to previously revealed APT campaigns.<\/li>\n<\/ul>\n<p \/>\n<p \/>\n<p>\n        <b>About Kaspersky<\/b>\n      <\/p>\n<p>Kaspersky is a global cybersecurity company founded in 1997. Kaspersky\u2019s deep threat intelligence and security expertise is constantly transforming into innovative security solutions and services to protect businesses, critical infrastructure, governments and consumers around the globe. The company\u2019s comprehensive security portfolio includes leading endpoint protection and a number of specialized security solutions and services to fight sophisticated and evolving digital threats. Over 400 million users are protected by Kaspersky technologies and we help 250,000 corporate clients protect what matters most to them. Learn more at usa.kaspersky.com.<\/p>\n<p \/>\n<p \/>\n<p \/>\n      <img loading=\"lazy\" decoding=\"async\" class=\"__GNW8366DE3E__IMG\" src=\"https:\/\/www.globenewswire.com\/newsroom\/ti?nf=ODEyMzI3MCMzOTExOTc0IzIyMDYzOTY=\" width=\"1\" height=\"1\" \/><br \/>\n      <br \/>\n      <img loading=\"lazy\" decoding=\"async\" class=\"__GNW8366DE3E__IMG\" src=\"https:\/\/ml.globenewswire.com\/release\/track\/297ae60a-66b1-45c6-9a28-3ee5dcd1db9a\" width=\"1\" height=\"1\" \/>\n    <\/div>\n<div class=\"mw_contactinfo\">\n<pre>Sawyer Van Horn\r\nKaspersky \r\n781-503-1866\r\nsawyer.vanhorn@kaspersky.com\r\n<\/pre>\n<\/p><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Woburn, MA, Jan. 11, 2021 (GLOBE NEWSWIRE) &#8212; On December 13, 2020, FireEye, Microsoft and SolarWinds announced the discovery of a large, sophisticated supply chain attack that deployed a new, previously unknown malware, Sunburst, against SolarWinds\u2019 Orion IT customers. Today, Kaspersky announced that its experts found various specific code similarities between Sunburst and known versions of Kazuar backdoors \u2013 malware that provides remote access to a victim\u2019s machine. The new findings provide insights that can help researchers move forward in the investigation of the attack. While studying the Sunburst backdoor, Kaspersky experts discovered a number of features that overlap with Kazuar, which has been previously identified as a backdoor written using the .NET framework. It was first reported by Palo &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/www.marketnewsdesk.com\/index.php\/kaspersky-experts-connect-solarwinds-attack-with-kazuar-backdoor\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Kaspersky experts connect SolarWinds attack with Kazuar backdoor&#8221;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[],"tags":[],"class_list":["post-411863","post","type-post","status-publish","format-standard","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Kaspersky experts connect SolarWinds attack with Kazuar backdoor - Market Newsdesk<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.marketnewsdesk.com\/index.php\/kaspersky-experts-connect-solarwinds-attack-with-kazuar-backdoor\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Kaspersky experts connect SolarWinds attack with Kazuar backdoor - Market Newsdesk\" \/>\n<meta property=\"og:description\" content=\"Woburn, MA, Jan. 11, 2021 (GLOBE NEWSWIRE) &#8212; On December 13, 2020, FireEye, Microsoft and SolarWinds announced the discovery of a large, sophisticated supply chain attack that deployed a new, previously unknown malware, Sunburst, against SolarWinds\u2019 Orion IT customers. Today, Kaspersky announced that its experts found various specific code similarities between Sunburst and known versions of Kazuar backdoors \u2013 malware that provides remote access to a victim\u2019s machine. The new findings provide insights that can help researchers move forward in the investigation of the attack. While studying the Sunburst backdoor, Kaspersky experts discovered a number of features that overlap with Kazuar, which has been previously identified as a backdoor written using the .NET framework. It was first reported by Palo &hellip; Continue reading &quot;Kaspersky experts connect SolarWinds attack with Kazuar backdoor&quot;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.marketnewsdesk.com\/index.php\/kaspersky-experts-connect-solarwinds-attack-with-kazuar-backdoor\/\" \/>\n<meta property=\"og:site_name\" content=\"Market Newsdesk\" \/>\n<meta property=\"article:published_time\" content=\"2021-01-11T13:03:20+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.globenewswire.com\/newsroom\/ti?nf=ODEyMzI3MCMzOTExOTc0IzIyMDYzOTY=\" \/>\n<meta name=\"author\" content=\"Newsdesk\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Newsdesk\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/index.php\\\/kaspersky-experts-connect-solarwinds-attack-with-kazuar-backdoor\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/index.php\\\/kaspersky-experts-connect-solarwinds-attack-with-kazuar-backdoor\\\/\"},\"author\":{\"name\":\"Newsdesk\",\"@id\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/#\\\/schema\\\/person\\\/482f27a394d4fda80ecb5499e519d979\"},\"headline\":\"Kaspersky experts connect SolarWinds attack with Kazuar backdoor\",\"datePublished\":\"2021-01-11T13:03:20+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/index.php\\\/kaspersky-experts-connect-solarwinds-attack-with-kazuar-backdoor\\\/\"},\"wordCount\":670,\"image\":{\"@id\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/index.php\\\/kaspersky-experts-connect-solarwinds-attack-with-kazuar-backdoor\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.globenewswire.com\\\/newsroom\\\/ti?nf=ODEyMzI3MCMzOTExOTc0IzIyMDYzOTY=\",\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/index.php\\\/kaspersky-experts-connect-solarwinds-attack-with-kazuar-backdoor\\\/\",\"url\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/index.php\\\/kaspersky-experts-connect-solarwinds-attack-with-kazuar-backdoor\\\/\",\"name\":\"Kaspersky experts connect SolarWinds attack with Kazuar backdoor - Market Newsdesk\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/index.php\\\/kaspersky-experts-connect-solarwinds-attack-with-kazuar-backdoor\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/index.php\\\/kaspersky-experts-connect-solarwinds-attack-with-kazuar-backdoor\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.globenewswire.com\\\/newsroom\\\/ti?nf=ODEyMzI3MCMzOTExOTc0IzIyMDYzOTY=\",\"datePublished\":\"2021-01-11T13:03:20+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/#\\\/schema\\\/person\\\/482f27a394d4fda80ecb5499e519d979\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/index.php\\\/kaspersky-experts-connect-solarwinds-attack-with-kazuar-backdoor\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.marketnewsdesk.com\\\/index.php\\\/kaspersky-experts-connect-solarwinds-attack-with-kazuar-backdoor\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/index.php\\\/kaspersky-experts-connect-solarwinds-attack-with-kazuar-backdoor\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.globenewswire.com\\\/newsroom\\\/ti?nf=ODEyMzI3MCMzOTExOTc0IzIyMDYzOTY=\",\"contentUrl\":\"https:\\\/\\\/www.globenewswire.com\\\/newsroom\\\/ti?nf=ODEyMzI3MCMzOTExOTc0IzIyMDYzOTY=\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/index.php\\\/kaspersky-experts-connect-solarwinds-attack-with-kazuar-backdoor\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Kaspersky experts connect SolarWinds attack with Kazuar backdoor\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/#website\",\"url\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/\",\"name\":\"Market Newsdesk\",\"description\":\"Latest Business News in Real Time\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/#\\\/schema\\\/person\\\/482f27a394d4fda80ecb5499e519d979\",\"name\":\"Newsdesk\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a0d0bd5b0f0ca12a265a459b13169dac35f33776d8501eda5e68844a366f2f46?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a0d0bd5b0f0ca12a265a459b13169dac35f33776d8501eda5e68844a366f2f46?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a0d0bd5b0f0ca12a265a459b13169dac35f33776d8501eda5e68844a366f2f46?s=96&d=mm&r=g\",\"caption\":\"Newsdesk\"},\"url\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/index.php\\\/author\\\/newsdesk\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Kaspersky experts connect SolarWinds attack with Kazuar backdoor - Market Newsdesk","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.marketnewsdesk.com\/index.php\/kaspersky-experts-connect-solarwinds-attack-with-kazuar-backdoor\/","og_locale":"en_US","og_type":"article","og_title":"Kaspersky experts connect SolarWinds attack with Kazuar backdoor - Market Newsdesk","og_description":"Woburn, MA, Jan. 11, 2021 (GLOBE NEWSWIRE) &#8212; On December 13, 2020, FireEye, Microsoft and SolarWinds announced the discovery of a large, sophisticated supply chain attack that deployed a new, previously unknown malware, Sunburst, against SolarWinds\u2019 Orion IT customers. Today, Kaspersky announced that its experts found various specific code similarities between Sunburst and known versions of Kazuar backdoors \u2013 malware that provides remote access to a victim\u2019s machine. The new findings provide insights that can help researchers move forward in the investigation of the attack. While studying the Sunburst backdoor, Kaspersky experts discovered a number of features that overlap with Kazuar, which has been previously identified as a backdoor written using the .NET framework. It was first reported by Palo &hellip; Continue reading \"Kaspersky experts connect SolarWinds attack with Kazuar backdoor\"","og_url":"https:\/\/www.marketnewsdesk.com\/index.php\/kaspersky-experts-connect-solarwinds-attack-with-kazuar-backdoor\/","og_site_name":"Market Newsdesk","article_published_time":"2021-01-11T13:03:20+00:00","og_image":[{"url":"https:\/\/www.globenewswire.com\/newsroom\/ti?nf=ODEyMzI3MCMzOTExOTc0IzIyMDYzOTY=","type":"","width":"","height":""}],"author":"Newsdesk","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Newsdesk","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.marketnewsdesk.com\/index.php\/kaspersky-experts-connect-solarwinds-attack-with-kazuar-backdoor\/#article","isPartOf":{"@id":"https:\/\/www.marketnewsdesk.com\/index.php\/kaspersky-experts-connect-solarwinds-attack-with-kazuar-backdoor\/"},"author":{"name":"Newsdesk","@id":"https:\/\/www.marketnewsdesk.com\/#\/schema\/person\/482f27a394d4fda80ecb5499e519d979"},"headline":"Kaspersky experts connect SolarWinds attack with Kazuar backdoor","datePublished":"2021-01-11T13:03:20+00:00","mainEntityOfPage":{"@id":"https:\/\/www.marketnewsdesk.com\/index.php\/kaspersky-experts-connect-solarwinds-attack-with-kazuar-backdoor\/"},"wordCount":670,"image":{"@id":"https:\/\/www.marketnewsdesk.com\/index.php\/kaspersky-experts-connect-solarwinds-attack-with-kazuar-backdoor\/#primaryimage"},"thumbnailUrl":"https:\/\/www.globenewswire.com\/newsroom\/ti?nf=ODEyMzI3MCMzOTExOTc0IzIyMDYzOTY=","inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.marketnewsdesk.com\/index.php\/kaspersky-experts-connect-solarwinds-attack-with-kazuar-backdoor\/","url":"https:\/\/www.marketnewsdesk.com\/index.php\/kaspersky-experts-connect-solarwinds-attack-with-kazuar-backdoor\/","name":"Kaspersky experts connect SolarWinds attack with Kazuar backdoor - Market Newsdesk","isPartOf":{"@id":"https:\/\/www.marketnewsdesk.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.marketnewsdesk.com\/index.php\/kaspersky-experts-connect-solarwinds-attack-with-kazuar-backdoor\/#primaryimage"},"image":{"@id":"https:\/\/www.marketnewsdesk.com\/index.php\/kaspersky-experts-connect-solarwinds-attack-with-kazuar-backdoor\/#primaryimage"},"thumbnailUrl":"https:\/\/www.globenewswire.com\/newsroom\/ti?nf=ODEyMzI3MCMzOTExOTc0IzIyMDYzOTY=","datePublished":"2021-01-11T13:03:20+00:00","author":{"@id":"https:\/\/www.marketnewsdesk.com\/#\/schema\/person\/482f27a394d4fda80ecb5499e519d979"},"breadcrumb":{"@id":"https:\/\/www.marketnewsdesk.com\/index.php\/kaspersky-experts-connect-solarwinds-attack-with-kazuar-backdoor\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.marketnewsdesk.com\/index.php\/kaspersky-experts-connect-solarwinds-attack-with-kazuar-backdoor\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.marketnewsdesk.com\/index.php\/kaspersky-experts-connect-solarwinds-attack-with-kazuar-backdoor\/#primaryimage","url":"https:\/\/www.globenewswire.com\/newsroom\/ti?nf=ODEyMzI3MCMzOTExOTc0IzIyMDYzOTY=","contentUrl":"https:\/\/www.globenewswire.com\/newsroom\/ti?nf=ODEyMzI3MCMzOTExOTc0IzIyMDYzOTY="},{"@type":"BreadcrumbList","@id":"https:\/\/www.marketnewsdesk.com\/index.php\/kaspersky-experts-connect-solarwinds-attack-with-kazuar-backdoor\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.marketnewsdesk.com\/"},{"@type":"ListItem","position":2,"name":"Kaspersky experts connect SolarWinds attack with Kazuar backdoor"}]},{"@type":"WebSite","@id":"https:\/\/www.marketnewsdesk.com\/#website","url":"https:\/\/www.marketnewsdesk.com\/","name":"Market Newsdesk","description":"Latest Business News in Real Time","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.marketnewsdesk.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.marketnewsdesk.com\/#\/schema\/person\/482f27a394d4fda80ecb5499e519d979","name":"Newsdesk","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/a0d0bd5b0f0ca12a265a459b13169dac35f33776d8501eda5e68844a366f2f46?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/a0d0bd5b0f0ca12a265a459b13169dac35f33776d8501eda5e68844a366f2f46?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/a0d0bd5b0f0ca12a265a459b13169dac35f33776d8501eda5e68844a366f2f46?s=96&d=mm&r=g","caption":"Newsdesk"},"url":"https:\/\/www.marketnewsdesk.com\/index.php\/author\/newsdesk\/"}]}},"_links":{"self":[{"href":"https:\/\/www.marketnewsdesk.com\/index.php\/wp-json\/wp\/v2\/posts\/411863","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.marketnewsdesk.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.marketnewsdesk.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.marketnewsdesk.com\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.marketnewsdesk.com\/index.php\/wp-json\/wp\/v2\/comments?post=411863"}],"version-history":[{"count":0,"href":"https:\/\/www.marketnewsdesk.com\/index.php\/wp-json\/wp\/v2\/posts\/411863\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.marketnewsdesk.com\/index.php\/wp-json\/wp\/v2\/media?parent=411863"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.marketnewsdesk.com\/index.php\/wp-json\/wp\/v2\/categories?post=411863"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.marketnewsdesk.com\/index.php\/wp-json\/wp\/v2\/tags?post=411863"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}