Security Market Segment LS
Monday, 14 December 2020 15:08

SolarWinds product used to attack private, public sector: FireEye claim Featured

By
SolarWinds product used to attack private, public sector: FireEye claim Image by Mudassar Iqbal from Pixabay

American cyber security firm FireEye, which last week said it had suffered a breach and lost its attack tools, says it has identified a global campaign to compromise public and private sector bodies through corruption of software supply chains, using software that runs on Windows.

Chief executive Kevin Mandia said in a blog post on Sunday (Monday AEDT) that the compromise was executed through the Orion network monitoring product sold by SolarWinds.

The product has extremely wide usage, with 400 of the so-called Fortune 500, and the top telcos, the US military, the US State Department, the NSA and the Office of the President of the US, all using the same NMS.

Mandia described the attackers as having the best operational tradecraft and resourcing similar to that which those operating on behalf of a country would have. But, unlike his tendency in the past, he stopped short of attribution.

He said the attacks — which numerous researchers from FireEye and three from Microsoft detailed in a long technical post — had four common elements:

  • "Use of malicious SolarWinds update: Inserting malicious code into legitimate software updates for the Orion software that allow an attacker remote access into the victim’s environment;
  • "Light malware footprint: Using limited malware to accomplish the mission while avoiding detection;
  • "Prioritisation of stealth: Going to significant lengths to observe and blend into normal network activity; and
  • "High OPSEC: Patiently conducting reconnaissance, consistently covering their tracks, and using difficult-to-attribute tools."

The last time malware was spread by compromising updates was in the case of CCleaner, software from security vendor Avast that allows Windows users to perform routine maintenance on their systems.

solarwinds

Earlier on Sunday, there were reports that attackers had compromised the US Treasury Department and other government agencies, with Microsoft Office 365 being blamed for the intrusion.

Mandia did not say definitely that the attacks he described had also included one on his own company, but anyone reading his post would have drawn just that very conclusion.

He said numerous organisations had been identified as being affected, going right back to the western spring of 2020 and they had been notified.

"Our analysis indicates that these compromises are not self-propagating; each of the attacks require meticulous planning and manual interaction," Mandia said. "Our ongoing investigation uncovered this campaign, and we are sharing this information consistent with our standard practice.

"We have been in close co-ordination with SolarWinds, the FBI, and other key partners. We believe it is critical to notify all our customers and the security community about this threat so organisations can take appropriate steps. As this activity is the subject of an ongoing FBI investigation, there are also limits to the information we are able to share at this time."

Read 4344 times

Please join our community here and become a VIP.

Subscribe to ITWIRE UPDATE Newsletter here
JOIN our iTWireTV our YouTube Community here
BACK TO LATEST NEWS here

SONICWALL 2022 CYBER THREAT REPORT

The past year has seen a meteoric rise in ransomware incidents worldwide.

Over the past 12 months, SonicWall Capture Labs threat researchers have diligently tracked the meteoric rise in cyberattacks, as well as trends and activity across all threat vectors, including:

Ransomware
Cryptojacking
Encrypted threats
IoT malware
Zero-day attacks and more

These exclusive findings are now available via the 2022 SonicWall Cyber Threat Report, which ensures SMBs, government agencies, enterprises and other organizations have the actionable threat intelligence needed to combat the rising tide of cybercrime.

Click the button below to get the report.

GET REPORT!

PROMOTE YOUR WEBINAR ON ITWIRE

It's all about Webinars.

Marketing budgets are now focused on Webinars combined with Lead Generation.

If you wish to promote a Webinar we recommend at least a 3 to 4 week campaign prior to your event.

The iTWire campaign will include extensive adverts on our News Site itwire.com and prominent Newsletter promotion https://itwire.com/itwire-update.html and Promotional News & Editorial. Plus a video interview of the key speaker on iTWire TV https://www.youtube.com/c/iTWireTV/videos which will be used in Promotional Posts on the iTWire Home Page.

Now we are coming out of Lockdown iTWire will be focussed to assisting with your webinars and campaigns and assistance via part payments and extended terms, a Webinar Business Booster Pack and other supportive programs. We can also create your adverts and written content plus coordinate your video interview.

We look forward to discussing your campaign goals with you. Please click the button below.

MORE INFO HERE!

BACK TO HOME PAGE
Sam Varghese

Sam Varghese has been writing for iTWire since 2006, a year after the site came into existence. For nearly a decade thereafter, he wrote mostly about free and open source software, based on his own use of this genre of software. Since May 2016, he has been writing across many areas of technology. He has been a journalist for nearly 40 years in India (Indian Express and Deccan Herald), the UAE (Khaleej Times) and Australia (Daily Commercial News (now defunct) and The Age). His personal blog is titled Irregular Expression.

Share News tips for the iTWire Journalists? Your tip will be anonymous

WEBINARS ONLINE & ON-DEMAND

GUEST ARTICLES

VENDOR NEWS

Guest Opinion

Guest Interviews

Guest Reviews

Guest Research

Guest Research & Case Studies

Channel News

Comments