SolarWinds is one of the biggest names in IT support – and now one of the most notorious. The leading information security vendor provides a variety of solutions to government agencies and private firms across the world. And within the past few days, they revealed that somewhere between 18,000 and 33,000of those customershave been running a breached version (2019.4 HF 5 and 2020.2 with no hotfix or 2020.2 HF 1)of SolarWinds Orion software.
How is the hacker gaining access to the SolarWinds Orion software?
The cyber attacker in question is likely a nation-state, as indicated in Microsoft’s Threat Intelligence Center’s release. The process they appear to have been following in this series of supply-chain hacks goes something like this:
- The hacker succeeds in compromising the update process for SolarWinds and embedding a Trojan Horse in order to gain administrative access to the network.
- After acquiring administrative access, the intruder uses a lateral attack to gain access to the organization’s certificate signing-credentials. The attacker can now generate seemingly authentic credentials – thus enabling them to continue to move throughout the organization.
- These apparently valid credentials prevent most alerts that would normally flag unusual login failures. The attacker now has the opportunity to then take stock of what else they can access in the organization, including both on-premises and cloud-based materials.
- Once the attacker has access to a global administrator’s account or its trusted certificate, they use it to impersonate the admin. This ability is powerful; the attacker now essentially holds the keys to the kingdom. With this new access, the hacker can create new global admins, add them to existing services, and/or develop new services and then pursue obtaining API access to the organization.
Now imagine this process happening to thousands of SolarWinds customers – including some extremely powerful organizations and government agencies. According to reports, once this particular hacker has gained access to the global administrator of a company, they have been keeping the malicious programs, or malware, to a minimum. Instead, they tend to use remote access to move through the enterprises and take over code repositories, trade secrets, MS Office 360, Azure Active Directory – essentially every system that relies on federated access and authentication.
The list of organizations hacked by this attacker keeps growing. It includes many predictable targets for a nation-state actor – such as the US State Department, Pentagon, Department of Homeland Security, National institute of Health and others, as well as many private firms. While many of the known targets are the “big guys”, it’s safe to assume that if you use SolarWinds Orion your organization’s information may be compromised.
If you fall into that category, the wisest course of action is to proceed as if you were compromised. Take it offline, upgrade and contact SolarWinds.
You can reach them at: https://www.solarwinds.com/securityadvisory.
Where to go from here
The lesson from this series of high-profile attacks is that you can do everything right and still be compromised. You can have anti-malware tools running, login restrictions on sensitive systems, failure monitoring – all the things you would do in a traditional in-depth defense environment. But because a) you trusted your supply chain and b) one of the largest and most trusted names in network monitoring and management happened to be breached your organization is now vulnerable and likely infiltrated.
At this point, all you can do is mitigate and minimize the damage done. Some hackers are very, very good and your security is only as effective as the weakest link in your supply chain. These cyber-attacks prove that even one of your largest and most trusted IT suppliers could be the reason that your company/ agency is compromised. To prevent this vulnerability moving forward, you need to trust and verify each element of your security supply chain.
While we still do not know how the development/release system at SolarWinds was compromised – I for one am fascinated to learn how it happened – we can still learn from the incident and take measures to proactively prevent similar breaches. There are certain practices that could have mitigated or limited the damage due to the internal spread of this particular hack, had they been in place.
Some of these recommendations include –
- Update your software frequently. This is still the best way to keep known vulnerabilities at bay. Don’t let this supply chain hack scare you into not keeping your systems up to date. Follow one of the most basic principles in cybersecurity, which is: “patch your systems.”
- Use antivirus systems that update quickly to mitigate this type of attack.
- Monitor your network and systems for anomalous behavior. Look for multiple power shell access to Active Directory from the same machine – especially privileged sign ins.
- Look for adds to your federated services. Use best practices for securing your AD FS services.
- Use whitelists for access to your sensitive network segments. Block outbound traffic, except for what is needed for vital business processes on your trust segments. This blocks the Trojans’ access to its home Command and Control (C2) servers. The servers are where the hackers can then obtain access to your environment.
- Use hardware-based tokens (HSMs) for SAML signatures.
- Alert and verify as authorized new access credentials on OAuth applications.
- Reduce attack surface by removing applications and service principals that are not needed on your systems.
- Make sure you are logging the service principal access and look for anomalies.
- Use multifactor authentication with biometric factors for all logins.
These days, it’s impossible to be too careful when it comes to cybersecurity. If you want to get started now on securing your organization against this type of attack, Authx, a multifactor authentication mechanism with biometrics, offers a prime example of verification methods to determine who actually has access to your systems. Its products use biometrics including face, finger, palm or one-time pad to give additional validity to the user access experience. Authx’s offerings, combined with best practices described above, would have limited the ability for lateral movement and the persistence of this imposter credential attacks – and most others that could come your way.
You can find more information at https://authx.com.