Security researchers at Cisco's Talos unit have discovered a campaign they have named ArcaneDoor, which they say is "the latest example of state-sponsored actors targeting perimeter network devices from multiple vendors".
The group of attackers revealed to have compromised SolarWinds Orion monitoring software back in December 2020 are claimed to be back again, and Microsoft has given them a new name to boot.
Attacks on SolarWinds software in July were possible because the company had compiled some dynamic link libraries without Address Space Layout Randomisation, Microsoft claims in a security brief.