Background:
The federal government is reeling from multiple data breaches at top departments and agencies, the result of a worldwide hacking campaign with possible ties to Russia. The breadth and depth of the compromise is currently unknown.
According to SolarWinds, a company that provides tech services to large companies and numerous government agencies, along with Microsoft, FireEye (a publicly traded cybersecurity company), and the DHS/CISA, the attackers compromised a server used to build updates for the SolarWinds Orion Platform, a product used for IT infrastructure management.
The hackers inserted malicious code into Orion software updates pushed out to nearly 18,000 customers.
The hackers have already parlayed their access into consequential breaches at the DHS, DoD, the U.S. Treasury, the Dept. of Commerce, Dept. of State, the National Institutes of Health and others. Nearly all Fortune 500 companies use SolarWinds products to monitor their networks. So does Los Alamos National Laboratory, where nuclear weapons are designed, as well as major defense contractors.
The malicious updates were sent between March and June, just when America was hunkering down to weather the first wave of the pandemic. This left the hackers with months to exploit the compromised systems.
Key Takeaways From The Latest Alert:
"CISA has evidence of additional initial access vectors, other than the SolarWinds Orion platform; however, these are still being investigated"
"CISA has determined that this threat poses a grave risk to the Federal Government and state, local, tribal, and territorial governments as well as critical infrastructure entities and other private sector organizations."
Additionally:
- This is a patient, well-resourced, and focused adversary that has sustained long duration activity on victim networks.
- The SolarWinds Orion supply chain compromise is not the only initial infection vector this APT actor leveraged.
- Not all organizations that have the backdoor delivered through SolarWinds Orion have been targeted by the adversary with follow-on actions.
- Organizations with suspected compromises need to be highly conscious of operational security, including when engaging in incident response activities and planning and implementing remediation plans.
Read the Full Alert:
Advanced Persistent Threat Compromise of Government Agencies, Critical Infrastructure, and Private Sector Organizations