More Details About ‘SolarWinds’ Attacks Have Emerged

  • Sunburst could have been deployed by more hacking groups, as experts see evidence about at least two actors.
  • Several tech giants have admitted having been compromised by the malware, but most say they weren’t exploited.
  • There may also be a second backdoor besides that pushed through the SolarWinds Orion app.

As the infosec research community and cyber-security firms remain focused on figuring out the extent of the damage from the supply chain attack on SolarWinds systems, more details surface every day. It all started with FireEye, then blew fully with the U.S. Treasury, and soon after that, it became clear that many federal agencies had been compromised in the same way. The first estimations by experts talked about the high chances of this being the work of “Cozy Bear,” the elusive Russian state actor, but it now appears that there’s a lot more going on.

According to forensic analysts in the field, the “Sunburst” malware contained in the laced Orion update came from two different directions, i.e., two hacking groups. The diligent and highly-sophisticated one that bothered to sign the backdoor with a valid digital certificate, and one that didn’t. The latter sounds like a “Fancy Bear” practice, so the two Russian hacking groups may have used the same malware but differently.

Then there are the details that emerge about who has been affected. Initially, SolarWinds said the number could be as high as 18,000, so there’s a lot to figure out on that part. So far, the following firms have confirmed Sunburst breaches:

  • Microsoft
  • Intel
  • Oracle
  • Cisco
  • Deloitte
  • VMware
  • Belkin
  • Kent State University
  • California Department of State Hospitals

Many of the giants mentioned above have admitted the breach via a statement but clarified that the malware hadn’t found its way downstream to client-facing solutions. Others are suspected of having played a key role in the infection.

Some firms found indicators of compromise on their internal networks but didn’t see any indication of exploitation. With the malicious Orion update being pushed to such a large number of systems, it is obvious that hackers couldn’t follow up with all targets.

And to make matters even more complicated, CISA has previously stated that they have evidence the hackers didn’t use only the SolarWinds backdoor as a way in, but at least one more backdoor. However, no further details have been publicly shared about this possibility yet.



Pinelands Regional School District Announced Data Breach

Pinelands Regional School District concluded an investigation about a data breach they had in March this year.The breach happened using then board...

Banking Trojan Targets 100 Organizations in Brazil

A banking trojan from Latin America was found targeting almost 100 Brazilian organizations and individuals.The malware was first noticed in late August...

The Number of Phishing Emails Impersonating Craigslist Is Growing

Craigslist Gsuite & Microsoft users are being targeted with phishing emails that present a fake user login page.These emails rely on brand...
For a better user experience we recommend using a more modern browser. We support the latest version of the following browsers: For a better user experience we recommend using the latest version of the following browsers: Chrome, Edge, Firefox, Safari