Last week a serious cybersecurity breach concerning SolarWinds’ Orion network- and remote-monitoring platform was revealed. Orion has been implemented by a great many organizations, including the White House, the Pentagon, the U.S Department of energy and many other government agencies and technology companies.
This cyberattack was particularly clever, in that the perpetrators designed the malware to look like Orion software files with a signed certificate. When the user deployed what he or she thought was a legitimate update, the malware was distributed. The traffic looked exactly like Orion traffic, so there were no red flags; consequently, it was easy to overlook the breach, which is why it was so widely distributed. Learn more about how this breach can impact public safety agencies by registering for MCP's cyber briefing today at 1 p.m. Eastern.
From a cybersecurity perspective, this sort of attack is highly sophisticated. It is classified as a Trojan backdoor—in short, the cyberattackers injected infected code masked as a legitimate software file into the Orion packages. That code then propagated via routine software updates that, from all appearances, looked to be legitimate.The Department of Homeland Security’ Cybersecurity Infrastructure and Security Agency (CISA)—which is responsible for the nation’s cybersecurity—is working to determine the extent of the damage, and it likely will be weeks, even months before it completes its investigation. But some aspects already are known, as follows:
Regarding the last bullet point, Mission Critical Partners’ NetInform™ solution is designed to deliver a comprehensive assessment of an organization’s network and information technology environment to uncover areas of risk. We would welcome the opportunity to limit the impact of the SolarWinds breach on your critical infrastructure via this service—please reach out.
Mike Beagles is MCP’s platform and service product manager and a certified Cisco CyberOps associate. He has more than 13 years of IT and cybersecurity experience. Mike can be emailed at MikeBeagles@MissionCriticalPartners.com.