2020-12 Solarwind supply chain
- A Widespread breach that affected many public and private org around the world 
- Gain access to victims through Trojanized updates to Solarwind's Orion IT Monitoring and management software 
How?
- An legit .dll component (digitally signed component of Orion software framework) has backdoor 
- The backdoor can make HTTP communications to third party servers. 
- The backdoor is capable of performing recon, profiling system, disable system services, transfer, execute files 
- Hides network traffic behind a known protocol (Orion Improvement Protocol) to blend in with on going activities 
- Hides recon results within legitimate configuration files with other Solarwind activities. 
Behavior?
- Uses multiple obfuscated blocklist to identify forensic and antivirus tools running as processes, services and drivers. 
- It sits dormant for 2 weeks, before "waking up" to retrieve and execute "jobs" from their C2. 
- It resolves to a subdomain of "avsvmcloud.com" after waking up where the DNS response will return a CNAME record that points to a C2 domain. 
- The C2 traffic to the malicious domain is designed to mimic normal SolarWinds API commuinications 
- The list of known malicious infrastructure is available on FireEye’s GitHub page. 
Last updated
Was this helpful?
