Threat actors compromised the IT monitoring and management software of organizations including SolarWinds’s Orion, Intel, Cisco, Nvidia.
Trojanized version of SolarWinds
SolarWinds is a software company that primarily deals in systems management tools used by IT professionals
Over 100 to 280 organizations installed a trojanized version of the SolarWinds Orion platform that infects internal systems with the Sunburst malware.
Importantly, tech companies under category — local governments, universities, hospitals, banks, and telecom providers.
In addition, the biggest organizations that falls under the above category on includes:
|Fujitsu||Digital Reach and Digital Sense|
SUNBURST Malware — Subdomains
According to a SANS report, It is known that the malware was deployed as an update from SolarWinds’ own servers and was digitally signed by a valid digital certificate bearing their name
- This strongly points to a supply chain attack
- The certificate was issued by Symantec — Serial Number: 0fe973752022a606adf2a36e345dc0ed
The way security researchers compiled these lists was by reverse-engineering the Sunburst (aka Solorigate) malware.
However, it is found that this malware was injected inside updates for the SolarWinds Orion app released between March and June 2020.
According to report by multiple security researchers, on infected systems —
- the malware would gather information about the victim company’s network
- wait for 12 to 14 days
- and then send the data to a remote command and control server (C&C).
Post Compromise Attack:
FireEye has uncovered a widespread campaign, tracking as UNC2452.
After gaining initial access, the attacker uses a variety of techniques to disguise their operations.
Importantly, unique URL researchers identified subdomain — avsvmcloud[.]com and contained four parts, where the first part was a random-looking string.
But, security researchers said that this string wasn’t actually unique but contained the encoded name of the victim’s local network domain.
Detection & Mitigations:
A growing list of First-stage and Second-stage victims are getting high, including companies like Cisco, Intel, VMware, Microsoft that have formally confirmed they got infected.
“Escalation” usually happened when the avsvmcloud[.]com C&C server replied to an infected company with a very specific DNS response that contained a special CNAME field.
Moreover, the location of a second C&C server from where the Sunburst malware would get additional commands and sometimes download other malware, can be found in special DNS CNAME field.
Check for the below IOC’s in your environment.
Indicator’s of Compromise
- fc00:: – fe00::
- fec0:: – ffc0::
- ff00:: – ff00::