
- Orion solarwinds windows patching pdf update#
- Orion solarwinds windows patching pdf Patch#
- Orion solarwinds windows patching pdf software#
- Orion solarwinds windows patching pdf series#
If you are licensed for MVISION Insights this query will take place automatically. You can use MVISION EDR or MAR to search endpoints for SUNBURST backdoor indicators as provided by Microsoft and FireEye. One of the first initial response actions should be to hunt for known indicators of the attack.

Figure 3: Mitre Att&ck Framework HUNTING FOR THE BACKDOOR INDICATORS You can use MITRE Att&ck framework to asses defensive capability across your security architecture. Insights outlines the MITRE Att&ck techniques used by SUNBURST. Note: This will be updated as new indicators are verified. You can use the indicators to hunt on your network.
Orion solarwinds windows patching pdf update#
The indicators will continue to update based on automated collection and human analysis. Insights provides the indicators used by SUNBURST. Customers can view the public version of MVISION Insights for the latest attack details, prevalence, techniques used and indicators of compromise. MVISION Insights is tracking the campaign as SolarWinds Supply Chain Attack Affecting Multiple Global Victims with SUNBURST Backdoor. Furthermore, analysis is underway to analyse the behavioural components of the campaign and ensure product efficacy considers protection beyond static measures such as signatures. McAfee Labs will continue analysis for any known indicators associated with this attack and update product protection accordingly.

Part two will describe additional mitigation and solution recommendations.
Orion solarwinds windows patching pdf series#
Part one of this blog series details initial McAfee defensive guidance and response actions. Customers are advised to assess both intellectual property protection and supply chain integrity strategies.
Orion solarwinds windows patching pdf software#
This attack reminds us that in today’s digital enterprise the supply chain includes many diverse elements including but not limited to critical equipment and hardware, cloud software and infrastructure as a service provider and critical IT software. It’s important to note that this was a very sophisticated attack and customers are advised to assess their overall security architecture capability to either prevent, detect or respond to an APT threat. McAfee has evaluated the published countermeasures and will continue to analyze further attack indicators.
Orion solarwinds windows patching pdf Patch#
If you are using SolarWinds software, please refer to the company’s guidance here to check for vulnerable versions and patch information. FireEye released countermeasures that can identify the SUNBURST malware. Use of a Compromised Software Supply Chain (T1195.002) as an Initial Access technique is particularly critical as it can go undetected for a long period. The trojanized file delivers the SUNBURST malware through a backdoor as part of a digitally-signed Windows Installer Patch. In a blog post released, FireEye disclosed that threat actors compromised SolarWinds’s Orion IT monitoring and management software with a trojanized version of .dll.
