Security Market Segment LS
Monday, 14 December 2020 15:56

Researchers underline care taken to craft SolarWinds trojan campaign Featured

By
Researchers underline care taken to craft SolarWinds trojan campaign Image by Gordon Johnson from Pixabay

Researchers from FireEye and Microsoft claim to have discovered a global intrusion campaign, using the Orion network monitoring system sold by SolarWinds, with a trojan being implanted into a file which was part of updates for the product; the compromised file was given the name SUNBURST. The software runs on Windows.

They said the attacker had used a number of techniques to prevent detection and hide activity, but added that these also offered some opportunities for detection. Despite the very detailed post, no hint of attribution was made. FireEye chief Kevin Mandia issued a general post about the discovery.

The campaign, which was described as being widespread and tracked as UNC2452, was said to have begun as early as the western spring and had not yet stopped, they said. FireEye announced last week that it had been compromised and had its Red Team tools stolen. 

"FireEye has detected this activity at multiple entities worldwide. The victims have included government, consulting, technology, telecom and extractive entities in North America, Europe, Asia and the Middle East," the researchers wrote. "We anticipate there are additional victims in other countries and verticals."

The compromised component was named as SolarWinds.Orion.Core.BusinessLayer.dll, a digitally signed part of the Orion software. This contained a backdoor that communicated with third-party servers using HTTP.

After systems were compromised, the attacker was able to both move laterally in a system and steal data, the researchers said, adding, "The campaign is the work of a highly skilled actor and the operation was conducted with significant operational security."

solarwinds

Named as having contributed to the research were Andrew Archer, Doug Bienstock, Chris DiGiamo, Glenn Edwards, Nick Hornick, Alex Pennino, Andrew Rector, Scott Runnels, Eric Scales, Nalani Fraiser, Sarah Jones, John Hultquist, Ben Read, Jon Leathery, Fred House, Dileep Jallepalli, Michael Sikorski, Stephen Eckels, William Ballenthin, Jay Smith, Alex Berry, Nick Richard, Isif Ibrahima, Dan Perez, Marcin Siedlarz, Ben Withnell, Barry Vengerik, Nicole Oppenheim, Ian Ahl, Andrew Thompson, Matt Dunwoody, Evan Reese, Steve Miller, Alyssa Rahman, John Gorman, Lennard Galang, Dileep Jallepalli, Fred House, Steve Stone, Nick Bennett, Matthew McWhirt, Mike Burns and Omer Baig of FireEye.

Three Microsoft researchers — Nick Carr, Christopher Glyer, and Ramin Nafisi — also made contributions.

Once the SUNBURST malware was within a system, it stayed quiescent for a fortnight, the researchers said. After that it executed software that could transfer files, run them, reboot machines as needed and also take down system services.

The malware hid itself as the Orion Improvement Program protocol and operated behind the mask of genuine SolarWinds functions. Forensic and anti-virus tools were identified from multiple blocklists.

The update file itself was a standard Windows Installer Patch that included compressed resources including the compromised DLL.

Among the samples that the researchers found were some that were using a hitherto unseen memory-only dropper that the researchers called TEARDROP and which was used to deploy the well-known tool Cobalt Strike BEACON.

Another technique used for evasion was the naming of hostnames on command-and-control infrastructure to match a hostname in the victim's environment. "This allowed the adversary to blend into the environment, avoid suspicion, and evade detection," the researchers noted.

However, this also provided an opportunity for detection as the configured hostname was leaked in RDP SSL certificates, which would be spotted in Internet-wide scan data.

Another notable feature was that the attacker mainly used IP addresses from the same country as the victim, using virtual private servers to achieve this.

The degree of care taken in crafting the attack was shown in another characteristic: the attacker always used one set of credentials for lateral movement and a different set for remote access.

Temporary file replacement was used to run utilities remotely, with the legitimate utility being replaced, the payload executed and the original file restored.

The researchers also documented, in painstaking detail, the manner in which the malware gained access, checked its environment, used a system of checks and balances so as to ensure that it would not be noticeable, and then settled down before beginning operations after two weeks.

The researchers said SolarWinds had released a new version of the Orion platform which has patched the flaw that allowed the compromise. FireEye itself offered a number of mitigation measures.

The last time malware of this kind was described, it was the Stuxnet malware, built by Israeli and American NSA actors, to destroy Iran's nuclear reactors in Natanz.


Subscribe to ITWIRE UPDATE Newsletter here

GRAND OPENING OF THE ITWIRE SHOP

The much awaited iTWire Shop is now open to our readers.

Visit the iTWire Shop, a leading destination for stylish accessories, gear & gadgets, lifestyle products and everyday portable office essentials, drones, zoom lenses for smartphones, software and online training.

PLUS Big Brands include: Apple, Lenovo, LG, Samsung, Sennheiser and many more.

Products available for any country.

We hope you enjoy and find value in the much anticipated iTWire Shop.

ENTER THE SHOP NOW!

INTRODUCING ITWIRE TV

iTWire TV offers a unique value to the Tech Sector by providing a range of video interviews, news, views and reviews, and also provides the opportunity for vendors to promote your company and your marketing messages.

We work with you to develop the message and conduct the interview or product review in a safe and collaborative way. Unlike other Tech YouTube channels, we create a story around your message and post that on the homepage of ITWire, linking to your message.

In addition, your interview post message can be displayed in up to 7 different post displays on our the iTWire.com site to drive traffic and readers to your video content and downloads. This can be a significant Lead Generation opportunity for your business.

We also provide 3 videos in one recording/sitting if you require so that you have a series of videos to promote to your customers. Your sales team can add your emails to sales collateral and to the footer of their sales and marketing emails.

See the latest in Tech News, Views, Interviews, Reviews, Product Promos and Events. Plus funny videos from our readers and customers.

SEE WHAT'S ON ITWIRE TV NOW!

BACK TO HOME PAGE
Sam Varghese

Web Analytics

Sam Varghese has been writing for iTWire since 2006, a year after the site came into existence. For nearly a decade thereafter, he wrote mostly about free and open source software, based on his own use of this genre of software. Since May 2016, he has been writing across many areas of technology. He has been a journalist for nearly 40 years in India (Indian Express and Deccan Herald), the UAE (Khaleej Times) and Australia (Daily Commercial News (now defunct) and The Age). His personal blog is titled Irregular Expression.

Share News tips for the iTWire Journalists? Your tip will be anonymous

WEBINARS ONLINE & ON-DEMAND

GUEST ARTICLES

VENDOR NEWS

Guest Opinion

Guest Interviews

Guest Reviews

Guest Research

Guest Research & Case Studies

Channel News

Comments