
Updated January 15, 2021
The U.S. Department of Homeland Security (DHS) and the Cybersecurity and Infrastructure Security Agency (CISA) have confirmed that malicious threat actors have been and are actively exploiting vulnerabilities in SolarWinds Orion products, specifically affected versions 2019.4 through 2020.2.1 HF1.
The threat actor primarily leverages a malware commonly known as SUNBURST to conduct a global supply-chain attack against the SolarWinds Orion platform. SolarWinds Orion is an enterprise-grade IT monitoring solution.
This malware was seen being distributed as part of SolarWinds Orion software updates from March 2020. As part of the software update, this malware comes in the form of a dynamic linked library (DLL) that was digitally signed by SolarWinds. Once loaded by legitimate SolarWinds.BusinessLayerHost.exe or SolarWinds.BusinessLayerHostx64.exe, this malware is capable of transferring data, file execution, system profiling, rebooting and more.
Apart from being digitally signed, this malware employed other evasion tactics. These include employing Teardrop, which is a memory only dropper, to deploy a customized Cobalt Strike beacon. It also encoded strings such as domain names, user-agents, registry keys and others.
A few of the notable encoded strings are as follows:
The Command & Control traffic is also difficult to detect as it was designed to mimic legitimate SolarWinds API calls. Unlike other botnet malware which connects to their C&Cs in a regular basis, SUNBURST only communicates to the malicious server once every 12 to 14 days.
SolarWinds has confirmed the attack and has asked impacted customers using Orion to immediately upgrade to 2019.4 HF 6 or 2020.2.1 HF 1. Please visit www.solarwinds.com/securityadvisory for more information about your Orion upgrade options.
Both SolarWinds and the CISA strongly suggest that organizations using SolarWinds Orion verify the version they’re running and upgrade immediately, if required.
SonicWall Capture Labs threat researchers have investigated the vulnerability and published multiple signatures in different categories that identify malicious activity against affected SolarWinds Orion versions. It includes application identification signatures that detect if an organization has SolarWinds Orion deployed within its network; malicious domain signatures; malicious IPs; malware such as Sunburst, Supernova and Teardrop. These signatures are applied automatically to SonicWall firewalls with active security subscriptions.
Application signatures – identify SolarWinds Orion applications:
IPS signatures – identify malicious domains:
GAV signatures – identify malwares:
Sunburst - Backdoor malware that has been trojanized into multiple SolarWinds Orion update versions.
Supernova - a webshell planted in the code of the Orion network and applications monitoring platform and enabled adversaries to run arbitrary code on machines running the trojanized versions of the software.
Teardrop - a memory only dropper that runs as a service
Domain Blacklist:
SonicWall products and real-time security services can help organizations identify and mitigate SUNBURST malware and other attacks against vulnerable SolarWinds Orion versions.
To verify you have the latest SonicWall Intrusion Prevention Signatures (IPS), please follow the steps in this knowledgebase (KB) article: https://www.sonicwall.com/support/knowledge-base/detailed-information-on-intrusion-prevention-signature-ips-signature-ids/170505742887527/
Share This Article

An Article By
An Article By
Security News
Security News