SolarWinds has announced a cyberattack on its systems that compromised specific versions of the SolarWinds Orion Platform, a widely used network management tool. SolarWinds reports that this incident was likely the result of a highly sophisticated, targeted and manual supply chain attack by a nation state, but it has not, to date, independently verified the origin of the attack.

Subsequently, a number of U.S. federal agencies have disclosed they were potentially victims of the hacking campaign. The Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA) has issued Emergency Directive 21-01 in response to this incident.

At this time, IBM recommends organizations running SolarWinds Orion take the following actions:

  • Identify, isolate and investigate any potentially impacted SolarWind Orion or associated computing environment via a comprehensive security analysis. Indicators of Compromise are available from the X-Force Exchange.
  • Take remediation actions based on investigation outcomes after evaluating unique IT environment needs. Vendor guidance and resources from SolarWinds can be leveraged as needed here.

For IBM QRadar users looking for more details on applying the available threat intelligence to their response, IBM has published a more detailed blog in the IBM Security Community available here.

IBM is closely monitoring the overall situation and is engaged with clients and the security community. More details can be found in our X-Force Exchange post, which will be updated as this situation evolves.

Assistance is also available to assist 24×7 via IBM Security X-Force’s US hotline 1-888-241-9812 | Global hotline (+001) 312-212-8034.

more from Incident Response

IBM to Acquire Randori, Transforming How Clients Manage Risk with Attack Surface Management

Organizations today are faced with defending a complex technology landscape — with cyberattacks targeted at constantly changing cloud, distributed, and on-premises environments. Often escaping security scans and periodic assessments, these changes represent windows of opportunities for attackers looking to bypass defenses. While there always have — and always will be — unknown risks, having a […]