Case Studies: Historical Grid
SolarWinds Orion Supply Chain (2020)
SUNBURST: The Supply Chain Attack That Reached 18,000 Organizations
In December 2020, state-sponsored attackers embedded a backdoor called SUNBURST into SolarWinds Orion software updates, compromising 18,000 organizations including nine US federal agencies. The malware lay dormant for two weeks before activation, communicating via DNS beaconing that mimicked legitimate Orion traffic. Its discovery forced investigators to develop new methodologies to distinguish compromised telemetry from authentic network data — a foundational challenge directly mirrored in this week's Trivy compromise.
Colonial Pipeline Ransomware (2021)
One Compromised Password Shut Down 45% of US East Coast Fuel Supply
The DarkSide ransomware attack on Colonial Pipeline in May 2021 forced a six-day shutdown of 5,500 miles of fuel pipeline serving 45% of the US East Coast. Attackers gained initial access via a single compromised VPN credential with no MFA enforced — the account had not been used in months but remained active. The incident became the primary basis for CISA's OT/ICS network segmentation guidance and defined critical infrastructure incident response planning for years.
OPM Data Breach (2014–2015)
21.5 Million Fingerprints — The Worst Espionage Breach in US History
Chinese state actors exfiltrated the complete security clearance files — including fingerprints, personal histories, and foreign contacts — of 21.5 million federal employees and contractors from the Office of Personnel Management. The breach went undetected for over a year. Forensic investigators found the attackers had used stolen credentials from an OPM contractor as their initial access vector, establishing a direct line between third-party vendor risk and catastrophic data loss.
Target POS Breach (2013)
40 Million Cards Stolen Through an HVAC Vendor
Attackers stole 40 million credit and debit card numbers from Target's point-of-sale systems by first compromising Fazio Mechanical, a small HVAC contractor with remote network access. The case pioneered retail DFIR methodology, introduced RAM scraping malware to mainstream incident response, and remains the definitive case study in third-party supply chain risk — directly applicable to this week's Trivy CI/CD pipeline intrusion.
— Page 2 —