Frame-14

Privacy Ninja

        • DATA PROTECTION

        • CYBERSECURITY

        • Secure your network against various threat points. VA starts at only S$1,000, while VAPT starts at S$4,000. With Price Beat Guarantee!

        • API Penetration Testing
        • Enhance your digital security posture with our approach that identifies and addresses vulnerabilities within your API framework, ensuring robust protection against cyber threats targeting your digital interfaces.

        • On-Prem & Cloud Network Penetration Testing
        • Boost your network’s resilience with our assessment that uncovers security gaps, so you can strengthen your defences against sophisticated cyber threats targeting your network

        • Web Penetration Testing
        • Fortify your web presence with our specialised web app penetration testing service, designed to uncover and address vulnerabilities, ensuring your website stands resilient against online threats

        • Mobile Penetration Testing
        • Strengthen your mobile ecosystem’s resilience with our in-depth penetration testing service. From applications to underlying systems, we meticulously probe for vulnerabilities

        • Cyber Hygiene Training
        • Empower your team with essential cybersecurity knowledge, covering the latest vulnerabilities, best practices, and proactive defence strategies

        • Thick Client Penetration Testing
        • Elevate your application’s security with our thorough thick client penetration testing service. From standalone desktop applications to complex client-server systems, we meticulously probe for vulnerabilities to fortify your software against potential cyber threats.

        • Source Code Review
        • Ensure the integrity and security of your codebase with our comprehensive service, meticulously analysing code quality, identifying vulnerabilities, and optimising performance for various types of applications, scripts, plugins, and more

        • Email Spoofing Prevention
        • Check if your organisation’s email is vulnerable to hackers and put a stop to it. Receive your free test today!

        • Email Phishing Excercise
        • Strengthen your defense against email threats via simulated attacks that test and educate your team on spotting malicious emails, reducing breach risks and boosting security.

        • Cyber Essentials Bundle
        • Equip your organisation with essential cyber protection through our packages, featuring quarterly breached accounts monitoring, email phishing campaigns, cyber hygiene training, and more. LAUNCHING SOON.

US Govt, FireEye Breached After SolarWinds Supply-Chain Attack

US Govt, FireEye Breached After SolarWinds Supply-Chain Attack

Trojanized versions of SolarWinds’ Orion IT monitoring and management software have been used in a supply chain attack leading to the breach of government and high-profile companies after attackers deployed a backdoor dubbed SUNBURST or Solorigate.

The list of victims of this large scale attack, coordinated by what Microsoft and FireEye consider to be nation-state hackers, include several federal agencies such as the US Treasury and the US National Telecommunications and Information Administration (NTIA), as first reported by Reuters.

SolarWinds’ customer listing [12] (with over 300,000 customers worldwide) includes over 425 of the US Fortune 500, all top ten US telecom companies, hundreds of universities and colleges, all five branches of the US Military, the US Pentagon, the State Department, NASA, NSA, Postal Service, NOAA, Department of Justice, and the Office of the President of the United States.

DHS-CISA has also issued an alert over the weekend warning of active exploitation of trojanized SolarWinds Orion Platform software versions which the attackers use to deploy a backdoor on unpatched servers via the update mechanism.

DHS-CISA also issued Emergency Directive 21-01 which orders all federal civilian agencies to “immediately disconnect or power down SolarWinds Orion products, versions 2019.4 through 2020.2.1 HF1, from their network.” The agencies are also prohibited from “(re)joining the Windows host OS to the enterprise domain.”

Roughly 18,000 customers downloaded trojanized SolarWinds Orion versions

“We are aware of a potential vulnerability which if present is currently believed to be related to updates which were released between March and June 2020 to our Orion monitoring products,” Kevin Thompson, SolarWinds President and CEO, told BleepingComputer.https://www.ad-sandbox.com/static/html/sandbox.html

Also Read: Data Storage Security Standards: What Storage Professionals Need to Know

“We believe that this vulnerability is the result of a highly-sophisticated, targeted, and manual supply chain attack by a nation-state.

“We are acting in close coordination with FireEye, the Federal Bureau of Investigation, the intelligence community, and other law enforcement to investigate these matters. As such, we are limited as to what we can share at this time.”

In an 8K filing with the U.S. Securities and Exchange Commission, SolarWinds also said that it “believes the actual number of customers that may have had an installation of the Orion products that contained this vulnerability to be fewer than 18,000.”

SolarWinds is also working with Microsoft to remove an attack vector leading to the compromise of targets’ Microsoft Office 365 office productivity tools.

SolarWinds uses Microsoft Office 365 for its email and office productivity tools. SolarWinds was made aware of an attack vector that was used to compromise the Company’s emails and may have provided access to other data contained in the Company’s office productivity tools. SolarWinds, in collaboration with Microsoft, has taken remediation steps to address the compromise and is investigating whether further remediation steps are required, over what period of time this compromise existed and whether this compromise is associated with the attack on its Orion software build system. SolarWinds also is investigating in collaboration with Microsoft as to whether any customer, personnel or other data was exfiltrated as a result of this compromise but has uncovered no evidence at this time of any such exfiltration. – SolarWinds 8K SEC filing

Attacks target governments and private organizations

This ongoing campaign has started as early as spring 2020 (starting with March 2020 when the first malicious SolarWinds Orion versions were introduced via the compromise of the Orion software build system) and its goals include but are probably not limited to data theft.

Nation-state hackers who coordinated these attacks have most likely been active in compromised networks since then, given that the first hacked targets were discovered in December.

The hacking group behind the SolarWinds supply chain attack are focusing their attacks against a large assortment of worldwide targets including “government, consulting, technology, telecom and extractive entities in North America, Europe, Asia, and the Middle East.”

“We anticipate there are additional victims in other countries and verticals,” FireEye said yesterday.

“FireEye has notified all entities we are aware of being affected,” the company said, confirming that the nation-state hackers that breached its systems (tracked as UNC2452) are the same as the ones abusing SolarWinds’ Orion business software.

Microsoft also published a blog and guidance for customers to defend against these ongoing attacks, also confirming the nation-state nature of the hacking group behind the SolarWinds Orion compromise.

As explained by Microsoft, the attacks start with “an intrusion through malicious code in the SolarWinds Orion product” after trojanized updates delivering a backdoor (tracked as SUNBURST by FireEye and Solorigate by Microsoft) are deployed on the targets’ systems.

SolarWinds supply chain attack
Source: Microsoft

“While updating the SolarWinds application, the embedded backdoor code loads before the legitimate code executes,” Microsoft said.

“Organizations are misled into believing that no malicious activity has occurred and that the program or application dependent on the libraries is behaving as expected.”

“This results in the attacker gaining a foothold in the network, which the attacker can use to gain elevated credentials.

Once inside the victim’s network, the threat actors are elevating privileges to a global admin account or gain access to the victim’s trusted SAML token signing certificate.

This allows them to impersonate any account or user on the network, “including highly privileged accounts.”

Also Read: IT Governance Framework PDF Best Practices and Guidelines

Hotfix available

SolarWinds has released Orion Platform version 2020.2.1 HF 1 to allow admins to secure systems running compromised versions (from 2019.4 HF 5 to 2020.2.1, released between March 2020 and June 2020).

“We are recommending you upgrade to Orion Platform version 2020.2.1 HF 1 as soon as possible to ensure the security of your environment,” SolarWinds’ security advisory reads. “The latest version is available in the SolarWinds Customer Portal.”

“An additional hotfix release, 2020.2.1 HF 2 is anticipated to be made available Tuesday, December 15, 2020.

“We recommend that all customers update to release 2020.2.1 HF 2 once it is available, as the 2020.2.1 HF 2 release both replaces the compromised component and provides several additional security enhancements.”

The company also provides additional hardening and mitigation info for those who cannot immediately apply the hotfix on vulnerable servers.

“The primary mitigation steps include having your Orion Platform installed behind firewalls, disabling internet access for the Orion Platform, and limiting the ports and connections to only what is necessary,” SolarWinds said.

“Additionally, we recommend customers scan their environment for the affected file: SolarWinds.Orion.Core.BusinessLayer.dll. If you locate this .dll, you should immediately upgrade to remove the affected file, and follow security protocols to protect your environment.”

Update December 14, 10:26 EST: The Russian Embassy in the USA reacted [12] to a Washington Post report [12] linking these attacks to APT29 (aka Cozy Bear and The Dukes), a group of nation-state hackers associated with the Russian Foreign Intelligence Service (SVR).

We paid attention to another unfounded attempt of the U.S. media to blame Russia for hacker attackes on U.S. governmental bodies.

  • We declare responsibly: malicious activities in the information space contradicts the principles of the Russian foreign policy, national interests and our understanding of interstate relations. Russia does not conduct offensive operations in the cyber domain. [emphasis ours]
  • What is more, the Russian Federation actively promotes bilateral and multilateral cyber security agreements. In this regard, we would like to remind our American collegues of the initiative put forward by President Vladimir Putin on September 25 on a comprehensive program of measures to restore Russian-U.S. cooperation in the field of international information security.
  • http://en.kremlin.ru/events/president/news/64086
  • We have received no reply from Washington. Many our other suggestions to start constructive and equal dialogue with the U.S. remain unanswered.

Update December 14, 14:05 EST: The hacking group that breached the U.S. Treasury and the US NTIA has also infiltrated the U.S. Department of Homeland Security according to a Reuters report.

0 Comments

KEEP IN TOUCH

Subscribe to our mailing list to get free tips on Data Protection and Data Privacy updates weekly!

Personal Data Protection

REPORTING DATA BREACH TO PDPC?

We have assisted numerous companies to prepare proper and accurate reports to PDPC to minimise financial penalties.
×

Hello!

Click one of our contacts below to chat on WhatsApp

× Chat with us