Diamond Member Pelican Press 0 Posted March 15 Diamond Member Share Posted March 15 Everything you need to know 2020 was a roller coaster of major, world-shaking events. We all couldn’t wait for the year to end. But just as 2020 was about to close, it pulled another fast one on us: the SolarWinds hack, one of the biggest cybersecurity breaches of the 21st century. The SolarWinds hack was a major event not because a single company was breached, but because it triggered a much larger supply chain incident that affected thousands of organizations, including the U.S. government. What is SolarWinds? SolarWinds is a major software company based in Tulsa, Okla., which provides system management tools for network and infrastructure monitoring, and other technical services to hundreds of thousands of organizations around the world. Among the company’s products is an IT performance monitoring system called Orion. As an IT monitoring system, SolarWinds Orion has privileged access to IT systems to obtain log and system performance data. It is that privileged position and its wide deployment that made SolarWinds a lucrative and attractive target. What is the SolarWinds hack? The SolarWinds hack is the commonly used term to refer to the supply chain breach that involved the SolarWinds Orion system. In this hack, suspected nation-state hackers that have been identified as a group known as Nobelium by This is the hidden content, please Sign In or Sign Up — and often simply referred to as the SolarWinds Hackers by other researchers — gained access to the networks, systems and data of thousands of SolarWinds customers. The breadth of the hack is unprecedented and one of the largest, if not the largest, of its kind ever recorded. More than 30,000 public and private organizations — including local, state and federal agencies — use the Orion network management system to manage their IT resources. As a result, the hack compromised the data, networks and systems of thousands when SolarWinds inadvertently delivered the ********* malware as an update to the Orion software. SolarWinds customers weren’t the only ones affected. Because the hack exposed the inner workings of Orion users, the hackers could potentially gain access to the data and networks of their customers and partners as well — enabling affected victims to grow exponentially from there. Hackers compromised a digitally signed SolarWinds Orion network monitoring component, opening a ********* into the networks of thousands of SolarWinds government and enterprise customers. How did the SolarWinds hack happen? The hackers used a method known as a supply chain ******* to insert malicious code into the Orion system. A supply chain ******* works by targeting a third party with access to an organization’s systems rather than trying to hack the networks directly. The third-party software, in this case the SolarWinds Orion Platform, creates a ********* through which hackers can access and impersonate users and accounts of victim organizations. The malware could also access system files and blend in with legitimate SolarWinds activity without detection, even by antivirus software. SolarWinds was a perfect target for this kind of supply chain *******. Because their Orion software is used by many multinational companies and government agencies, all the hackers had to do was install the malicious code into a new batch of software distributed by SolarWinds as an update or patch. The SolarWinds hack timeline Here is a timeline of the SolarWinds hack: September 2019. Threat actors gain unauthorized access to SolarWinds network October 2019. Threat actors test initial code injection into Orion Feb. 20, 2020. Malicious code known as Sunburst injected into Orion March 26, 2020. SolarWinds unknowingly starts sending out Orion software updates with hacked code According to a U.S. Department of Homeland Security This is the hidden content, please Sign In or Sign Up , the affected versions of SolarWinds Orion are versions are 2019.4 through 2020.2.1 HF1. More than 18,000 SolarWinds customers installed the malicious updates, with the malware spreading undetected. Through this code, hackers accessed SolarWinds’s customer information technology systems, which they could then use to install even more malware to spy on other companies and organizations. Who was affected? According to reports, the malware affected many companies and organizations. Even government departments such as Homeland Security, State, Commerce and Treasury were affected, as there was evidence that emails were missing from their systems. Private companies such as FireEye, This is the hidden content, please Sign In or Sign Up , Intel, Cisco and Deloitte also suffered from this *******. The breach was first detected by cybersecurity company FireEye. The company confirmed they had been infected with the malware when they saw the infection in customer systems. FireEye labeled the SolarWinds hack “UNC2452” and identified the ********* used to gain access to its systems through SolarWinds as “Sunburst.” This is the hidden content, please Sign In or Sign Up also confirmed that it found signs of the malware in its systems, as the breach was affecting its customers as well. Reports indicated This is the hidden content, please Sign In or Sign Up ’s own systems were being used to further the hacking *******, but This is the hidden content, please Sign In or Sign Up denied this claim to news agencies. Later, the company worked with FireEye and GoDaddy to block and isolate versions of Orion known to contain the malware to cut off hackers from customers’ systems. They did so by turning the domain used by the ********* malware used in Orion as part of the SolarWinds hack into a ***** switch. The ***** switch here served as a mechanism to prevent Sunburst from operating further. Nonetheless, even with the ***** switch in place, the hack is still ongoing. Investigators have a lot of data to look through, as many companies using the Orion software aren’t yet sure if they are free from the ********* malware. It will take a long time before the full impact of the hack is known. Why did it take so long to detect the SolarWinds *******? With attackers having first gained access to the SolarWinds systems in September 2019 and the ******* not being publicly discovered or reported until December 2020, attackers may well have had 14 or more months of unfettered access. The time it takes between when an attacker is able to gain access and the time an ******* is actually discovered is often referred to as dwell time. According to a report released in January 2020 by security firm CrowdStrike, the average dwell time in 2019 was 95 days. Given that it took well over a year from the time the attackers first entered the SolarWinds network until the breach was discovered, the dwell time in the ******* exceeded the average. The question of why it took so long to detect the SolarWinds ******* has a lot to do with the sophistication of the Sunburst code and the hackers that ********* the *******. “Analysis suggests that by managing the intrusion through multiple servers based in the ******* States and mimicking legitimate network traffic, the attackers were able to circumvent threat detection techniques employed by both SolarWinds, other private companies, and the federal government,” SolarWinds said in its This is the hidden content, please Sign In or Sign Up . FireEye, which was the first firm to publicly report the *******, conducted its own This is the hidden content, please Sign In or Sign Up of the SolarWinds *******. In its report, FireEye described in detail the complex series of action that the attackers took to mask their tracks. Even before Sunburst attempts to connect out to its command-and-control server, the malware executes a number of checks to make sure no antimalware or forensic analysis tools are running. What was the purpose of the hack? The purpose of the hack ******** largely unknown. Still, there are many reasons hackers would want to get into an organization’s system, including having access to future product plans or employee and customer information held for ransom. It is also not yet clear what information, if any, hackers stole from government agencies. But the level of access appears to be deep and broad. There are speculations that many enterprises might be collateral damage, as the main focus of the ******* was government agencies that make use of the SolarWinds IT management systems. Who was responsible for the hack? Federal investigators and cybersecurity agents believe a Russian espionage operation — mostly likely Russia’s Foreign Intelligence Service — is This is the hidden content, please Sign In or Sign Up . The Russian government has denied any involvement in the *******, releasing a statement that said, “Malicious activities in the information space contradicts the principles of the Russian foreign policy, national interests and understanding of interstate relations.” They also added that “Russia does not conduct offensive operations in the cyber domain.” Contrary to experts in his administration, then-President Donald Trump hinted at around the time of the discovery of the SolarWinds hack that ******** hackers might be behind the cybersecurity *******. However, he did not present any evidence to back up his claim. Shortly after his inauguration, President Joe Biden vowed that his administration intended to hold Russia accountable, through the launch of a full-scale intelligence assessment and review of the SolarWinds ******* and those behind it. The president also This is the hidden content, please Sign In or Sign Up as part of the National Security Council. The role, held by veteran intelligence operative Anne Neuberger, is part of an overall bid by the Biden administration to refresh the federal government’s approach to cybersecurity and better respond to nation-state actors. Naming the *******: What is Solorigate, Sunburst and Nobelium? The SolarWinds ******* has a number of different names associated with it. While the ******* is often referred to simply as the SolarWinds *******, that isn’t the only name to know. Sunburst. This is the name of the actual malicious code injection that was planted by hackers into the SolarWinds Orion IT monitoring system code. Both SolarWinds and CrowdStrike generally refer to the ******* as Sunburst. Solorigate. This is the hidden content, please Sign In or Sign Up initially dubbed the actual threat actor group behind the SolarWinds ******* as Solorigate. It’s a name that stuck and was adopted by other researchers as well as media. Nobelium. In March 2021, This is the hidden content, please Sign In or Sign Up decided that the primary designation for the threat actor behind the SolarWinds ******* should actually be Nobelium — the idea being that the group is active against multiple victims — not just SolarWinds — and uses more malware than just Sunburst. The China connection to the SolarWinds ******* While it is suspected that the initial Sunburst code and the ******* against SolarWinds and its users came from a threat actor based in Russia, other nation-state threat actors have also used SolarWinds in attacks. According to a This is the hidden content, please Sign In or Sign Up , suspected nation-state hackers based in China exploited SolarWinds during the same ******* of time the Sunburst ******* occurred. The suspected China-based threat actors targeted the National Finance Center, which is a payroll agency within the U.S. Department of Agriculture. It is suspected that the China-based attackers did not use Sunburst, but rather a different malware that SolarWinds identifies as This is the hidden content, please Sign In or Sign Up . Why is the SolarWinds hack important? The SolarWinds supply chain ******* is a global hack, as threat actors turned the Orion software into a ******* gaining access to several government systems and thousands of private systems around the world. Due to the nature of the software — and by extension the Sunburst malware — having access to entire networks, many government and enterprise networks and systems face the risk of significant breaches. The hack could also be the catalyst for rapid, broad change in the cybersecurity industry. Many companies and government agencies are now in the process of devising new methods to react to these types of attacks before they happen. Governments and organizations are learning that it is not enough to build a firewall and hope it protects them. They have to actively seek out vulnerabilities in their systems, and either shore them up or turn them into traps against these types of attacks. Since the hack was discovered, SolarWinds has recommended customers update their existing Orion platform. The company has released This is the hidden content, please Sign In or Sign Up discovered since the initial Orion *******. SolarWinds also recommended customers not able to update Orion isolate SolarWinds servers and/or change passwords for accounts that have access to those servers. The greater White House cybersecurity focus will be crucial, some industry experts have said. But organizations should consider adopting modern software-as-a-service tools for monitoring and collaboration. While the cybersecurity industry has significantly advanced in the last decade, these kinds of attacks show that there is still a long way to go to get really secure systems. The Nobelium group continues to ******* targets The suspected threat actor group behind the SolarWinds ******* has remained active in 2021 and hasn’t stopped at just targeting SolarWinds. On May 27, 2021, This is the hidden content, please Sign In or Sign Up that Nobelium, the group allegedly behind the SolarWinds *******, infiltrated software from email marketing service Constant Contact. According to This is the hidden content, please Sign In or Sign Up , Nobelium targeted approximately 3,000 email accounts at more than 150 different organizations. The initial ******* vector appears to be an account used by USAID. From that initial foothold, Nobelium was able to send out phishing emails in an attempt to get victims to click on a link that would deploy a ********* ******* designed to steal user information. Podcast: SolarWinds attacks come into focus Download this podcast Need for software bill of materials highlighted in aftermath of ******* In the aftermath of the *******, the U.S. Cybersecurity and Infrastructure Security Agency This is the hidden content, please Sign In or Sign Up on software supply chain compromise mitigations. The guidance provides specific tactical recommendations on what organizations should look for to identify and remove potentially exploited components. As it turned out, the SolarWinds incident was one of multiple attacks in 2020 and 2021 that highlighted risks with supply chain security. Incidents such as the Colonial Pipeline ******* in May 2021 and the Kaseya ransomware ******* in July 2021 demonstrated how attackers were able to exploit vulnerabilities in components of the software supply chain to affect a wider group of vendors. Modern software applications no longer rely on a monolithic stack of discrete software components. Developers now build applications out of many components that can come from many sources. Any one of the components that makes up an application could potentially represent a risk if there is an unpatched vulnerability. As such, it is critical for developers, organizations they work for and end users that consume applications be aware of all the different components that make up an application. It’s an approach that is known as a software bill of materials (SBOM). An SBOM is like a “nutritional label” that is present on packaged food products, clearly showing consumers what’s inside a product. The need for SBOMs was mandated by an This is the hidden content, please Sign In or Sign Up issued in May 2021 by the Biden Administration. The executive order led to the National Telecommunications and Information Administration This is the hidden content, please Sign In or Sign Up released in July 2021 that provides guidance on SBOM best practices and minimum requirements. The executive orders also mandated that U.S. government agencies only work with software vendors that provide SBOMs. “Those who operate software can use SBOMs to quickly and easily determine whether they are at potential risk of a newly discovered vulnerability,” the Executive Order stated. SEC legal action In June 2023, the U.S. Securities and Exchange Commission (SEC) sent SolarWinds a Wells notice at the conclusion of their investigation. It informed former and current executives that the SEC intends to recommend civil enforcement action, alleging that SolarWinds broke federal security laws in public statements and internal controls related to the hack. For example, the company continued to distribute updates infected with the APT29 malware after the initial breach. The Wells notice states that the SEC intends to bring legislation against SolarWinds but is not a formal charge. The purpose of a Wells notice is to give the recipient time to argue that the charges should not be *****. SolarWinds CEO Sudhakar Ramakrishna will explore resolution with the SEC and maintains that SolarWinds responded appropriately to the *******. The company has maintained that the ******* was unforeseeable, highly sophisticated and backed by a world power. SolarWinds also settled a class action lawsuit October 2022, paying out $26 million to shareholders who maintained that SolarWinds neglected internal security preceding the breach and misled the public about its digital security. In October 2023, the SEC sued SolarWinds and CISO Timothy Brown, stating the company concealed its cybersecurity vulnerabilities before it was attacked. This is the first time the SEC has sued the victim of a cyberattack. SolarWinds plans to ****** the charges in court. This is the hidden content, please Sign In or Sign Up This is the hidden content, please Sign In or Sign Up Link to comment https://hopzone.eu/forums/topic/3056-everything-you-need-to-know/ Share on other sites More sharing options...
Recommended Posts
Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
Register a new accountSign in
Already have an account? Sign in here.
Sign In Now