[ALERT] ADVISORY ON SUPPLY CHAIN ATTACK ON SOLARWINDS ORION PLATFORM SOFTWARE (SUNBURST BACKDOOR)

Background

FireEye has uncovered a widespread campaign, that they are tracking as UNC2452. The actors behind this campaign gained access to numerous public and private organizations around the world. They gained access to victims via trojanized updates to SolarWind’s Orion IT monitoring and management software. This incident may have begun as early as Spring 2020 and is currently ongoing. Post compromise activity following this supply chain compromise has included lateral movement and data theft.

SolarWinds.Orion.Core.BusinessLayer.dll is a SolarWinds digitally-signed component of the Orion software framework that contains a backdoor that communicates via HTTP to third party servers. FireEye are tracking the trojanized version of this SolarWinds Orion plug-in as SUNBURST.

 

Impact

  • Subdomain DomainName Generation Algorithm (DGA) is performed to vary DNS requests
  • CNAME responses point to the C2 (Command & Control) domain for the malware to connect to.
  • The IP block of A record responses controls malware behavior
  • Command and control traffic masquerades as the legitimate Orion Improvement Program
  • Code hides in plain site by using fake variable names and tying into legitimate components

Affected Version

  • Orion Platform versions 2019.4 HF 5 and 2020.2 with no hotfix or 2020.2 HF 1, including:
    • Application Centric Monitor (ACM)
    • Database Performance Analyzer Integration Module (DPAIM)
    • Enterprise Operations Console (EOC)
    • High Availability (HA)
    • IP Address Manager (IPAM)
    • Log Analyzer (LA)
    • Network Automation Manager (NAM)
    • Network Configuration Manager (NCM)
    • Network Operations Manager (NOM)
    • Network Performance Monitor (NPM)
    • NetFlow Traffic Analyzer (NTA)
    • Server & Application Monitor (SAM)
    • Server Configuration Monitor (SCM)
    • Storage Resource Monitor (SCM)
    • User Device Tracker (UDT)
    • Virtualization Manager (VMAN)
    • VoIP & Network Quality Manager (VNQM)
    • Web Performance Monitor (WPM)

Recommendations

  • Upgrade to Orion Platform release 2020.2.1 HF 1, with additional mitigation and hardening
  • Ensure that SolarWinds servers are isolated / contained until a further review and investigation is conducted. This should include blocking all Internet egress from SolarWinds servers.
  • If SolarWinds infrastructure is not isolated, consider taking the following steps:
    • Restrict scope of connectivity to endpoints from SolarWinds servers, especially those that would be considered Tier 0 / crown jewel assets
    •  Restrict the scope of accounts that have local administrator privileged on SolarWinds servers.
  • Block Internet egress from servers or other endpoints with SolarWinds software.
  • Consider (at a minimum) changing passwords for accounts that have access to SolarWinds servers / infrastructure. Based upon further review / investigation, additional remediation measures may be required.
  •  If SolarWinds is used to managed networking infrastructure, consider conducting a review of network device configurations for unexpected / unauthorized modifications. Note, this is a proactive measure due to the scope of SolarWinds functionality, not based on investigative findings.