DARPA wants to overhaul legacy software to stop cyberattackers in their tracks when they penetrate a system.
For a cyberattack to be successful, one must conduct a sequence of exploits to move from the initial system access, through privilege escalation and lateral motion steps, until reaching the ultimate target. The SolarWinds attackĀ started by compromising the email account of a SolarWinds employee. This foothold was followed by other exploits to access SolarWindsā development environment and insert a backdoor into the SolarWinds product, ultimately compromising over 18,000 organizations.