Monday, November 25, 2024
HomeCyber AttackSolarWinds Hackers Aimed to Access Victim Cloud Assets after deploying the Solorigate...

SolarWinds Hackers Aimed to Access Victim Cloud Assets after deploying the Solorigate Backdoor

Published on

Microsoft security researchers have continued to investigate Solorigate which caused supply chain compromise and the subsequent compromise of cloud assets and have said that the ultimate ambition of the compromise was to pivot to the victims’ cloud assets after deploying the Sunburst/Solorigate backdoor on their local networks.

What is Solorigate attack chain?

The Solorigate attack features a sophisticated technique involving a software supply chain compromise that allowed attackers to introduce malicious code into signed binaries on the SolarWinds Orion Platform, a popular IT management software.

The compromised application grants attackers “free” and easy deployment across a wide range of organizations who use and regularly update the application, with little risk of detection because the signed application and binaries are common and are considered trusted.

- Advertisement - SIEM as a Service

Target on Cloud Assets

Microsoft mentioned that the target has clearly set on Cloud now.

‘With this initial widespread foothold, the attackers can then pick and choose the specific organizations they want to continue operating within (while others remain an option at any point as long as the backdoor is installed and undetected’

Anticipations as per investigation

Based on the investigations, the next stages of the attack involves on-premises activity with the goal of off-premises access to cloud resources

  1. The compromised SolarWinds DLL is used to activate a backdoor which enables attackers to remotely control and operate the affected device.
  2. The backdoor access is then used to steal credentials, escalate privileges, and move laterally to gain the ability to create valid SAML tokens using either one of the below mentioned methods:
  3. Stealing the SAML singing certificate
  4. Adding to or modifying existing federation trust
  5. Then the attacker created SAML tokens to access the cloud resources and perform actions leading to the exfiltration of emails and persistence in the cloud.

Research and mitigation

Many tests, detection and remediation steps are also proposed specially for Endpoint, detecting hands on keyboard activity within on premise environment and cloud enviiroment, Identifying unusual addition of credentials to an OAuth app, Discovering malicious access to mail items, detecting and blocking backdoor activities, etc and thereby shared mitigation measures against unauthorized cloud access making it difficult for threat actors to gain access.

Much clear visibility about the attack chains and related threat intelligence is analysed as early as possible so organizations can identify and take action to stop this attack, understand the potential scope of its impact, and begin the recovery process from this active threat.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity, and hacking news updates.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Threat Actors Exploit Google Docs And Weebly Services For Malware Attacks

Phishing attackers used Google Docs to deliver malicious links, bypassing security measures and redirecting...

Python NodeStealer: Targeting Facebook Business Accounts to Harvest Login Credentials

The Python-based NodeStealer, a sophisticated info-stealer, has evolved to target new information and employ...

XSS Vulnerability in Bing.com Let Attackers Send Crafted Malicious Requests

A significant XSS vulnerability was recently uncovered in Microsoft’s Bing.com, potentially allowing attackers to...

Meta Removed 2 Million Account Linked to Malicious Activities

 Meta has announced the removal of over 2 million accounts connected to malicious activities,...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

Threat Actors Exploit Google Docs And Weebly Services For Malware Attacks

Phishing attackers used Google Docs to deliver malicious links, bypassing security measures and redirecting...

Python NodeStealer: Targeting Facebook Business Accounts to Harvest Login Credentials

The Python-based NodeStealer, a sophisticated info-stealer, has evolved to target new information and employ...

XSS Vulnerability in Bing.com Let Attackers Send Crafted Malicious Requests

A significant XSS vulnerability was recently uncovered in Microsoft’s Bing.com, potentially allowing attackers to...