SolarWinds Hires New Cybersecurity Firm Founded by Former CISA Director Chris Krebs and Alex Stamos, Former Security Chief at Yahoo and Facebook
Following a significant security incident that sent shockwaves through the global cybersecurity community, SolarWinds has hired a newly formed cybersecurity consulting firm founded by Chris Krebs, former director of the U.S. Cybersecurity and Infrastructure Security Agency (CISA) and Alex Stamos, former security chief at Facebook and Yahoo.
Generically named the Krebs Stamos Group (KSG), its website currently shows limited information about the firm, saying its goal is to “help organizations turn their greatest cybersecurity challenges into triumphs.”
The consulting firm will apparently help customers assess their security posture, provide them with advice on “critical, long-lasting decisions,” and help them create cybersecurity teams, processes, programs and culture.
SolarWinds confirmed on Thursday that it has hired the company launched by Krebs and Stamos.
“We have brought in the expertise of Chris Krebs and Alex Stamos to assist in this review and provide best-in-class guidance on our journey to evolve into an industry leading secure software development company,” SolarWinds said in a statement to the media.
SecurityWeek has reached out to KSG for additional information about the company and its work for SolarWinds, but the company has yet to respond.
Krebs was fired from CISA in November by U.S. President Donald Trump after he refuted claims of electoral fraud and vouched for the integrity of the recent presidential election. After leaving Facebook in August 2018, Stamos became director of the Internet Observatory at Stanford University.
In the meantime, the U.S. government and cybersecurity companies continue to investigate the SolarWinds breach. According to some media reports, investigators are looking into the potential role played in the attack by a product from JetBrains, a software development firm based in the Czech Republic.
JetBrains said it was not aware of any investigation, but did not rule out that its TeamCity software was somehow exploited by hackers, either due to a misconfiguration or a vulnerability.
The United States this week officially said Russia was likely behind the attack on SolarWinds, an accusation that the Kremlin has denied. There is also some evidence that a second, unrelated threat actor may have also targeted SolarWinds.
While SolarWinds said that 18,000 customers may have used a compromised verison of its Orion product, the fallout is believed to have resulted in at least 250 private sector and government organizations being breached. The list of government victims includes the U.S. Justice Department, which admitted this week that hackers may have accessed some Microsoft 365 email accounts, but claimed there was no evidence that classified systems were compromised.