Australia markets closed
  • ALL ORDS

    7,406.30
    +36.90 (+0.50%)
     
  • ASX 200

    7,213.20
    +37.70 (+0.53%)
     
  • AUD/USD

    0.6802
    +0.0026 (+0.38%)
     
  • OIL

    70.43
    -1.03 (-1.44%)
     
  • GOLD

    1,810.50
    +9.00 (+0.50%)
     
  • BTC-AUD

    25,208.08
    -258.78 (-1.02%)
     
  • CMC Crypto 200

    403.33
    -2.92 (-0.72%)
     
  • AUD/EUR

    0.6448
    +0.0038 (+0.60%)
     
  • AUD/NZD

    1.0593
    -0.0023 (-0.22%)
     
  • NZX 50

    11,596.03
    -21.11 (-0.18%)
     
  • NASDAQ

    11,627.81
    -9.68 (-0.08%)
     
  • FTSE

    7,476.63
    +4.46 (+0.06%)
     
  • Dow Jones

    33,644.62
    -136.86 (-0.41%)
     
  • DAX

    14,370.72
    +106.16 (+0.74%)
     
  • Hang Seng

    19,900.87
    +450.64 (+2.32%)
     
  • NIKKEI 225

    27,901.01
    +326.58 (+1.18%)
     

SolarWinds says it's facing SEC 'enforcement action' over 2020 hack

The long hangover from a 2020 state-sponsored compromise still isn't over for SolarWinds, as the software giant targeted by Russian government hackers has to pony up $26 million to shareholders and face possible enforcement action from the federal government.

In a recent 8-K filing with the U.S. Securities and Exchange Commission, SolarWinds said it reached an agreement with shareholders, who sued the company alleging they were misled about the 2020 hack. Investors accused the software house, which makes network management tools used by corporations and government departments, of misrepresenting its security and failing to adequately monitor cybersecurity risks. SolarWinds will not accept any liability or admit fault as part of the shareholder suit, if a court agrees to the settlement.

SolarWinds was initially hacked as far back as in 2019 by hackers associated with Russia's foreign intelligence service, who broke in to the company's network and planted a backdoor in the company's flagship Orion network management product, which when pushed as a tainted software updates to customers, allowing the Russian hackers to further access the networks of every network running the compromised SolarWinds software. News of the attack began to emerge a year later in late 2020.

Several government departments, including NASA, the Justice Department and Homeland Security, were compromised by the mass breach, with the bulk of victims including private companies, like security giant FireEye, Fortune 500 companies, and hospitals and universities.

The U.S. government later attributed the hack to the Russian government as part of a long-running espionage campaign.

In the same filing, SolarWinds also said it received a Wells notice from the SEC, informing the company of the regulator's intention to file enforcement action "with respect to its cybersecurity disclosures and public statements, as well as its internal controls and disclosure controls and procedures." SolarWinds said its disclosures and public statements at the time of the breach were "appropriate," but did not elaborate.

The SEC began investigating the SolarWinds breach in 2021, including whether some companies failed to disclose that they were affected by the breach and allegations of possible insider trading, according to The Washington Post.

Spokespeople for the SEC, which does not comment on its investigations, and SolarWinds, did not respond to a request for comment.