<img alt="" src="https://secure.hiss3lark.com/173130.png" style="display:none;">

Datashield's Resource Library

Read all of our news, articles, reviews, and more in our company blog

All Posts

Security Advisory - SolarWinds Orion "Sunburst" Supply Chain Attack

Security Advisory - SolarWinds Orion _Sunburst_ Supply Chain Attack

On December 13th, 2020, SolarWinds released a statement along with FireEye about a current and ongoing supply chain compromise surrounding the SolarWinds Orion products. This impacts SolarWinds Orion software versions 2019.4 through 2020.2.1, released between March 2020 and June 2020. SolarWinds has pushed out a hotfix that will resolve the affected product.

Solar Winds Security Advisory & Hotfix Link: https://www.solarwinds.com/securityadvisory

This was a highly sophisticated supply chain compromise that deployed a piece of malware being tracked as SUNBURST. FireEye has released several rules to detect the IOC’s in the environment. If hot fixing the affecting product is not possible, there are several other options:

  • Disconnect or power down affected SolarWinds Orion Products
  • Block SolarWinds hosts from communicating with external addresses until the patch can be applied.

As a precaution, Datashield recommends performing the following actions:

  • Resetting all credentials used by the SolarWinds software
  • Reset all admin credentials who utilized SolarWinds software
  • Rebuild SolarWinds Orion hosts

We will keep you updated with any relevant information as this incident progresses. Additional links and information are below:

If your organization has utilized the SolarWinds Orion product suite or if you have any questions regarding this vulnerability, please Contact Us.

Topics from this Article

News, Announcement, CVE, Cyber Security, Malware, SolarWinds, FireEye, SUNBURST

Official Datashield account for blog content, news, announcements and more. The articles authored include a collaboration between internal staff, specifically the security operations and marketing team.

Related Posts

What is Microsoft Defender for Endpoint and How Does it Work?

Microsoft Defender for Endpoint, formerly known as Microsoft Defender Advanced Threat Protection, provides enterprise-level protection to endpoints to prevent, detect, investigate, and respond to advanced threats.

What is the Zero Trust Framework?

Zero Trust security concept is a model and framework developed by former Forrester analyst John Kindervag in 2010. Since then, the Zero Trust model is widely adopted, with leading researchers at Gartner, Microsoft, and Google all developing and implementing their variations of Zero Trust frameworks while keeping the core concept intact.

Behavioral Indicators of Insider Threat Activity

Contrary to popular beliefs, an insider threat is not always a security risk within an organization's immediate perimeter. Current employees and managers aside, an insider threat could be a former employee who had access to specific information, a third-party consultant, or a business partner.