SolarWinds the most significant Cybert Attack in History

Thiago Marsal Farias
2 min readSep 17, 2022

--

The year was 2020, and the target was the U.S. Where the most proficient cyber attack allowed criminals access to massive amounts of information from the U.S. and private organizations.

The attack was recognized by FireEye, a cyber security company that provides service to many companies, including the U.S. The main target was the U.S. government to obtain secret information from their intelligence.

FireEye realized that criminals gained access to their system using the Solarwind build platform system to spread their malicious code into multiple companies' networks and system environments. FireEye identified the malware in a customer system infected by a SolarWinds update labeled "UNC2452". This malware was intentioned deployed to open backdoor access to gain entry to its system through SolarWinds as "Sunburst" by using a method called supply chain attack. For instance, emails from DHS — the Department of Homeland Security were observed by hackers.

The hackers found a way to gain access to the system using the SolarWinds Orion network monitoring component, which many companies use. At that time, SolarWinds claimed to have more than 300.000 clients. Thus, it could be the potential number of targets for this attack. This attack took a long time to be revealed, giving access to sensitive information for about 14 months or more, reported later in December 2020. And it remained undetected for a long time because the piece of code existed only in their production environment.

After several months of running and installing compromised updates and being spread undetected. Estimates showed the attack would cost organizations worldwide around U$100 billion. For example, SolarWinds reported their costs for recovery costs to the company at U$ 40 million. The remediation for the attack would be prevented by configuring their firewalls to block outbound connections from the servers running SolarWinds.

References

Brown, T. (2022, May 31). SUNBURST From The Inside — Tim Brown, CISO of SolarWinds. YouTube. Retrieved September 17, 2022, from https://www.youtube.com/watch?v=6gQ5oAWHMoU

Shakarian, P. (2021, January 4). The Sunburst Hack Was Massive and Devastating — 5 Observations from a Cybersecurity Expert. Government Technology. Retrieved September 17, 2022, from https://www.govtech.com/security/the-sunburst-hack-was-massive-and-devastating--5-observations-from-a-cybersecurity-expert.html

SolarWinds Backdoor (Sunburst) Incident Response Playbook. (2020, December 17). TrustedSec. Retrieved September 17, 2022, from https://www.trustedsec.com/blog/solarwinds-backdoor-sunburst-incident-response-playbook/

Tidy, J. (2020, December 16). SolarWinds: Why the Sunburst hack is so serious. BBC. Retrieved September 17, 2022, from https://www.bbc.com/news/technology-55321643

Sign up to discover human stories that deepen your understanding of the world.

Free

Distraction-free reading. No ads.

Organize your knowledge with lists and highlights.

Tell your story. Find your audience.

Membership

Read member-only stories

Support writers you read most

Earn money for your writing

Listen to audio narrations

Read offline with the Medium app

--

--

Thiago Marsal Farias
Thiago Marsal Farias

Written by Thiago Marsal Farias

Passionate about mentoring teams, fostering innovation, and leveraging cutting-edge technologies to solve complex business challenges.

Responses (1)

Write a response