Flash Report: CISA Issues Emergency Directive to Mitigate SolarWinds Orion Code Compromise

On December 13, 2020, the Cybersecurity & Infrastructure Security Agency (CISA) issued an emergency directive detailing required action for federal agencies to mitigate the threat of the recently discovered compromise involving SolarWinds® Orion® Network Management products that are currently being exploited by malicious actors. (Read the SolarWinds Security Advisory here.) Given the nature of the threat and its potential impact on many industries outside of federal agencies and the public sector, organizations should take proactive steps to determine if this software revision is in use within their environment, and also evaluate their incident response function to ensure an appropriate level of vigilance.

The goal of an attacker attempting to capitalize on this code compromise is to gain initial access to an organization’s systems and maintain that unauthorized access despite typical interruptions to that initial foothold, like changes to access credentials and system restarts.

As more information is released, including patch fixes by SolarWinds, organizations with the SolarWinds Orion platform should consider proactive steps to reduce their exposure to this event:

  • Patch – SolarWinds has released a Hotfix for this code compromise, with another expected on 12/15/2020. Organizations should continue to monitor guidance from SolarWinds as it releases more information.
  • Detection OpportunityIndicators of Compromise (IOC) have been released, as there are reports of active campaigns targeting private and public organizations. Organizations should use these IOCs to update their antivirus and endpoint detection and response (EDR) and scan their assets for anomalies that match the behavior of this exploit. In addition, with the known IP addresses being used for this attack, organizations can block assets from communicating with domains behind these IP addresses.
  • Tabletop Analysis – For organizations seeking additional guidance, the MITRE ATT&CK knowledge base lays out a good approach to examine the lifecycle, tools and techniques associated with these types of exploit. Incident management teams should use the MITRE ATT&CK framework to understand the level of protection their organization has at the various stages of this attack. This is a useful exercise to uncover blind spots that may need to be addressed. For example, the organization may not have a system or tool to detect lateral movement, which is a technique an attacker would use to move through an organization’s environment after initial access via this code compromise.
  • Identity and Access Management Review – An attacker exploiting this vulnerability is trying to gain initial access, evade detection and move laterally to identify a target or payload of interest. An attacker’s ability to accomplish this goal or to dwell in an environment undetected is critically impacted by the strength of the organization’s identity and access management (IAM). Elements like privileged access management (PAM), identity federation, session management, services account management, and other core disciplines within an IAM program all play a crucial role in defending the organization against these events. This is a good time to evaluate the organization’s IAM program and ensure adequate defense in depth against this and similar attack vectors.

Protiviti can assist companies with preparing for and responding to the evolving threats posed by ransomware and other cyberattacks. Contact Protiviti’s Incident Response Team at IR@protiviti.com for technical, crisis management and investigative support.

This flash report is also available on protiviti.com

 

Curt Dalton

Managing Director
Security and Privacy

Subscribe to Topics

Protiviti Director Kyle Swanson explains how SAP Fiori can help increase user adoption, reduce workload and process complexity and free up time for your resources to focus on higher value tasks http://ow.ly/DACw50D9RWc #SAPblog #SAPFiori

Is your organization managing to the speed of emerging technology? Is its business model at risk of digital disruption? If the board's not sure, it’s time to assess digital readiness http://ow.ly/xlJX50D5MX0 via @cci_compliance
#DigitalReadiness #DigitalDisruption @DeLoachJim

Session voting and registration is OPEN for DynamicsCon, a free, virtual event focused on Microsoft Dynamics and Power Platform! Vote for our sessions and register today!
Vote: https://bit.ly/3oIxS4y
Register: http://bit.ly/3nHTH2Q
#Dynamics365 #PowerPlatform #Microsoft

How are you protecting your data? Join us on February 3rd to see how #Microsoft Information Protection can help your organization protect sensitive data throughout its entire lifecycle. Register now: http://bit.ly/3b9udsz

@Microsoft #MIP #DataProtection

What does #resilience mean for your organization? A key first step is understanding the attributes of a #BCM or Operational Resilience program. Learn more at http://ow.ly/1r9250CShAt
#businesscontinuity #businesscontinuityplanning #operationalresilience #bankingindustry

Load More...