SolarWinds SUNBURST Trojan Backdoor

DESCRIPTION

A new zero-day vulnerability has been identified for SolarWinds Orion Platform customers. If you are running SolarWinds versions 2019.4 HF 5 through 2020.2.1 and are utilizing the Orion Platform, you are vulnerable to the SUNBURST Trojan.

The vulnerability is delivered via a normal SolarWinds update which at the time of this bulletin appears to be targeted for any Orion Platform subscribers.

Many of these recommendations have been selected and modified from the https://cyber.dhs.gov/ed/21-01/ emergency directive.

IDENTIFY INDICATORS OF COMPROMISE (IOC)
  • It may be possible that some or all hosts monitored by the SolarWinds Orion monitoring software may be compromised by threat actors and further persistence mechanisms may have been deployed. Analyze stored network traffic for indications of compromise, including new external DNS domains to which hosts (e.g., SolarWinds systems) have had connections.
  • Look for the following IOCs on the SolarWinds instance
    1. [SolarWinds.Orion.Core.BusinessLayer.dll] with a file hash of [b91ce2fa41029f6955bff20079468448]
    2. [C:WINDOWSSysWOW64netsetupsvc.dll]
CONTAINMENT (REQUIRED)
  • Block outbound internet access from the SolarWinds system

    to all external (Internet) destinations except for needed destinations for business functionality.

  1. Install the latest SolarWinds version 2020.2.1 HF1 and verify the hotfixes

    using the instructions provided here

    https://support.solarwinds.com/SuccessCenter/s/article/Verify-hotfixes-that-have-been-installed?language=en_US

 

  • Identify and remove all threat actor-controlled accounts and identified persistence mechanisms.

 

REMEDIATION

After all threat actor-controlled accounts and identified persistence mechanisms have been identified and removed:

  • Any SolarWinds Orion systems identified as compromised should be rebuilt.
  • Reset all credentials used by or stored in SolarWinds software. Such credentials should be considered compromised.
  • Take actions to remediate kerberoasting, including, as necessary or appropriate, engaging with a 3rd party with experience eradicating APTs from enterprise networks. For Windows environments, refer to the following:

See Microsoft’s documentation on kerberoasting:

https://techcommunity.microsoft.com/t5/microsoft-security-and/detecting-ldap-based-kerberoasting-with-azure-atp/ba-p/462448

Define the Security Policy setting, for Network Security: Configure Encryption types allowed for Kerberos. Set the allowable encryption types to AES256_HMAC_SHA1 and Future encryption types. https://docs.microsoft.com/en-us/windows/security/threat-protection/security-policy-settings/network-security-configure-encryption-types-allowed-for-kerberos

 

trojan

 

Cybersecurity & Risk News, Updates, Resources
HALOCK Breach Bulletin
Exploit Insider
Cybersecurity Awareness Posters

Review Your Security and Risk Profile