Skip to content

bentoboxinfosec

many parts make the whole

  • Home
  • Blog
  • CTF Cheat Sheet
  • About
  • Home
  • 2020
  • December
  • 17
  • SOLARWINDS ORION AND THE SUNBURST BACKDOOR

SOLARWINDS ORION AND THE SUNBURST BACKDOOR

Posted on December 17, 2020May 23, 2023 By topbento No Comments on SOLARWINDS ORION AND THE SUNBURST BACKDOOR
Breach, News, Vulnerability

Compromised updates for Solarwinds Orion are making headlines for containing malware. The updates available from March through May of this year appear to have contained a very elusive and adaptable trojan that FireEye has dubbed the SUNBURST Backdoor. FireEye has published a great write-up on the attack here along with Indications of Compromise. Please be sure to read through both if you or your organization may have ever run Solarwinds Orion versions 2019.4 through 2020.2.1 HF1.

This is a frightening example of a supply side attack where an action that is normally thought of as mitigating risk, (performing an update), was weaponized against high value targets by bad actors. The behavior detailed by FireEye and further by Splunk in this article on detecting potentially compromised hosts seems perfectly tailored for an Advanced Persistent Threat. The trojan was configured to patiently wait hours or even days between scans based on the environment it found itself in. We can almost certainly expect to hear more in the coming days and weeks on the true scope of this attack and how just many organizations may have been exposed.

Additional reading here on the developing story is available here:

DHS

Malwarebytes Blog

SANS

Tags: cybersecurity news information security news security breach supply side attack

Post navigation

❮ Previous Post: FREE OPEN SOURCE THREAT INTEL SOLUTION – Intel Owl
Next Post: REMOTE CODE EXECUTION in Office 365 ❯

You may also like

News
ChatGPT AI GENERATED PHISHING CAMPAIGNS
December 9, 2022
Breach
ZERO-DAY VULNERABILITY IN Cisco Adaptive Security Appliances ALLOWS ACCESS TO GOVERNMENT NETWORKS – ArcaneDoor
April 26, 2024
Cloud
AWS Log4Shell PATCH VULNERABLE TO CONTAINER ESCAPE AND PRIV ESCALATION
April 19, 2022
News
PrintNightmare – REMOTE CODE EXECUTION in Windows Spooler Service CVE-2021-1675
July 1, 2021

Leave a Reply Cancel reply

You must be logged in to post a comment.

Recent Posts

  • Salt Typhoon THREAT ACTORS SPOTTED ON US GOVT NETWORKS BEFORE TELCOS
  • Charter and Windstream ADDED TO LIST OF TELCO PROVIDERS COMPROMISED BY Salt Typhoon
  • Cisco CONFIRMS AUTHENTICITY OF 4.45 GB DATA BREACH
  • NINTH TELECOM COMPANY ADDED TO LIST OF Salt Typhoon TARGETS
  • McDonald’s API EXPLOITED FOR ONE CENT DELIVERIES

Recent Comments

No comments to show.

Archives

  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • May 2024
  • April 2024
  • March 2024
  • September 2023
  • August 2023
  • May 2023
  • April 2023
  • March 2023
  • February 2023
  • January 2023
  • December 2022
  • November 2022
  • August 2022
  • July 2022
  • May 2022
  • April 2022
  • March 2022
  • January 2022
  • December 2021
  • November 2021
  • September 2021
  • August 2021
  • July 2021
  • January 2021
  • December 2020
  • August 2020
  • May 2020
  • March 2020
  • February 2020
  • October 2019
  • June 2019
  • April 2019

Categories

  • Breach
  • Cloud
  • Conferences
  • Hardware Hacking
  • Malware
  • News
  • Ransomware
  • Tools
  • Tutorial
  • Uncategorized
  • Vulnerability
  • Walkthough
  • Home
  • Blog
  • CTF Cheat Sheet
  • About
  • Twitter
  • Github
  • YouTube

Copyright © 2025 bentoboxinfosec.

Theme: Oceanly News Dark by ScriptsTown