Skip to content
NGTEdu Logo

NGTEdu

A PRODUCT OF NGTECH.CO.IN

NGTEdu Logo

NGTEdu

  • Home
  • Cyber Attacks
  • Malware
  • Vulnerabilities
  • Data Breach
  • Home
  • Cyber Attacks
  • Continue Clean-up of Compromised SolarWinds Software
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

Continue Clean-up of Compromised SolarWinds Software

5 years ago Ray Lapena
Continue Clean-up of Compromised SolarWinds Software

Last week, the United States Cybersecurity & Infrastructure Security Agency (CISA) advised on initial steps to take in response to the SolarWinds software that was compromised by advanced persistent threat actors. While federal agencies were under a deadline to complete certain actions, this issue will require continued clean-up and longer-term efforts to mitigate the threat.

Staying the course, organizations will want to scan their environments for the presence of the compromised SolarWinds software. There may be places you forgot to look. In addition, backdoored versions of the software may be lurking on offline systems. In today’s reality of remote work, there could be systems and devices with the software that simply haven’t been detected yet because they weren’t connected to the network. You will want to monitor for that.

Here’s what you want to include in your continued clean-up efforts.

Multiple scanning methods for vulnerabilities, IoCs associated with SolarWinds breach

Look at the rest of your security toolset to complement your malware detection capabilities. You want to scan for the malicious version of the software in multiple ways. To be safe, scan local, remote and network-based.

Tripwire Enterprise and Tripwire IP360 can both find malicious versions of the software on your systems, complementing your other endpoint scans and broadening the search across your greater environment. Tripwire IP360 will find the vulnerabilities associated with the SolarWinds breach. Tripwire Enterprise, while widely known for secure configuration and change detection, will also discover the software, as it looks at file systems and indicators of compromise.

Use the different tools under your belt to ensure an accurate assessment.

Monitor system integrity to prevent reintroduction of malicious software

Baseline your system against a known, good state and check for any changes. There could be downstream effects associated with SUNBURST that we don’t know about. Persistent monitoring will also track for offline systems coming back online that could reintroduce bad software into the system. This is especially an issue if a compromised asset comes back online and connects to a critical asset, but it applies to the scenario in which new assets are being added to the environment, as well. Tripwire users can look to Tripwire Enterprise for integrity management capabilities that address this; consider it a backstop of sorts for detecting unusual or unauthorized activity.

Check your logs

Make sure you have some log management tool in place for processing your firewall logs. This should be integrated with your secure configuration management process. You can also gather logs for valid internal SolarWinds usernames to see where those credentials have been used since the installation of the of the trojaned software. You should also check logs for outbound communication to the C2 domain.

Sweep the whole house to find SolarWinds software

With a breach of this nature and scale, there will be outlying issues to address beyond these first few days of clean-up. Persistent monitoring and clean-up will be critical to catch the stragglers. Ensure malware detection and endpoint solutions are up to date, check to see that your vulnerability management and other tools have coverage for finding the SolarWinds software, check logs and take the time and effort for a deep clean. Dusting off one piece of furniture in your house might look clean until you realize the dust has just settled everywhere around. A full persistent clean-up is needed to mitigate the threat of this issue.

For more information on how Tripwire can support your clean-up efforts of compromised Solarwinds issues, please contact your Tripwire representative or request support here.

The post ” Continue Clean-up of Compromised SolarWinds Software” appeared first on TripWire

Source:TripWire – Ray Lapena

Tags: Critical Severity, Goverment, TripWire

Continue Reading

Previous Simplifying Proactive Defense With Threat Playbooks
Next Zero-Click Apple Zero-Day Uncovered in Pegasus Spy Attack

More Stories

  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

Iran-Linked RedKitten Cyber Campaign Targets Human Rights NGOs and Activists

1 day ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

Mandiant Finds ShinyHunters-Style Vishing Attacks Stealing MFA to Breach SaaS Platforms

2 days ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Malware

CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar Farms

2 days ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

Researchers Uncover Chrome Extensions Abusing Affiliate Links and Stealing ChatGPT Access

2 days ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

China-Linked UAT-8099 Targets IIS Servers in Asia with BadIIS SEO Malware

2 days ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Malware

Ex-Google Engineer Convicted for Stealing 2,000 AI Trade Secrets for China Startup

3 days ago [email protected] (The Hacker News)

Recent Posts

  • Iran-Linked RedKitten Cyber Campaign Targets Human Rights NGOs and Activists
  • Mandiant Finds ShinyHunters-Style Vishing Attacks Stealing MFA to Breach SaaS Platforms
  • CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar Farms
  • Researchers Uncover Chrome Extensions Abusing Affiliate Links and Stealing ChatGPT Access
  • China-Linked UAT-8099 Targets IIS Servers in Asia with BadIIS SEO Malware

Tags

Android APT Bug CERT Cloud Compliance Coronavirus COVID-19 Critical Severity Encryption Exploit Facebook Finance Google Google Chrome Goverment Hacker Hacker News High Severity Instagram iPhone Java Linux Low Severity Malware Medium Severity Microsoft Moderate Severity Mozzila Firefox Oracle Patch Tuesday Phishing Privacy QuickHeal Ransomware RAT Sim The Hacker News Threatpost TikTok TripWire VMWARE Vulnerability Whatsapp Zoom
Copyright © 2020 All rights reserved | NGTEdu.com
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Read More here.Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT