DETECTION OVERVIEW
Risk Factors
The SUNBURST backdoor is part of a supply-chain attack that affects public and private organizations around the world. Attackers designed and distributed this backdoor through sophisticated advanced persistent threat (APT) techniques. The SUNBURST backdoor can give attackers direct access to network traffic management systems.
Category

The backdoor known as SUNBURST or Solorigate is installed on servers running Orion software through a SolarWinds Orion Platform trojan update file, which includes a malicious DLL file. After installation, the SUNBURST backdoor attempts to resolve a domain, such as avsvmcloud, for a command-and-control (C&C) server. After establishing a connection, the backdoor retrieves and then runs commands for transferring files, running files, collecting system information, rebooting a device, or disabling system services. Several techniques, such as appearing as the Orion Improvement Program (OIP) protocol, enable malicious traffic to blend in with normal SolarWinds network traffic.
Network analysis and visibility solutions remain underrepresented in enterprises. Find out why in this preview of a new Wave report.
ExtraHop® Named a Leader in First-Ever Gartner® Magic Quadrant™ for Network Detection and Response
Visit this resource for more information.
This analysis exposes the critical link between an organization's lack of internal visibility and the escalating cost of compromise, demanding an urgent re-evaluation of how core business assets are protected.
Learn why you need to be wary of the claims certain network detection and response providers make about their coverage against the MITRE ATT&CK framework.
Learn how NDR from RevealX helps security teams detect and investigate more adversary TTPs in the MITRE ATT&CK framework than rule-based tools.
