SolarWinds falls victim to "highly sophisticated" cyber attack

US Treasury and Commerce employees were advised to "immediately disconnect" from the affected SolarWinds Orion products

Software provider SolarWinds has confirmed that it had been targeted by a cyber attack which has seen hackers infect the networks of multiple US companies and government networks.

The company announced that its systems had fallen victim to “a highly sophisticated, manual supply chain attack” which “was likely conducted by an outside nation state and intended to be a narrow, extremely targeted, and manually executed attack, as opposed to a broad, system-wide attack”.

SolarWinds advised users to upgrade to the latest version of its Orion Platform, version 2020.2.1 HF 1, which is available to download from the SolarWinds Customer Portal.

“We are working to investigate the impacts of this incident and will continue to update you as we are made aware of any interruptions or impact to your business specifically,” the company said in a statement.

On Sunday, the US Cybersecurity and Infrastructure Security Agency (CISA) warned that the attack “poses an unacceptable risk to [the] Federal Civilian Executive Branch” and asked employees of the governmental departments to “immediately disconnect or power down” the affected SolarWinds Orion products.

Related Resource

The inevitable ascent of zero trust

Ensure user activities are trustworthy without interrupting workflow

What is zero trust and how to implement it - whitepaperDownload now

According to the federal agency, unidentified malicious actors managed to exploit SolarWinds’ Orion products, affecting the 2019.4 through 2020.2.1 HF1 versions.

Although the attack is believed to have been orchestrated by the Russian government, the Embassy of Russia in the USA strongly denied its involvement.

In a Facebook post, it stated that “malicious activities in the information space contradicts the principles of the Russian foreign policy, national interests and our understanding of interstate relations”. 

“Russia does not conduct offensive operations in the cyber domain,” it added.

News of the attack comes just days after US cyber security firm FireEye confirmed that it had fallen victim to a hack that is believed to be the work of Russian actors

The company, which is often used by governments to fend off state-sponsored attacks, said that a "highly sophisticated state-sponsored adversary" had breached its systems and made off with advanced penetration tools. FireEye has since confirmed that the SolarWinds supply chain attack is how hackers gained access to its network. 

"We have identified a global campaign that introduces a compromise into the networks of public and private organisations through the software supply chain," FireEye said in a blog post on Sunday.

"This compromise is delivered through updates to a widely-used IT infrastructure management software—the Orion network monitoring product from SolarWinds. The campaign demonstrates top-tier operational tradecraft and resourcing consistent with state-sponsored threat actors."

Featured Resources

The ultimate law enforcement agency guide to going mobile

Best practices for implementing a mobile device program

Free download

The business value of Red Hat OpenShift

Platform cost savings, ROI, and the challenges and opportunities of Red Hat OpenShift

Free download

Managing security and risk across the IT supply chain: A practical approach

Best practices for IT supply chain security

Free download

Digital remote monitoring and dispatch services’ impact on edge computing and data centres

Seven trends redefining remote monitoring and field service dispatch service requirements

Free download

Recommended

Acer Taiwan falls victim to cyber attack
hacking

Acer Taiwan falls victim to cyber attack

18 Oct 2021
Marsh McLennan reveals its cyber risk analytics center
risk management

Marsh McLennan reveals its cyber risk analytics center

15 Oct 2021
£100 contactless payment limit could place shoppers at risk, warn industry experts
Policy & legislation

£100 contactless payment limit could place shoppers at risk, warn industry experts

15 Oct 2021
Hackers used MSHTML exploit a week before patches were ready
zero-day exploit

Hackers used MSHTML exploit a week before patches were ready

14 Oct 2021

Most Popular

Best Linux distros 2021
operating systems

Best Linux distros 2021

11 Oct 2021
HPE wins networking contract with Birmingham 2022 Commonwealth Games
Network & Internet

HPE wins networking contract with Birmingham 2022 Commonwealth Games

15 Oct 2021
Veritas Backup Exec 21.3 review: Covers every angle
backup software

Veritas Backup Exec 21.3 review: Covers every angle

14 Oct 2021