Threat Assessors Scrambling to Clean up the Mess After SolarWinds Orion Hack

  • By Dawna M. Roberts
  • Published: Dec 21, 2020
  • Last Updated: Mar 18, 2022

After last week's report of the SolarWinds Orion attack, threat assessors are scrambling to determine who was affected and how to clean up the enormous post-hacking mess.

Who Was Affected?

Data Breach Today reported late last week that SolarWinds supply chain vendors were affected by their hack. Some of the companies on the list include Cisco, Intel, FireEye, five government agencies including the State and Treasury departments, the National Institutes of Health, Homeland Security, and Commerce Department. 

How Have Threat Assessors Responded?

According to Data Breach Today, FireEye, in conjunction with GoDaddy and Microsoft, have "identified a kill switch that would prevent SUNBURST from continuing to operate. This kill switch will affect new and previous SUNBURST infections by disabling SUNBURST deployments that are still beaconing to avsvmcloud[.]com."

Other threat researchers are working on other temporary solutions. One Chinese firm, RedDrip Team, released a decoder tool on GitHub that cybersecurity professionals can use to decode a partial list of the victims.

The FBI, CISA, and ODNI are working on their own investigations into the organized attacks. Threat researchers theorize that the hackers could have potentially had access to SolarWinds devices and data for more than ten months. First looks indicate that the attack was backed by the Russian government and carried out by a hacker group called APT29 or Cozy Bear.

Unfortunately, along with identifying some of the issues, they have uncovered further vulnerabilities within the SolarWinds systems. They have also determined that more than 18,000 organizations downloaded the malicious update to their SolarWinds products. That level of exposure and risk is unthinkable. 

SolarWinds Response

In a panic-fueled notification, the U.S. Cybersecurity and Infrastructure Agency on Sunday urged customers to "disconnect or power down all SolarWinds Orion products immediately." SolarWinds has issued their own notice stating that "a highly sophisticated, manual supply chain attack on SolarWinds Orion Platform software builds for versions 2019.4 HF 5 through 2020.2.1, released between March 2020 and June 2020." They recommend that customers upgrade immediately and on Tuesday will have the security patches promised.

SolarWinds reported to the SEC that 33,000 customers use their devices, but only 18,000 of them downloaded the malicious update. As a side note, two heavy investors (totaling more than 70% ownership of SolarWinds) sold their stake in the company, and SolarWinds stock plummeted 23%. Both companies denied any wrongdoing and said the sales were already in the works. 

However, the SEC is taking a hard look at the suspicious trades, and a spokesperson said, "Large trades in advance of a major announcement, then an announcement: That is a formula for an insider trading investigation."

What Now?

FireEye, SolarWinds, Microsoft, and the CISA are working closely together and sharing notes about their findings. Their aim is to provide mitigation for affected vendors, customers, and agencies while also parsing the chain of events to understand how it happened and how to prevent future cyber attacks.

A spokesperson for Microsoft said that this "massive software supply chain intrusion" was "the most carefully planned, complex espionage I've ever helped uncover."

Because this attack covered so many different victims, it is still unclear what the ultimate goal was and how much damage is already in the works. Data Breach Today warns that "the victims have included government, consulting, technology, telecom and extractive entities in North America, Europe, Asia, and the Middle East, and it also expects that more victims will be uncovered and says it has been directly notifying all suspected victims it finds."

Some threat assessors believe that the decision of the hackers to exploit FireEye was a mistake that has cost them early detection and enormous threat response. They may not have been done with their mission, and it might have been cut short by that one false move.

How Should Customers Respond?

Shut down all devices and patch them immediately as soon as the updates are available. Keep checking SolarWinds' website for other security patches and updates and make it a part of your regular maintenance routine.

  • Run full/deep scans of your antivirus/anti-malware software to ensure no other traces of anything sinister ended up in your network, on computers, or other devices. 
  • Be sure to implement monitoring software and cybersecurity threat protection. It's a battlefield out there, and the good guys are not winning right now. You cannot be too careful.
  • If you are connected to vendors or third-party services, let them know about your data breach.

Everyone is in this together and needs to work as a unified front to keep the entire supply chain safe. Finally, keep abreast of what is going on with this situation and watch for any updates so you can take quick action.

About the Author
IDStrong Logo

Related Articles

Instagram Vulnerability Allowed Hackers Access to Control Your Phone

Security experts Check Point Research discovered a critical vulnerability while examining Instagra ... Read More

Alien Malware Infects More than 226 Mobile Apps and Steals Bank Data

As reported on September 24, 2020, by ZDNet and ThreatPost, a new strain of malware named “A ... Read More

Universal Health Systems Hit by Ransomware Attack

Universal Health Systems (UHS), a Fortune 500 company owning more than 400 hospitals across the co ... Read More

Exchange Server Bug Exposes a Big Risk to Hackers

Months after Microsoft released a patch to fix a serious flaw in MS Exchange Server, more than 61% ... Read More

Clients’ Bank Data Exposed in Blackbaud Ransomware Attack

Blackbaud software was victim to a ransomware attack last May, and new information suggests that c ... Read More

Latest Articles

Google Voice Scams: What They Are and How to Stay Safe

Google Voice Scams: What They Are and How to Stay Safe

Google Voice scams continue to pose a risk for users of this service. Scammers continuously attempt to lure users into divulging their verification PIN code.

What Are Pretexting Attacks: Scam Types and Security Tips?

What Are Pretexting Attacks: Scam Types and Security Tips?

Have you ever received a text from someone you do not know? Did you become alarmed by the message? Did the message contain information about you and the people you know?

What is a Time-based One-time Password (TOTP)?

What is a Time-based One-time Password (TOTP)?

Authentication is the process that verifies the user's identity to control access to resources, prevent unauthorized users from gaining access to the system, and record user activities (to hold them accountable for their activities).

Featured Articles

How to Buy a House with Bad Credit

How to Buy a House with Bad Credit

Buying your own home is the American Dream, but it might seem out of reach to those with bad credit. However, the good news is, if your credit is less than perfect, you do still have options and in most cases, can still buy a home.

How Secure Is Your Password? Tips to Improve Your Password Security

How Secure Is Your Password? Tips to Improve Your Password Security

Any good IT article on computers and network security will address the importance of strong, secure passwords. However, the challenge of good passwords is that most people have a hard time remembering them, so they use simple or obvious ones that pose a security risk.

Top 10 Senior Scams and How to Prevent Them

Top 10 Senior Scams and How to Prevent Them

Senior scams are becoming a major epidemic for two reasons. First, seniors often have a lot of money in the bank from a life of working hard and saving.

Notice

By proceeding with this scan, you agree to let IDStrong run a Free Scan of supplied parameters of your personal information and provide free preliminary findings in compliance with our Terms of Use and Privacy Notice. You consent to us using your provided information to complete the Free Scan and compare it against our records and breach databases or sources to provide your Free preliminary findings report.

Rest assured: IDStrong will not share your information with third parties or store your information beyond what is required to perform your scan and share your results.

Free Identity Threat Scan
Instantly Check if Your Personal Information is Exposed
All fields below are required
Please enter first name
Please enter last name
Please enter a city
Please select a state
Please enter an age
Please enter an email address
Close