{"id":5823,"date":"2020-12-22T16:28:08","date_gmt":"2020-12-23T00:28:08","guid":{"rendered":"https:\/\/blogs.infoblox.com\/?p=5823"},"modified":"2024-08-07T12:22:35","modified_gmt":"2024-08-07T19:22:35","slug":"solarwinds-and-sunburst-update","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory\/solarwinds-and-sunburst-update\/","title":{"rendered":"SolarWinds and SUNBURST Update"},"content":{"rendered":"<p>Authors: Victor Sandin and Darby Wise<br \/>\nTLP:WHITE<\/p>\n<h3>1.\u00a0 Executive Summary<\/h3>\n<p>On 15 December, Infoblox released a Cyber Threat Advisory on the supply chain attack affecting SolarWinds\u2019 Orion IT monitoring and management software.<sup>1<\/sup> This advisory detailed FireEye\u2019s report on the campaign, including analysis on the SUNBURST backdoor, initial information on the threat actor\u2019s tactics, techniques and procedures (TTPs), as well as the mitigations and indicators of compromise (IOCs) that were most current at the time.<sup>2<\/sup> The threat actor behind the campaign carried out a complex attack chain and demonstrated highly sophisticated TTPs, indicating it was the work of an advanced persistent threat (APT) group. Known victims include government agencies, as well as private sector and critical infrastructure organizations.<sup>3<\/sup><\/p>\n<p>Since the publishing of our previous report, we have gathered additional information about the wide-ranging effects of this campaign, and are conducting several internal investigations. We are publishing this update to share some of the latest information from OSINT, as well as convey what we have been able to validate. This report also includes additional IOCs.<\/p>\n<h3>2.\u00a0 Analysis<\/h3>\n<h4>\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 2.1.\u00a0 \u00a0Updates on Supply Chain Attack<\/h4>\n<p>As previously reported, the threat actor used a highly sophisticated attack chain to deliver malicious code via a backdoor injected into a dynamic-link library (DLL) that was a part of a legitimate update to some versions of SolarWinds Orion software (<em>SolarWinds.Orion.Core.BusinessLayer.dll<\/em>). Based on the update release date and passive DNS (pDNS) data, this breach started as early as March 2020. However, ReversingLabs has reportedly found that in October 2019, the threat actor distributed malicious files without the embedded backdoor to test whether or not these files would be detected.<sup>4<\/sup><\/p>\n<p>The threat actor was able to remain undetected for an extended period of time by employing sophisticated obfuscation methods such as imitating the legitimate SolarWinds coding style and naming standards, using virtual private servers (VPSs) with IPs native to the victim\u2019s home country, and leveraging compromised security tokens for lateral movement. Further analysis indicates that the threat actor used escalated Active Directory privileges to compromise the Security Assertion Markup Language (SAML) signing certificate and create valid tokens that could be used to access environment resources for data exfiltration.<\/p>\n<p>According to a new alert from the Cybersecurity and Infrastructure Security Agency (CISA), it appears that the threat actor used multiple initial access vectors in addition to the SolarWinds Orion platforms. Volexity reported to have evidence connecting the TTPs from this campaign to multiple incidents from late 2019 and early 2020 targeting a US-based think tank. Volexity designated the actor responsible for these attacks Dark Halo.<sup>5<\/sup> In one of these incidents, Volexity observed the APT using a stolen secret key, known as an akey, to generate a cookie to bypass the Duo multi-factor authentication (MFA) service and access a user\u2019s email via the Outlook Web App (OWA). While we are still investigating our non-Orion products, to date, we have not seen evidence that they are impacted by SUNBURST.<\/p>\n<p>Our previous report included information from FireEye stating the APT deployed other variants of malware as additional payloads, including TEARDROP, SUPERNOVA, and COSIMICGALE. Since then, ZDNet has come out in agreement that the threat actor downloaded TEARDROP, a memory-only dropper, but also reported that security researchers\u2019 and Microsoft\u2019s further analysis indicates SUPERNOVA and COSMICGALE were not part of this campaign\u2019s attack chain and should be considered as a separate attack targeting CVE-2019-8917.<sup>6<\/sup><\/p>\n<h4>\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 2.2.\u00a0 \u00a0Decoding the DGA Algorithm<\/h4>\n<p>Several teams have published findings pertaining to decoding the elements of the FQDNs created by the threat actor\u2019s DGA. The RedDrip Team from QiAnXin Technology published a decoder and that the structures of the subdomains were composed of three parts: a globally unique identifier (GUID) value composed of the hash of the hostname and MAC address of the first or default active and non-loopback interface; a single byte indicating if it is the first, second or third part of the payload (infected system domain name); and finally, a custom base32-encoded hostname to identify the victim. Longer domains are split across multiple queries and assembled later by matching the GUID section after applying a byte-by-byte exclusive OR.<sup>7,8<\/sup><\/p>\n<ul>\n<li>The decoded value for the single byte indicating which part of the payload the subdomain includes ranges from 0 to 35. The first part of the payload will have a byte value of 0 if the domain is long enough to require multiple requests. Infected systems with short domain names will have only one request with a byte value of 35.<\/li>\n<\/ul>\n<p>Subsequently, the NETRESEC team created a tool to further decode the SUNBURST subdomains in an effort to help identify SUNBURST victims. Since 18 December, they have released several versions of the decoder.<sup>9<\/sup><\/p>\n<h4>\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 2.3.\u00a0 \u00a0DNS Activity<\/h4>\n<p>From a DNS perspective, Infoblox has been able to verify that once a victim has been infected with SUNBURST, the malware beacons to avsvmcloud[.]com with a hostname designed by a DGA to exfiltrate data about the victim, as described above. The threat actor can return one of several responses in the form of an IP. We have not yet been able to determine, nor seen reporting in OSINT, about what factor(s) trigger different responses from the threat actor. From our analysis it appears that the number of entities that receive direction to move to the second stage domains, passed via a CNAME resolution, is much smaller than the overall number that contact the initial server. It remains unclear how the actor chooses which victims to move into different stages of the attack.<\/p>\n<p>Our analysis has also shown that if queries resolve to an IP that matches a pattern producing an address family as \u201cNetBios,\u201d it appears to trigger certain follow-on activity. IPs match a pattern producing an address family as \u201cImplink\u201d or \u201cAtm\u201d serve as prompts for enumerating processes and services. IPs that resolve as \u201cIpx\u201d appear to be requests for updates to local \u201cStatus\u201d configurations. Infoblox has not observed data to confirm this. Other address families appear to include \u201cInterNetwork,\u201d \u201cInterNetworkV6,\u201d and \u201cError.\u201d<\/p>\n<h3>3.\u00a0 Prevention and Mitigation<\/h3>\n<p>FireEye, in coordination with GoDaddy, recently transferred control of the command and control (C&amp;C) domain (<em>avsvmcloud[.]com<\/em>) to Microsoft to disable the SUNBURST backdoor from further execution.<sup>10<\/sup> GoDaddy created a wildcard DNS resolution ensuring any subdomain of the threat actor\u2019s C&amp;C resolving to an IP address will not prompt any follow-on actions.<\/p>\n<p>While this new DNS resolution will disable SUNBURST backdoor deployments connecting to the C&amp;C, FireEye has stated that the attackers may have deployed other backdoors preventing the victims from removing the threat actor completely from their networks.<\/p>\n<p>CISA included in their alert detailed mitigations for organizations that use the specific products affected by this attack chain.<sup>3<\/sup><\/p>\n<p>FireEye recommends the following upgrades to its affected customers, if possible:<\/p>\n<ul>\n<li>Customers using Orion Platform v2020.2 with no hotfix or 2020.2.1 HF1 should upgrade to 2020.2.1 HF 2, or<\/li>\n<li>Customers using Orion Platform v2019.4 HF 5 should upgrade to 2019.4 HF 6.<\/li>\n<\/ul>\n<p>If an organization is unable to upgrade to this version of Orion, FireEye recommends taking the following actions:<\/p>\n<ul>\n<li>Disconnect SolarWinds servers from the Internet and isolate them, or restrict access from SolarWinds servers if this is not possible.<\/li>\n<li>Rotate credentials to accounts that have access to SolarWinds servers and\/or infrastructure.<\/li>\n<li>Review network configurations created by SolarWinds, looking for anomalies.<\/li>\n<\/ul>\n<p>Microsoft\u2019s Security Response Center has also provided important steps customers should take to protect themselves from the recent nation state activity.<sup>11<\/sup><\/p>\n<p>It is important to block all communications to the threat actor\u2019s C&amp;C servers that are listed in the IOC table, as well as any further indicators released by security vendors confirmed to be part of this campaign.<\/p>\n<h3>4.\u00a0 Indicators of Compromise<\/h3>\n<p>Below is a supplementary list of IOCs related to this attack, according to OSINT. The CISA published an extended list of IOCs in their 17 December report on the campaign.<\/p>\n<p>As stated in our previous report, in some cases the actor behind SUNBURST specifically tailored their infrastructure to different victims. Organizations may have been affected by this attack even if they do not observe the indicators below within their environment; the list of publicly available IOCs may continue to grow as organizations investigate their environments and share their findings.<\/p>\n<h4>\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 4.1.\u00a0 \u00a0Additional Indicators<\/h4>\n<table width=\"672\">\n<tbody>\n<tr>\n<td width=\"516\"><strong>Indicator<\/strong><\/td>\n<td width=\"156\"><strong>Description<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"516\">\n<p style=\"text-align: center;\">e0b9eda35f01c1540134aba9195e7e6393286dde3e001fce36fb661cc346b91d<\/p>\n<p style=\"text-align: center;\">a58d02465e26bdd3a839fd90e4b317eece431d28cab203bbdde569e11247d9e2<\/p>\n<p style=\"text-align: center;\">32519b85c0b422e4656de6e6c41878e95fd95026267daab4215ee59c107d6c77<\/p>\n<p style=\"text-align: center;\">dab758bf98d9b36fa057a66cd0284737abf89857b73ca89280267ee7caf62f3b<\/p>\n<p style=\"text-align: center;\">eb6fab5a2964c5817fb239a7a5079cabca0a00464fb3e07155f28b0a57a2c0ed<\/p>\n<p style=\"text-align: center;\">c09040d35630d75dfef0f804f320f8b3d16a481071076918e9b236a321c1ea77<\/p>\n<p style=\"text-align: center;\">ffdbdd460420972fd2926a7f460c198523480bc6279dd6cca177230db18748e8<\/p>\n<p style=\"text-align: center;\">b8a05cc492f70ffa4adcd446b693d5aa2b71dc4fa2bf5022bf60d7b13884f666<\/p>\n<p style=\"text-align: center;\">20e35055113dac104d2bb02d4e7e33413fae0e5a426e0eea0dfd2c1dce692fd9<\/p>\n<p style=\"text-align: center;\">0f5d7e6dfdd62c83eb096ba193b5ae394001bac036745495674156ead6557589<\/p>\n<p style=\"text-align: center;\">cc082d21b9e880ceb6c96db1c48a0375aaf06a5f444cb0144b70e01dc69048e6<\/p>\n<p style=\"text-align: center;\">ac1b2b89e60707a20e9eb1ca480bc3410ead40643b386d624c5d21b47c02917c<\/p>\n<p style=\"text-align: center;\">019085a76ba7126fff22770d71bd901c325fc68ac55aa743327984e89f4b0134<\/p>\n<p style=\"text-align: center;\">ce77d116a074dab7a22a0fd4f2c1ab475f16eec42e1ded3c0b0aa8211fe858d6<\/p>\n<p style=\"text-align: center;\">2b3445e42d64c85a5475bdbc88a50ba8c013febb53ea97119a11604b7595e53d<\/p>\n<p style=\"text-align: center;\">92bd1c3d2a11fc4aba2735d9547bd0261560fb20f36a0e7ca2f2d451f1b62690<\/p>\n<p style=\"text-align: center;\">a3efbc07068606ba1c19a7ef21f4de15d15b41ef680832d7bcba485143668f2d<\/p>\n<p style=\"text-align: center;\">a25cadd48d70f6ea0c4a241d99c5241269e6faccb4054e62d16784640f8e53bc<\/p>\n<p style=\"text-align: center;\">d3c6785e18fba3749fb785bc313cf8346182f532c59172b69adfb31b96a5d0af<\/p>\n<p style=\"text-align: center;\">d0d626deb3f9484e649294a8dfa814c5568f846d5aa02d4cdad5d041a29d5600<\/p>\n<p style=\"text-align: center;\">c15abaf51e78ca56c0376522d699c978217bf041a3bd3c71d09193efa5717c71<\/p>\n<\/td>\n<td style=\"text-align: center;\" width=\"156\">SUNBURST DLL SHA256<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: center;\" width=\"516\"><a href=\"https:\/\/www.volexity.com\/blog\/2020\/12\/14\/dark-halo-leverages-solarwinds-compromise-to-breach-organizations\/\">https:\/\/www.volexity.com\/blog\/2020\/12\/14\/dark-halo-leverages-solarwinds-compromise-to-breach-organizations\/<\/a><\/td>\n<td width=\"156\">\n<p style=\"text-align: center;\">Additional IOCs from Volexity report<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"516\">\n<p style=\"text-align: center;\">databasegalore[.]com<\/p>\n<p style=\"text-align: center;\">deftsecurity[.]com<\/p>\n<p style=\"text-align: center;\">digitalcollege[.]org<\/p>\n<p style=\"text-align: center;\">freescanonline[.]com<\/p>\n<p style=\"text-align: center;\">globalnetworkissues[.]com<\/p>\n<p style=\"text-align: center;\">highdatabase[.]com<\/p>\n<p style=\"text-align: center;\">incomeupdate[.]com<\/p>\n<p style=\"text-align: center;\">kubecloud[.]com<\/p>\n<p style=\"text-align: center;\">lcomputers[.]com<\/p>\n<p style=\"text-align: center;\">panhardware[.]com<\/p>\n<p style=\"text-align: center;\">seobundlekit[.]com<\/p>\n<p style=\"text-align: center;\">solartrackingsystem[.]net<\/p>\n<p style=\"text-align: center;\">thedoccloud[.]com<\/p>\n<p style=\"text-align: center;\">virtualwebdata[.]com<\/p>\n<p style=\"text-align: center;\">websitetheme[.]com<\/p>\n<p style=\"text-align: center;\">webcodez[.]com<\/p>\n<p style=\"text-align: center;\">zupertech[.]com<\/p>\n<\/td>\n<td width=\"156\">\n<p style=\"text-align: center;\">Additional SUNBURST domains<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h1 style=\"text-align: center;\"><\/h1>\n<p style=\"text-align: center;\">\n<h3>Endnotes<\/h3>\n<ol>\n<li><a href=\"https:\/\/blogs.infoblox.com\/cyber-threat-intelligence\/cyber-threat-advisory-solarwinds-supply-chain-attack\/\">https:\/\/blogs.infoblox.com\/cyber-threat-intelligence\/cyber-threat-advisory-solarwinds-supply-chain-attack\/<\/a><\/li>\n<li><a href=\"https:\/\/www.fireeye.com\/blog\/threat-research\/2020\/12\/evasive-attacker-leverages-solarwinds-supply-chain-compromises-with-sunburst-backdoor.html\">https:\/\/www.fireeye.com\/blog\/threat-research\/2020\/12\/evasive-attacker-leverages-solarwinds-supply-chain-compromises-with-sunburst-backdoor.html<\/a><\/li>\n<li><a href=\"https:\/\/us-cert.cisa.gov\/ncas\/alerts\/aa20-352a\">https:\/\/us-cert.cisa.gov\/ncas\/alerts\/aa20-352a<\/a><\/li>\n<li><a href=\"https:\/\/blog.reversinglabs.com\/blog\/sunburst-the-next-level-of-stealth\">https:\/\/blog.reversinglabs.com\/blog\/sunburst-the-next-level-of-stealth<\/a><\/li>\n<li><a href=\"https:\/\/www.volexity.com\/blog\/2020\/12\/14\/dark-halo-leverages-solarwinds-compromise-to-breach-organizations\/\">https:\/\/www.volexity.com\/blog\/2020\/12\/14\/dark-halo-leverages-solarwinds-compromise-to-breach-organizations\/<\/a><\/li>\n<li><a href=\"https:\/\/www.zdnet.com\/article\/a-second-hacking-group-has-targeted-solarwinds-systems\/\">https:\/\/www.zdnet.com\/article\/a-second-hacking-group-has-targeted-solarwinds-systems\/<\/a><\/li>\n<li><a href=\"https:\/\/blog.cloudflare.com\/a-quirk-in-the-sunburst-dga-algorithm\/\">https:\/\/blog.cloudflare.com\/a-quirk-in-the-sunburst-dga-algorithm\/<\/a><\/li>\n<li><a href=\"https:\/\/blog.truesec.com\/2020\/12\/17\/the-solarwinds-orion-sunburst-supply-chain-attack\/\">https:\/\/blog.truesec.com\/2020\/12\/17\/the-solarwinds-orion-sunburst-supply-chain-attack\/<\/a><\/li>\n<li><a href=\"https:\/\/www.netresec.com\/?page=Blog&amp;month=2020-12&amp;post=Reassembling-Victim-Domain-Fragments-from-SUNBURST-DNS\">https:\/\/www.netresec.com\/?page=Blog&amp;month=2020-12&amp;post=Reassembling-Victim-Domain-Fragments-from-SUNBURST-DNS<\/a><\/li>\n<li><a href=\"https:\/\/krebsonsecurity.com\/2020\/12\/malicious-domain-in-solarwinds-hack-turned-into-killswitch\/\">https:\/\/krebsonsecurity.com\/2020\/12\/malicious-domain-in-solarwinds-hack-turned-into-killswitch\/<\/a><\/li>\n<\/ol>\n<p>11.\u00a0 <a href=\"https:\/\/msrc-blog.microsoft.com\/2020\/12\/13\/customer-guidance-on-recent-nation-state-cyber-attacks\/\">https:\/\/msrc-blog.microsoft.com\/2020\/12\/13\/customer-guidance-on-recent-nation-state-cyber-attacks\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Authors: Victor Sandin and Darby Wise TLP:WHITE 1.\u00a0 Executive Summary On 15 December, Infoblox released a Cyber Threat Advisory on the supply chain attack affecting SolarWinds\u2019 Orion IT monitoring and management software.1 This advisory detailed FireEye\u2019s report on the campaign, including analysis on the SUNBURST backdoor, initial information on the threat actor\u2019s tactics, techniques and [&hellip;]<\/p>\n","protected":false},"author":397,"featured_media":6738,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[554],"tags":[379,401,380,189],"class_list":{"0":"post-5823","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-threat-advisory","8":"tag-solarwinds","9":"tag-sunburst","10":"tag-supply-chain-attack","11":"tag-cybersecurity","12":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>SolarWinds and SUNBURST Update<\/title>\n<meta name=\"description\" content=\"SolarWinds and SUNBURST Update. On 15 December, Infoblox released a Cyber Threat Advisory on the supply chain attack affecting SolarWinds\u2019 Orion IT monitoring and management software.1 This advisory detailed FireEye\u2019s report on the campaign, including analysis on the SUNBURST backdoor, initial information on the threat actor\u2019s tactics, techniques and procedures (TTPs), as well as the mitigations and indicators of compromise (IOCs) that were most current at the time.2 The threat actor behind the campaign carried out a complex attack chain and demonstrated highly sophisticated TTPs, indicating it was the work of an advanced persistent threat (APT) group. Known victims include government agencies, as well as private sector and critical infrastructure organizations.3\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory\/solarwinds-and-sunburst-update\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"SolarWinds and SUNBURST Update\" \/>\n<meta property=\"og:description\" content=\"SolarWinds and SUNBURST Update. On 15 December, Infoblox released a Cyber Threat Advisory on the supply chain attack affecting SolarWinds\u2019 Orion IT monitoring and management software.1 This advisory detailed FireEye\u2019s report on the campaign, including analysis on the SUNBURST backdoor, initial information on the threat actor\u2019s tactics, techniques and procedures (TTPs), as well as the mitigations and indicators of compromise (IOCs) that were most current at the time.2 The threat actor behind the campaign carried out a complex attack chain and demonstrated highly sophisticated TTPs, indicating it was the work of an advanced persistent threat (APT) group. Known victims include government agencies, as well as private sector and critical infrastructure organizations.3\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory\/solarwinds-and-sunburst-update\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2020-12-23T00:28:08+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-08-07T19:22:35+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ciu-image-08.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"612\" \/>\n\t<meta property=\"og:image:height\" content=\"344\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Infoblox Threat Intel\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Infoblox Threat Intel\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-threat-advisory\\\/solarwinds-and-sunburst-update\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-threat-advisory\\\/solarwinds-and-sunburst-update\\\/\"},\"author\":{\"name\":\"Infoblox Threat Intel\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/b6aed8965e3298a0817c16d32c0a67ae\"},\"headline\":\"SolarWinds and SUNBURST Update\",\"datePublished\":\"2020-12-23T00:28:08+00:00\",\"dateModified\":\"2024-08-07T19:22:35+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-threat-advisory\\\/solarwinds-and-sunburst-update\\\/\"},\"wordCount\":1806,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-threat-advisory\\\/solarwinds-and-sunburst-update\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/ciu-image-08.jpg\",\"keywords\":[\"SolarWinds\",\"sunburst\",\"Supply Chain Attack\",\"Cybersecurity\"],\"articleSection\":[\"Cyber Threat Advisory\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-threat-advisory\\\/solarwinds-and-sunburst-update\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-threat-advisory\\\/solarwinds-and-sunburst-update\\\/\",\"name\":\"SolarWinds and SUNBURST Update\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-threat-advisory\\\/solarwinds-and-sunburst-update\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-threat-advisory\\\/solarwinds-and-sunburst-update\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/ciu-image-08.jpg\",\"datePublished\":\"2020-12-23T00:28:08+00:00\",\"dateModified\":\"2024-08-07T19:22:35+00:00\",\"description\":\"SolarWinds and SUNBURST Update. On 15 December, Infoblox released a Cyber Threat Advisory on the supply chain attack affecting SolarWinds\u2019 Orion IT monitoring and management software.1 This advisory detailed FireEye\u2019s report on the campaign, including analysis on the SUNBURST backdoor, initial information on the threat actor\u2019s tactics, techniques and procedures (TTPs), as well as the mitigations and indicators of compromise (IOCs) that were most current at the time.2 The threat actor behind the campaign carried out a complex attack chain and demonstrated highly sophisticated TTPs, indicating it was the work of an advanced persistent threat (APT) group. Known victims include government agencies, as well as private sector and critical infrastructure organizations.3\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-threat-advisory\\\/solarwinds-and-sunburst-update\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-threat-advisory\\\/solarwinds-and-sunburst-update\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-threat-advisory\\\/solarwinds-and-sunburst-update\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/ciu-image-08.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/ciu-image-08.jpg\",\"width\":612,\"height\":344,\"caption\":\"Male IT Engineer Works on a Laptop in front of Server Cabinet at a Big Data Center. Rows of Rack Servers are Seen.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-threat-advisory\\\/solarwinds-and-sunburst-update\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Infoblox Threat Intel\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/threat-intelligence\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Threat Advisory\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/threat-intelligence\\\/cyber-threat-advisory\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"SolarWinds and SUNBURST Update\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/b6aed8965e3298a0817c16d32c0a67ae\",\"name\":\"Infoblox Threat Intel\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_397_1714162589-96x96.png\",\"url\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_397_1714162589-96x96.png\",\"contentUrl\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_397_1714162589-96x96.png\",\"caption\":\"Infoblox Threat Intel\"},\"description\":\"Infoblox Threat Intel is the leading creator of original DNS threat intelligence, distinguishing itself in a sea of aggregators. What sets us apart? Two things: mad DNS skills and unparalleled visibility. DNS is notoriously tricky to interpret and hunt from, but our deep understanding and unique access to the internet's inner workings allow us to track down threat actors that others can't see. We're proactive, not just defensive, using our insights to disrupt cybercrime where it begins. We also believe in sharing knowledge to support the broader security community by publishing detailed research and releasing indicators on GitHub. In addition, our intel is seamlessly integrated into our Infoblox Protective DNS solutions, so customers automatically get its benefits, along with ridiculously low false positive rates.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/infoblox-threat-intel\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"SolarWinds and SUNBURST Update","description":"SolarWinds and SUNBURST Update. On 15 December, Infoblox released a Cyber Threat Advisory on the supply chain attack affecting SolarWinds\u2019 Orion IT monitoring and management software.1 This advisory detailed FireEye\u2019s report on the campaign, including analysis on the SUNBURST backdoor, initial information on the threat actor\u2019s tactics, techniques and procedures (TTPs), as well as the mitigations and indicators of compromise (IOCs) that were most current at the time.2 The threat actor behind the campaign carried out a complex attack chain and demonstrated highly sophisticated TTPs, indicating it was the work of an advanced persistent threat (APT) group. Known victims include government agencies, as well as private sector and critical infrastructure organizations.3","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory\/solarwinds-and-sunburst-update\/","og_locale":"en_US","og_type":"article","og_title":"SolarWinds and SUNBURST Update","og_description":"SolarWinds and SUNBURST Update. On 15 December, Infoblox released a Cyber Threat Advisory on the supply chain attack affecting SolarWinds\u2019 Orion IT monitoring and management software.1 This advisory detailed FireEye\u2019s report on the campaign, including analysis on the SUNBURST backdoor, initial information on the threat actor\u2019s tactics, techniques and procedures (TTPs), as well as the mitigations and indicators of compromise (IOCs) that were most current at the time.2 The threat actor behind the campaign carried out a complex attack chain and demonstrated highly sophisticated TTPs, indicating it was the work of an advanced persistent threat (APT) group. Known victims include government agencies, as well as private sector and critical infrastructure organizations.3","og_url":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory\/solarwinds-and-sunburst-update\/","og_site_name":"Infoblox Blog","article_published_time":"2020-12-23T00:28:08+00:00","article_modified_time":"2024-08-07T19:22:35+00:00","og_image":[{"width":612,"height":344,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ciu-image-08.jpg","type":"image\/jpeg"}],"author":"Infoblox Threat Intel","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Infoblox Threat Intel","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory\/solarwinds-and-sunburst-update\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory\/solarwinds-and-sunburst-update\/"},"author":{"name":"Infoblox Threat Intel","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/b6aed8965e3298a0817c16d32c0a67ae"},"headline":"SolarWinds and SUNBURST Update","datePublished":"2020-12-23T00:28:08+00:00","dateModified":"2024-08-07T19:22:35+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory\/solarwinds-and-sunburst-update\/"},"wordCount":1806,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory\/solarwinds-and-sunburst-update\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ciu-image-08.jpg","keywords":["SolarWinds","sunburst","Supply Chain Attack","Cybersecurity"],"articleSection":["Cyber Threat Advisory"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory\/solarwinds-and-sunburst-update\/","url":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory\/solarwinds-and-sunburst-update\/","name":"SolarWinds and SUNBURST Update","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory\/solarwinds-and-sunburst-update\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory\/solarwinds-and-sunburst-update\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ciu-image-08.jpg","datePublished":"2020-12-23T00:28:08+00:00","dateModified":"2024-08-07T19:22:35+00:00","description":"SolarWinds and SUNBURST Update. On 15 December, Infoblox released a Cyber Threat Advisory on the supply chain attack affecting SolarWinds\u2019 Orion IT monitoring and management software.1 This advisory detailed FireEye\u2019s report on the campaign, including analysis on the SUNBURST backdoor, initial information on the threat actor\u2019s tactics, techniques and procedures (TTPs), as well as the mitigations and indicators of compromise (IOCs) that were most current at the time.2 The threat actor behind the campaign carried out a complex attack chain and demonstrated highly sophisticated TTPs, indicating it was the work of an advanced persistent threat (APT) group. Known victims include government agencies, as well as private sector and critical infrastructure organizations.3","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory\/solarwinds-and-sunburst-update\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory\/solarwinds-and-sunburst-update\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory\/solarwinds-and-sunburst-update\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ciu-image-08.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ciu-image-08.jpg","width":612,"height":344,"caption":"Male IT Engineer Works on a Laptop in front of Server Cabinet at a Big Data Center. Rows of Rack Servers are Seen."},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory\/solarwinds-and-sunburst-update\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Infoblox Threat Intel","item":"https:\/\/www.infoblox.com\/blog\/category\/threat-intelligence\/"},{"@type":"ListItem","position":3,"name":"Cyber Threat Advisory","item":"https:\/\/www.infoblox.com\/blog\/category\/threat-intelligence\/cyber-threat-advisory\/"},{"@type":"ListItem","position":4,"name":"SolarWinds and SUNBURST Update"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/b6aed8965e3298a0817c16d32c0a67ae","name":"Infoblox Threat Intel","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_397_1714162589-96x96.png","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_397_1714162589-96x96.png","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_397_1714162589-96x96.png","caption":"Infoblox Threat Intel"},"description":"Infoblox Threat Intel is the leading creator of original DNS threat intelligence, distinguishing itself in a sea of aggregators. What sets us apart? Two things: mad DNS skills and unparalleled visibility. DNS is notoriously tricky to interpret and hunt from, but our deep understanding and unique access to the internet's inner workings allow us to track down threat actors that others can't see. We're proactive, not just defensive, using our insights to disrupt cybercrime where it begins. We also believe in sharing knowledge to support the broader security community by publishing detailed research and releasing indicators on GitHub. In addition, our intel is seamlessly integrated into our Infoblox Protective DNS solutions, so customers automatically get its benefits, along with ridiculously low false positive rates.","url":"https:\/\/www.infoblox.com\/blog\/author\/infoblox-threat-intel\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/5823","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/397"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=5823"}],"version-history":[{"count":3,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/5823\/revisions"}],"predecessor-version":[{"id":5826,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/5823\/revisions\/5826"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/6738"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=5823"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=5823"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=5823"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}