twitter Facebook Linkedin acp contact us

Palo Alto Networks launches rapid response programme for organisations navigating SolarStorm cyberattacks

Security

Palo Alto Networks has launched a rapid response programme to help SolarWinds Orion customers navigate risks from cyberattacks

SolarWinds Orion products are currently being exploited by malicious actors to gain access to the company’s systems, tracked by Palo Alto Networks’ Unit 42 as SolarStorm.

In launching the program, Palo Alto Networks shared that its Cortex XDR platform had successfully prevented an attempted SolarStorm attack. As well as immediately blocking the attempt, the company’s systems have deployed a set of compromise indicators to Palo Alto Networks’ products.

“SolarStorm is one of the most serious cyberattacks in history, and we must come together as a security community with our customers and partners to help enterprises and governments defend themselves,” said Nikesh Arora, chairman and CEO, Palo Alto Networks. “While Cortex XDR protected Palo Alto Networks and our XDR customers from attack, many other security teams are now working through this. We need to work together and swiftly.”

Based on the company’s experience in managing this threat, as well as its expertise in the field of attack surface management, incident response, and extended detection and response, Palo Alto Networks is offering a rapid response package to help businesses and governments quickly manage this threat:

SolarStorm rapid assessment: This complimentary assessment will quickly determine if this threat actor has compromised customers by leveraging Palo Alto Networks’ Expanse platform together with the Crypsis incident response team.

SolarStorm cybersecure engagement: Customers who believe they have been impacted can engage directly in a short-term retainer with the Crypsis incident response team, who will help organisations contain and recover from the attack. During this period, customers will also receive licenses for both Cortex XDR and Expanse for two months.