• Platformchevron right
  • Solutionschevron right
  • Modern NDRchevron right
  • Resourceschevron right
  • Companychevron right

DETECTION OVERVIEW

SUNBURST C&C Activity

Risk Factors

The SUNBURST backdoor is part of a supply-chain attack that affects public and private organizations around the world. Attackers designed and distributed this backdoor through sophisticated advanced persistent threat (APT) techniques. The SUNBURST backdoor can give attackers direct access to network traffic management systems.

Kill Chain

Command-and-Control

Risk Score

94

Detection diagram
Next in Command-and-Control: SUPERNOVA Web Shell

Attack Background

The backdoor known as SUNBURST or Solorigate is installed on servers running Orion software through a SolarWinds Orion Platform trojan update file, which includes a malicious DLL file. After installation, the SUNBURST backdoor attempts to resolve a domain, such as avsvmcloud, for a command-and-control (C&C) server. After establishing a connection, the backdoor retrieves and then runs commands for transferring files, running files, collecting system information, rebooting a device, or disabling system services. Several techniques, such as appearing as the Orion Improvement Program (OIP) protocol, enable malicious traffic to blend in with normal SolarWinds network traffic.

Mitigation Options

Disconnect SolarWinds Orion Platform products, versions 2019.4 through 2020.2 HF 1, from the network

Upgrade to Orion Platform version 2019.4 HF 6 or 2020.2.1 HF 1

MITRE ATT&CK ID

What else can RevealX do for you?