Tag Archives: Solorigate

Microsoft offers free tool to detect signs of SolarWinds malware code

Microsoft is helping organizations that are investigating whether they are victims of the Solorigate attack by offering them a free tool, the CodeQL queries that the company used to scan its source code for after the attack. the queries Microsoft used with CodeQL identify any code that is similar in pattern and function to the SolarWinds malware. So, these queries can be used on any software to do the same.

Meanwhile, security researchers from SecurityScorecard say that they have found a piece of malware used in the attack that dates back to almost four years ago. The malware, dubbed Teardrop, profiles a victim’s system and network, and this dates back all the way to 2017.

Ryan Sherstobitoff, vice president of cyberthreat research and intelligence at SecurityScorecard derived from this fact that Teardrop was likely used in other APT operations before SolarWinds by this nation-state hacking team.

Notably, when FireEye went public about suffering the data breach in December 2020, the company described Teardrop as a piece of malware that they have not seen before.

1 Star2 Stars3 Stars4 Stars5 Stars (No Ratings Yet)

Active Directory’s architectural limitations taken advantage of during Solorigate, says CrowdStrike CEO

During the Feb 23rd senate hearing on SolarWinds Orion software hack, George Kurtz, president, and CEO of CrowdStrike pointed towards an ‘architectural limitation’ in Active Directory federation Service that was taken advantage of during the attack.

“Significantly, one of the most sophisticated aspects of the StellarParticle campaign was how skillfully the threat actor took advantage of architectural limitations in Microsoft’s Active Directory Federation Service credentialing and authentication process. The Golden SAML attack leveraged by StellarParticle actors allowed them to jump from customers’ on-premise environments and into their cloud and cloud-applications, effectively bypassing multi-factor authentication,” said Kurtz. He also went on to say that the presence of this flaw means that more breaches will come as it enables attackers to masquerade as anyone in the network.

The Senate hearing took place in the presence of executives that included Kevin Mandia, FireEye’s CEO; Sudhakar Ramakrishna, SolarWinds’ CEO; Brad Smith, Microsoft’s president; and George Kurtz, CrowdStrike’s president, and CEO. Notably, there was no representative present from Amazon Web services even though the company was invited.

1 Star2 Stars3 Stars4 Stars5 Stars (No Ratings Yet)