{"id":5837,"date":"2021-01-07T16:37:43","date_gmt":"2021-01-08T00:37:43","guid":{"rendered":"https:\/\/blogs.infoblox.com\/?p=5837"},"modified":"2024-04-26T13:20:59","modified_gmt":"2024-04-26T20:20:59","slug":"solarwinds-second-update","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory\/solarwinds-second-update\/","title":{"rendered":"SolarWinds Second Update"},"content":{"rendered":"<p>Authors: Victor Sandin and Jeremy Ware<\/p>\n<p>TLP:WHITE<\/p>\n<h3>1.\u00a0 Executive Summary<\/h3>\n<p>On 15 December, Infoblox released a Cyber Threat Advisory on the supply chain attack affecting SolarWinds\u2019 Orion IT monitoring and management software.<sup>1<\/sup> This advisory detailed FireEye\u2019s report on the campaign, including analysis on the SUNBURST backdoor, initial information on the threat actor\u2019s tactics, techniques and procedures (TTPs), as well as the mitigations and indicators of compromise (IOCs) that were most current at the time.<sup>2<\/sup><\/p>\n<p>The threat actor behind the campaign carried out a complex attack chain and demonstrated highly sophisticated TTPs, indicating it was the work of an advanced persistent threat (APT) group. In a 5 January joint statement, the Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Security Agency (CISA), the Office of the Director of National Intelligence (ONI), and the National Security Agency (NSA) indicated that based on its investigations, the APT is likely Russian in origin.<sup>3<\/sup> Known victims include government agencies, as well as private sector and critical infrastructure organizations.<sup>4<\/sup><\/p>\n<p>In our first update, we shared additional information about the wide-ranging effects of this campaign after conducting several internal investigations.<sup>5<\/sup> We summarized some of the latest information from OSINT, as well as conveyed what we were able to validate at the time and provided additional IOCs.<\/p>\n<p>Today\u2019s update includes new information provided by the latest alert from CISA and recent OSINT on additional attack vectors, use of anti-analysis blocklists, additional information in privilege escalation and persistence, compromised accounts and applications in Azure\/Microsoft 365 environments, and command and control protocol. We have also updated the IOC table with new information.<\/p>\n<h3>2.\u00a0 Analysis<\/h3>\n<h4>\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 2.1.\u00a0 Updates on Supply Chain Attack and Initial Vectors<\/h4>\n<p>As previously reported, evidence suggests the threat actor(s) used additional initial attack vectors beyond SolarWinds\u2019 Orion software. In some incidents under investigation by CISA,<sup>6<\/sup> threat actor(s) appeared to have obtained initial access through brute force techniques such as password guessing and password spraying, as well as compromised administrative credentials accessible via external remote access services.<\/p>\n<h4>\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 2.2.\u00a0 Anti-Analysis Blocklists<\/h4>\n<p>According to CISA, to disguise the strings used to detect security products, the threat actors calculated and embedded in the code a list of custom hashes produced by the cryptographic hash function FNV-1A and an XOR operation. It is computationally expensive to determine which string a hash value corresponds to, but by joint efforts from the information security community, all of the hashes have been successfully bruteforced and published to FireEye\u2019s GitHub.<sup>7<\/sup><\/p>\n<p>SUNBURST malware checks processes, services and device names against its blocklist. If a blocklisted process or driver is found, it pauses execution and attempts the process again later. If a blocklisted service is found, SUNBURST attempts to disable it by editing the service configuration in the Windows Registry. After this modification, the backdoor updates the ReportWatcherPostpone configuration value to reflect which service was disabled. Subsequent service blocklist checks skip services present in this configuration value. SUNBURST will continue past this check only when there are no processes nor drivers from the blocklist present.<\/p>\n<h4>\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 2.3.\u00a0 Updates on Privilege Escalation and Persistence<\/h4>\n<p>As previously reported, the threat actors compromised the Security Assertion Markup Language (SAML) signing certificate using their escalated AD privileges to create valid tokens and present them to services that trust SAML tokens from the environment. CISA has observed that the threat actors also added authentication credentials by assigning tokens and certificates to existing Azure\/Microsoft 365 application service principals. These tokens provide them programmatic management of Microsoft Cloud tenants to operate on the hosted resources. This technique allows threat actors to maintain persistence without generating significant evidence or telemetry because not all Microsoft 365 licensing levels log these events.<\/p>\n<p>Microsoft reported<sup>8<\/sup> that in some cases, threat actors have also added one or more new federation trusts to existing on-premises infrastructure so that authentication could possibly happen outside of the organization&#8217;s known infrastructure and therefore potentially not be visible to the legitimate system owner.<\/p>\n<h4>\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 2.4.\u00a0 Compromised Azure\/Microsoft 365 Resources<\/h4>\n<p>CISA also reported that the threat actor(s) could have compromised accounts and applications in Azure\/Microsoft 365 environments. This would leave certain indicators of compromise (IOCs) in the unified audit log in Azure\/M365, as well as changes in the Azure service principles. CISA has developed a PowerShell tool called <em>Sparrow.ps1<sup>9<\/sup><\/em> to check the unified audit log and detect these compromises.<\/p>\n<h4>\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 2.5.\u00a0 Command and Control Coordinator Protocol<\/h4>\n<p>SUNBURST uses a two-part C&amp;C protocol that involves DNS and HTTPS. In passive mode, which is also the starting mode, the malware communicates using only DNS and receives high-level updates to its state from its C&amp;C (<em>avsvmcloud[.]com<\/em>). We described both the DGA and the DNS activity in our previous report.<sup>10<\/sup><\/p>\n<p>When the C&amp;C server responds with a DNS CNAME response, SUNBURST switches its mode to active and will communicate via HTTPS to its final C&amp;C server and receives detailed commands for actions such as spawning a process or transferring a file. This transition only happens if SUNBURST receives a DNS A record response pointing to a specific subnetwork. It will then use the least significant bit from the A record IP address to determine the proxy method and Uniform Resource Identifier (URI) scheme to use, as well as a delay value used in the HTTPS thread.<\/p>\n<p>Once SUNBURST is in active mode, the backdoor uses GET and POST requests to communicate with its C&amp;C server. When sending a GET request, the malware adds an <em>If-None-Match<\/em> HTTPS header that includes the encoded user ID. This likely allows the C&amp;C server to determine which SUNBURST installation generated the request, further enabling multiplexing of C&amp;C streams on a single server.<\/p>\n<p>The C&amp;C server uses steganography techniques to hide data within the response that attempts to appear as benign XML related to .NET assemblies.<\/p>\n<h4>\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 2.6.\u00a0 HTTPS Backdoor<\/h4>\n<p>In active mode, the backdoor receives the command to execute from the HTTPS response. FireEye has analyzed the capabilities of SUNBURST, which include:<sup>11<\/sup><\/p>\n<ul>\n<li>Collect system information including hostname, username, OS version, MAC addresses, IP address, DHCP configuration and domain information;<\/li>\n<li>Start new processes with a given file path and arguments;<\/li>\n<li>List running processes along with their parent process PID and the user and domain of the processes owner;<\/li>\n<li>Kill processes;<\/li>\n<li>List files and directories of a given path;<\/li>\n<li>Test if a given file exists, as well as edit and remove files;<\/li>\n<li>Get MD5 of a given file and check if the hash of a given file matches a given hash;<\/li>\n<li>Read, write and delete Windows registry keys;<\/li>\n<li>List subkeys and value names beneath the given registry path; and<\/li>\n<li>Reboot<\/li>\n<\/ul>\n<p>The results of these commands are compressed and single-byte XOR-encoded with the XOR key prepended to the message. The message is then turned into JSON documents that resemble the Orion Improvement Program (OIP) messages used legitimately by SolarWinds.<\/p>\n<h4>\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 2.7.\u00a0 Mode of Operation<\/h4>\n<p>SUNBURST has three modes of operation: active, passive and disabled. The backdoor configuration key ReportWatcherRetry contains the last running mode of the malware.<\/p>\n<p>As we described above, during passive mode, SUNBURST performs only DNS beaconing containing the user AD domain. In active mode, Infoblox has confirmed that the process begins once the CNAME resolves with the local resolver. The backdoor then creates the DGA domain and records a new address as the CNAME. The class triggering the HTTPS backdoor later uses this CNAME. If the specific cider ranges return, or if no CNAME is returned, SUNBURST will either attempt again later or switch to disabled mode and it stops further execution unless the backdoor configuration key is edited.<\/p>\n<h3>3.\u00a0 Prevention and Mitigation<\/h3>\n<p>CISA has included new guidelines for networks containing the malicious binary but with no evidence of secondary C&amp;C activity to a separate domain or IP address, actions on objectives (AOOs) such as SAML token abuse, or any other adversary activities. In these cases, they indicate that organizations can rebuild the platform, harden the configuration based on <a href=\"https:\/\/documentation.solarwinds.com\/en\/Success_Center\/orionplatform\/content\/core-secure-configuration.htm\">SolarWinds secure configuration guidelines<\/a> and resume use as determined by and consistent with their own thorough risk evaluation.<\/p>\n<h4>\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 3.1.\u00a0 Indicators of Compromise<\/h4>\n<p>Below is a supplementary list of IOCs related to this attack, according to OSINT. CISA published an extended list of IOCs in their 17 December report on the campaign and it was updated on January 7th with new indicators. This table includes only the latter.<\/p>\n<h2><\/h2>\n<table width=\"672\">\n<tbody>\n<tr>\n<td width=\"521\">\n<p style=\"text-align: center;\"><strong>Indicators<\/strong><\/p>\n<\/td>\n<td style=\"text-align: center;\" width=\"151\"><strong>Description<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"521\">\n<p style=\"text-align: center;\">ervsystem[.]com<\/p>\n<p style=\"text-align: center;\">infinitysoftwares[.]com<\/p>\n<p style=\"text-align: center;\">mobilnweb[.]com<\/p>\n<\/td>\n<td style=\"text-align: center;\" width=\"151\">Additional SUNBURST domains<\/td>\n<\/tr>\n<tr>\n<td width=\"521\">02af7cec58b9a5da1c542b5a32151ba1<\/p>\n<p>1817a5bf9c01035bcf8a975c9f1d94b0ce7f6a200339485d8f93859f8f6d730c<\/td>\n<td width=\"151\">Additional SSL hashes<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: center;\" width=\"521\">02af7cec58b9a5da1c542b5a32151ba1<\/p>\n<p>0f5d7e6dfdd62c83eb096ba193b5ae394001bac036745495674156ead6557589<\/p>\n<p>1817a5bf9c01035bcf8a975c9f1d94b0ce7f6a200339485d8f93859f8f6d730c<\/p>\n<p>1b476f58ca366b54f34d714ffce3fd73cc30db1a<\/p>\n<p>20e35055113dac104d2bb02d4e7e33413fae0e5a426e0eea0dfd2c1dce692fd9<\/p>\n<p>2b3445e42d64c85a5475bdbc88a50ba8c013febb53ea97119a11604b7595e53d<\/p>\n<p>2dafddbfb0981c5aa31f27a298b9c804e553c7bc<\/p>\n<p>6e4050c6a2d2e5e49606d96dd2922da480f2e0c70082cc7e54449a7dc0d20f8d<\/p>\n<p>92bd1c3d2a11fc4aba2735d9547bd0261560fb20f36a0e7ca2f2d451f1b62690<\/p>\n<p>a3efbc07068606ba1c19a7ef21f4de15d15b41ef680832d7bcba485143668f2d<\/p>\n<p>a58d02465e26bdd3a839fd90e4b317eece431d28cab203bbdde569e11247d9e2<\/p>\n<p>b820e8a2057112d0ed73bd7995201dbed79a79e13c79d4bdad81a22f12387e07<\/p>\n<p>b8a05cc492f70ffa4adcd446b693d5aa2b71dc4fa2bf5022bf60d7b13884f666<\/p>\n<p>c09040d35630d75dfef0f804f320f8b3d16a481071076918e9b236a321c1ea77<\/p>\n<p>cc082d21b9e880ceb6c96db1c48a0375aaf06a5f444cb0144b70e01dc69048e6<\/p>\n<p>e0b9eda35f01c1540134aba9195e7e6393286dde3e001fce36fb661cc346b91d<\/p>\n<p>fd15760abfc0b2537b89adc65b1ff3f072e7e31c<\/p>\n<p>ffdbdd460420972fd2926a7f460c198523480bc6279dd6cca177230db18748e8<\/td>\n<td width=\"151\">\n<p style=\"text-align: center;\">Additional SUNBURST hashes<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: center;\" width=\"521\">107[.]152[.]35[.]77<\/p>\n<p>13[.]59[.]205[.]66<\/p>\n<p>173[.]237[.]190[.]2<\/p>\n<p>198[.]12[.]75[.]112<\/p>\n<p>20[.]141[.]48[.]154<\/p>\n<p>34[.]203[.]203[.]23<\/td>\n<td width=\"151\">\n<p style=\"text-align: center;\">Additional SUNBURST IPs<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><strong>Endnotes<\/strong><\/p>\n<ol>\n<li><a href=\"https:\/\/blogs.infoblox.com\/cyber-threat-intelligence\/cyber-threat-advisory-solarwinds-supply-chain-attack\/\">https:\/\/blogs.infoblox.com\/cyber-threat-intelligence\/cyber-threat-advisory-solarwinds-supply-chain-attack\/<\/a><\/li>\n<li><a href=\"https:\/\/www.fireeye.com\/blog\/threat-research\/2020\/12\/evasive-attacker-leverages-solarwinds-supply-chain-compromises-with-sunburst-backdoor.html\">https:\/\/www.fireeye.com\/blog\/threat-research\/2020\/12\/evasive-attacker-leverages-solarwinds-supply-chain-compromises-with-sunburst-backdoor.html<\/a><\/li>\n<li><a href=\"https:\/\/www.cisa.gov\/news\/2021\/01\/05\/joint-statement-federal-bureau-investigation-fbi-cybersecurity-and-infrastructure\">https:\/\/www.cisa.gov\/news\/2021\/01\/05\/joint-statement-federal-bureau-investigation-fbi-cybersecurity-and-infrastructure<\/a><\/li>\n<li><a href=\"https:\/\/us-cert.cisa.gov\/ncas\/alerts\/aa20-352a\">https:\/\/us-cert.cisa.gov\/ncas\/alerts\/aa20-352a<\/a><\/li>\n<li><a href=\"https:\/\/blogs.infoblox.com\/cyber-threat-intelligence\/solarwinds-and-sunburst-update\/\">https:\/\/blogs.infoblox.com\/cyber-threat-intelligence\/solarwinds-and-sunburst-update\/<\/a><\/li>\n<li><a href=\"https:\/\/us-cert.cisa.gov\/ncas\/alerts\/aa20-352a\">https:\/\/us-cert.cisa.gov\/ncas\/alerts\/aa20-352a<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/fireeye\/sunburst_countermeasures\/blob\/main\/fnv1a_xor_hashes.txt\">https:\/\/github.com\/fireeye\/sunburst_countermeasures\/blob\/main\/fnv1a_xor_hashes.txt<\/a><\/li>\n<li><a href=\"https:\/\/us-cert.cisa.gov\/ncas\/alerts\/aa20-352a\">https:\/\/us-cert.cisa.gov\/ncas\/alerts\/aa20-352a<\/a> CISA reported the Microsoft finding, and refers to a query to identify these cases by Microsoft, as posted in <a href=\"https:\/\/github.com\/Azure\/Azure-Sentinel\/blob\/master\/Detections\/AuditLogs\/ADFSDomainTrustMods.yaml\">https:\/\/github.com\/Azure\/Azure-Sentinel\/blob\/master\/Detections\/AuditLogs\/ADFSDomainTrustMods.yaml<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/cisagov\/Sparrow\">https:\/\/github.com\/cisagov\/Sparrow<\/a><\/li>\n<li><a href=\"https:\/\/blogs.infoblox.com\/cyber-threat-intelligence\/solarwinds-and-sunburst-update\/\">https:\/\/blogs.infoblox.com\/cyber-threat-intelligence\/solarwinds-and-sunburst-update\/<\/a><\/li>\n<li><a href=\"https:\/\/www.fireeye.com\/blog\/threat-research\/2020\/12\/evasive-attacker-leverages-solarwinds-supply-chain-compromises-with-sunburst-backdoor.html\">https:\/\/www.fireeye.com\/blog\/threat-research\/2020\/12\/evasive-attacker-leverages-solarwinds-supply-chain-compromises-with-sunburst-backdoor.html<\/a><\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>Authors: Victor Sandin and Jeremy Ware TLP:WHITE 1.\u00a0 Executive Summary On 15 December, Infoblox released a Cyber Threat Advisory on the supply chain attack affecting SolarWinds\u2019 Orion IT monitoring and management software.1 This advisory detailed FireEye\u2019s report on the campaign, including analysis on the SUNBURST backdoor, initial information on the threat actor\u2019s tactics, techniques and [&hellip;]<\/p>\n","protected":false},"author":397,"featured_media":6737,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[554],"tags":[189,368,367,379,401],"class_list":{"0":"post-5837","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-threat-advisory","8":"tag-cybersecurity","9":"tag-federal","10":"tag-government","11":"tag-solarwinds","12":"tag-sunburst","13":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>SolarWinds Second Update<\/title>\n<meta name=\"description\" content=\"On 15 December, Infoblox released a Cyber Threat Advisory on the supply chain attack affecting SolarWinds\u2019 Orion IT monitoring and management software.1 This advisory detailed FireEye\u2019s report on the campaign, including analysis on the SUNBURST backdoor, initial information on the threat actor\u2019s tactics, techniques and procedures (TTPs), as well as the mitigations and indicators of compromise (IOCs) that were most current at the time.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory\/solarwinds-second-update\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"SolarWinds Second Update\" \/>\n<meta property=\"og:description\" content=\"On 15 December, Infoblox released a Cyber Threat Advisory on the supply chain attack affecting SolarWinds\u2019 Orion IT monitoring and management software.1 This advisory detailed FireEye\u2019s report on the campaign, including analysis on the SUNBURST backdoor, initial information on the threat actor\u2019s tactics, techniques and procedures (TTPs), as well as the mitigations and indicators of compromise (IOCs) that were most current at the time.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory\/solarwinds-second-update\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2021-01-08T00:37:43+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-04-26T20:20:59+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ciu-image-38.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"612\" \/>\n\t<meta property=\"og:image:height\" content=\"344\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Infoblox Threat Intel\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Infoblox Threat Intel\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-threat-advisory\\\/solarwinds-second-update\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-threat-advisory\\\/solarwinds-second-update\\\/\"},\"author\":{\"name\":\"Infoblox Threat Intel\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/b6aed8965e3298a0817c16d32c0a67ae\"},\"headline\":\"SolarWinds Second Update\",\"datePublished\":\"2021-01-08T00:37:43+00:00\",\"dateModified\":\"2024-04-26T20:20:59+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-threat-advisory\\\/solarwinds-second-update\\\/\"},\"wordCount\":1804,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-threat-advisory\\\/solarwinds-second-update\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/ciu-image-38.jpg\",\"keywords\":[\"Cybersecurity\",\"Federal\",\"Government\",\"SolarWinds\",\"sunburst\"],\"articleSection\":[\"Cyber Threat Advisory\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-threat-advisory\\\/solarwinds-second-update\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-threat-advisory\\\/solarwinds-second-update\\\/\",\"name\":\"SolarWinds Second Update\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-threat-advisory\\\/solarwinds-second-update\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-threat-advisory\\\/solarwinds-second-update\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/ciu-image-38.jpg\",\"datePublished\":\"2021-01-08T00:37:43+00:00\",\"dateModified\":\"2024-04-26T20:20:59+00:00\",\"description\":\"On 15 December, Infoblox released a Cyber Threat Advisory on the supply chain attack affecting SolarWinds\u2019 Orion IT monitoring and management software.1 This advisory detailed FireEye\u2019s report on the campaign, including analysis on the SUNBURST backdoor, initial information on the threat actor\u2019s tactics, techniques and procedures (TTPs), as well as the mitigations and indicators of compromise (IOCs) that were most current at the time.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-threat-advisory\\\/solarwinds-second-update\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-threat-advisory\\\/solarwinds-second-update\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-threat-advisory\\\/solarwinds-second-update\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/ciu-image-38.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/ciu-image-38.jpg\",\"width\":612,\"height\":344,\"caption\":\"Network security concept. Data protection. Cyber security. Communication network.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-threat-advisory\\\/solarwinds-second-update\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Infoblox Threat Intel\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/threat-intelligence\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Threat Advisory\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/threat-intelligence\\\/cyber-threat-advisory\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"SolarWinds Second Update\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/b6aed8965e3298a0817c16d32c0a67ae\",\"name\":\"Infoblox Threat Intel\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_397_1714162589-96x96.png\",\"url\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_397_1714162589-96x96.png\",\"contentUrl\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_397_1714162589-96x96.png\",\"caption\":\"Infoblox Threat Intel\"},\"description\":\"Infoblox Threat Intel is the leading creator of original DNS threat intelligence, distinguishing itself in a sea of aggregators. What sets us apart? Two things: mad DNS skills and unparalleled visibility. DNS is notoriously tricky to interpret and hunt from, but our deep understanding and unique access to the internet's inner workings allow us to track down threat actors that others can't see. We're proactive, not just defensive, using our insights to disrupt cybercrime where it begins. We also believe in sharing knowledge to support the broader security community by publishing detailed research and releasing indicators on GitHub. In addition, our intel is seamlessly integrated into our Infoblox Protective DNS solutions, so customers automatically get its benefits, along with ridiculously low false positive rates.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/infoblox-threat-intel\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"SolarWinds Second Update","description":"On 15 December, Infoblox released a Cyber Threat Advisory on the supply chain attack affecting SolarWinds\u2019 Orion IT monitoring and management software.1 This advisory detailed FireEye\u2019s report on the campaign, including analysis on the SUNBURST backdoor, initial information on the threat actor\u2019s tactics, techniques and procedures (TTPs), as well as the mitigations and indicators of compromise (IOCs) that were most current at the time.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory\/solarwinds-second-update\/","og_locale":"en_US","og_type":"article","og_title":"SolarWinds Second Update","og_description":"On 15 December, Infoblox released a Cyber Threat Advisory on the supply chain attack affecting SolarWinds\u2019 Orion IT monitoring and management software.1 This advisory detailed FireEye\u2019s report on the campaign, including analysis on the SUNBURST backdoor, initial information on the threat actor\u2019s tactics, techniques and procedures (TTPs), as well as the mitigations and indicators of compromise (IOCs) that were most current at the time.","og_url":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory\/solarwinds-second-update\/","og_site_name":"Infoblox Blog","article_published_time":"2021-01-08T00:37:43+00:00","article_modified_time":"2024-04-26T20:20:59+00:00","og_image":[{"width":612,"height":344,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ciu-image-38.jpg","type":"image\/jpeg"}],"author":"Infoblox Threat Intel","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Infoblox Threat Intel","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory\/solarwinds-second-update\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory\/solarwinds-second-update\/"},"author":{"name":"Infoblox Threat Intel","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/b6aed8965e3298a0817c16d32c0a67ae"},"headline":"SolarWinds Second Update","datePublished":"2021-01-08T00:37:43+00:00","dateModified":"2024-04-26T20:20:59+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory\/solarwinds-second-update\/"},"wordCount":1804,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory\/solarwinds-second-update\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ciu-image-38.jpg","keywords":["Cybersecurity","Federal","Government","SolarWinds","sunburst"],"articleSection":["Cyber Threat Advisory"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory\/solarwinds-second-update\/","url":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory\/solarwinds-second-update\/","name":"SolarWinds Second Update","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory\/solarwinds-second-update\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory\/solarwinds-second-update\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ciu-image-38.jpg","datePublished":"2021-01-08T00:37:43+00:00","dateModified":"2024-04-26T20:20:59+00:00","description":"On 15 December, Infoblox released a Cyber Threat Advisory on the supply chain attack affecting SolarWinds\u2019 Orion IT monitoring and management software.1 This advisory detailed FireEye\u2019s report on the campaign, including analysis on the SUNBURST backdoor, initial information on the threat actor\u2019s tactics, techniques and procedures (TTPs), as well as the mitigations and indicators of compromise (IOCs) that were most current at the time.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory\/solarwinds-second-update\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory\/solarwinds-second-update\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory\/solarwinds-second-update\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ciu-image-38.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ciu-image-38.jpg","width":612,"height":344,"caption":"Network security concept. Data protection. Cyber security. Communication network."},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory\/solarwinds-second-update\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Infoblox Threat Intel","item":"https:\/\/www.infoblox.com\/blog\/category\/threat-intelligence\/"},{"@type":"ListItem","position":3,"name":"Cyber Threat Advisory","item":"https:\/\/www.infoblox.com\/blog\/category\/threat-intelligence\/cyber-threat-advisory\/"},{"@type":"ListItem","position":4,"name":"SolarWinds Second Update"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/b6aed8965e3298a0817c16d32c0a67ae","name":"Infoblox Threat Intel","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_397_1714162589-96x96.png","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_397_1714162589-96x96.png","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_397_1714162589-96x96.png","caption":"Infoblox Threat Intel"},"description":"Infoblox Threat Intel is the leading creator of original DNS threat intelligence, distinguishing itself in a sea of aggregators. What sets us apart? Two things: mad DNS skills and unparalleled visibility. DNS is notoriously tricky to interpret and hunt from, but our deep understanding and unique access to the internet's inner workings allow us to track down threat actors that others can't see. We're proactive, not just defensive, using our insights to disrupt cybercrime where it begins. We also believe in sharing knowledge to support the broader security community by publishing detailed research and releasing indicators on GitHub. In addition, our intel is seamlessly integrated into our Infoblox Protective DNS solutions, so customers automatically get its benefits, along with ridiculously low false positive rates.","url":"https:\/\/www.infoblox.com\/blog\/author\/infoblox-threat-intel\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/5837","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/397"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=5837"}],"version-history":[{"count":6,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/5837\/revisions"}],"predecessor-version":[{"id":5839,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/5837\/revisions\/5839"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/6737"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=5837"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=5837"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=5837"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}