SolarWinds has announced a cyberattack on its systems that compromised specific versions of the SolarWinds Orion Platform, a widely used network management tool. SolarWinds reports that this incident was likely the result of a highly sophisticated, targeted and manual supply chain attack by a nation state, but it has not, to date, independently verified the origin of the attack.

Subsequently, a number of U.S. federal agencies have disclosed they were potentially victims of the hacking campaign. The Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA) has issued Emergency Directive 21-01 in response to this incident.

At this time, IBM recommends organizations running SolarWinds Orion take the following actions:

  • Identify, isolate and investigate any potentially impacted SolarWind Orion or associated computing environment via a comprehensive security analysis. Indicators of Compromise are available from the X-Force Exchange.
  • Take remediation actions based on investigation outcomes after evaluating unique IT environment needs. Vendor guidance and resources from SolarWinds can be leveraged as needed here.

For IBM QRadar users looking for more details on applying the available threat intelligence to their response, IBM has published a more detailed blog in the IBM Security Community available here.

IBM is closely monitoring the overall situation and is engaged with clients and the security community. More details can be found in our X-Force Exchange post, which will be updated as this situation evolves.

Assistance is also available to assist 24×7 via IBM Security X-Force’s US hotline 1-888-241-9812 | Global hotline (+001) 312-212-8034.

more from Incident Response

To Cybersecurity Incident Responders Holding the Digital Front Line, We Salute You

Over the course of two decades, I’ve seen Incident Response (IR) take on many forms. Cybercrime’s evolution has pulled the nature of IR along with it — shifts in cybercriminals’ tactics and motives have been constant. Even the cybercriminal psyche has completely rebirthed, with more collaboration amongst gangs and fully established ransomware enterprises running. When I was first starting off,…

X-Force 2022 Insights: An Expanding OT Threat Landscape

This post was written with contributions from Dave McMillen. So far 2022 has seen international cyber security agencies issuing multiple alerts about malicious Russian cyber operations and potential attacks on critical infrastructure, the discovery of two new OT-specific pieces of malware, Industroyer2 and InController/PipeDream, and the disclosure of many operational technology (OT) vulnerabilities. The OT cyber threat landscape is expanding dramatically and OT…