SANS Emergency Webcast: What you need to know about the SolarWinds Supply-Chain Attack

Поделиться
HTML-код
  • Опубликовано: 4 янв 2025
  • НаукаНаука

Комментарии • 342

  • @maxclaire732
    @maxclaire732 4 года назад +85

    Don't forget to mention that the owners of SolarWinds dumped a lot of stock before the hack was made public.

    • @paladin11C40
      @paladin11C40 4 года назад +7

      After the Executive VP dumped around 45-54 million dollars, then two Chinese connected companies bought into the company in October and November.

    • @joedonzi9552
      @joedonzi9552 4 года назад +7

      Thanks Max , i did not know that - as with 9-11 the main stream media is loathe to simply "follow the money."

    • @phungo1028
      @phungo1028 4 года назад +2

      www.washingtonpost.com/technology/2020/12/15/solarwinds-russia-breach-stock-trades/

    • @joedonzi9552
      @joedonzi9552 4 года назад +10

      @@phungo1028 Washington Post is 100% Pure Deep State "propaganda" - zero journalistic credibility !

    • @stefanb6539
      @stefanb6539 4 года назад +4

      @@joedonzi9552 The stuff in the article is pretty much open-source. If you don't believe them, you just have to dig out the public record of stock trades. IF it was fake, Solarwinds would have demanded retraction immediately.

  • @craigpe007
    @craigpe007 4 года назад +27

    On the SaaS point - the very first path listed on the "Known Paths" slide is 'N-Able Technologies' - a well known Managed Services platform for small to medium MSPs SolarWinds acquired a few years ago, and available as SaaS and local, which makes this a bigger footprint than the 18k companies that are Orion users... And NTM is also a listed path, which is not Orion specific...

  • @fredbeardoezstuff7941
    @fredbeardoezstuff7941 3 года назад +10

    Sans Undertale

  • @royceschmitz88
    @royceschmitz88 4 года назад +15

    Very informative...I can't wait to listen to the updates on this hacking incident

    • @jenalatz3589
      @jenalatz3589 4 года назад

      I cant wait for them to leak

  • @beanman9053
    @beanman9053 6 месяцев назад +1

    Can’t believe sans did this after the pacifist timeline

  • @jenalatz3589
    @jenalatz3589 4 года назад +1

    What are the other two state governments attacked other than Arizona?

  • @crimsonhalo13
    @crimsonhalo13 4 года назад +2

    Thanks, everyone! Will be sharing this with friends and family. It's too important to miss.

  • @michaellong8812
    @michaellong8812 4 года назад +1

    Great presentation Jake.
    Thanks for hosting SANS.

  • @TheRealoldcar
    @TheRealoldcar 4 года назад +16

    Solarwinds stock will take a big hit as all the Government customers dump their products.

    • @jondoe7205
      @jondoe7205 4 года назад +8

      I sure hope so!

    • @jhnssch6744
      @jhnssch6744 4 года назад +3

      Was panic sold in September according to what I read earlier (by those in the know & at a wonderful price obviously)

    • @rocketman5167
      @rocketman5167 4 года назад +5

      We just denied a renewal of one of their products. We'll probably start specing out a replacement product. I work at NASA.

    • @ChuckChurch
      @ChuckChurch 4 года назад +2

      Just like they dump all the Microsoft apps when those are found vulnerable.

    • @LtShifty
      @LtShifty 4 года назад +9

      @@rocketman5167 I'm already worried about NASA security if people in their IT are advertising that they do on a public forum.

  • @innaroz2009
    @innaroz2009 4 года назад +2

    Symantec belongs to Norton Life Lock, correct?
    They use Chinese customer service that drops the call when you ask for American customer service

  • @sgros
    @sgros 4 года назад +5

    I think this incident also has implication on Huawei and 5G that was hot topic a year ago, or so. Just imagine what someone having control of 5G equipment might do...

    • @brookerichards9037
      @brookerichards9037 4 года назад

      Umm...trigger nano transmitters attached to the exoskeleton of a virus perhaps?
      Creating rapid replication & lethal cytokine storms ?
      Something like that?
      Professor Lieber. Harvard. Wuhan. Arrested.

  • @geroffmilan3328
    @geroffmilan3328 4 года назад +4

    Certificate has to be revoked, surely?
    Wash-up effort maybe, but the platform was pwnd, so "assume breach" means "assume attackers have a valid code-signing certificate".
    That same cert used with Evilgrade could be a viable vector against multiple software platforms - even if SVR choose to leak or share it rather than make direct use themselves.

  • @pmnordkvist
    @pmnordkvist 4 года назад

    Could one is the reasons for MS being blocked be that they want to fly under their radar and not be identified there? To give hackers a longer runway to execute in stealth mode?

  • @rampartfive7205
    @rampartfive7205 4 года назад +10

    FireEye breach hits the public airwaves. SolarWinds hack detected by FireEye relieving pressure from FireEye. Hmmmm.... such odd timing.

    • @ianvulm4542
      @ianvulm4542 4 года назад +1

      Roger that Captain... next up is Alpha Vector.

    • @kathleen1685
      @kathleen1685 4 года назад

      @@judaspreistvlct Apps, cellphones tvs...?

  • @sudhirverma7522
    @sudhirverma7522 4 года назад +6

    And some companies want me to buy those systems which allow me to lock and unlock my house doors through my cellphone 🤣. NEVER EVER.

  • @TonThonFraisdEau
    @TonThonFraisdEau 4 года назад

    Why was it found only by FireEye? Why other organizations didn't detect that attack ? In particular the US security agencies ?

    • @jenalatz3589
      @jenalatz3589 4 года назад

      I guess they have more intelligence than the CISA. We won't know the truth unless the hackers decide to tell us so. I wish they would leak what they know now. Firewalls give false security.

  • @bumpedhishead636
    @bumpedhishead636 4 года назад +2

    I'm thinking that they excluded the MSFT IP ranges because access to O365 & Azure customers was very, very valuable to them, and they wanted to maintain access to those systems as long as possible. They wanted MSFT to see their access as normal customer access, not a breach.

  • @Michael_Skinner
    @Michael_Skinner 4 года назад +1

    The 'actor' inserted code into GIT repository - became part of the build process?

  • @timstarks5418
    @timstarks5418 4 года назад

    Why wouldn't you put the nms device and all solarwinds tools into its own firewalled segment with granular controls

  • @TheRealoldcar
    @TheRealoldcar 4 года назад +15

    I would not rely on their finding that this is done by Russia.

  • @thaiolea5295
    @thaiolea5295 4 года назад +1

    Why isnt there a way for your connected devices to confirm the source of command? There should be a generated code required for each computer that changes each time the server attempts access/commands. Im fixing to sell all my shares of this company....just a lack of due diligence

  • @OrdenJust
    @OrdenJust 4 года назад +3

    OK, so you have a deployment test bed, your sandbox, and you see nothing happens, so you deploy it to production. After you deploy to production, don't dismantle the sandbox for re-use elsewhere. Keep the sandbox around FOREVER. Monitor the sandbox for beaconing forever. It should NEVER beacon! But if it does, it doesn't matter whether it lay dormant for fourteen days, a month, a hundred days or years. When it finally does beacon, that will suffice to set off alarm bells.

    • @antpoo
      @antpoo 4 года назад +1

      @@douganderson7002 ha ha

  • @brianstarr
    @brianstarr 4 года назад +6

    Thanks for being so transparent. Hopefully other software like WSUS or other 3rd party patching software wasn't/isn't also affected by different supply chain breaches.

  • @deangriffin8997
    @deangriffin8997 4 года назад +1

    One time some coyotes got inside the goat pen here in SE OK. Is this hacking something like that?

  • @knightwatchman
    @knightwatchman 4 года назад +1

    The common question in all these videos analyzing the breech and hack seems to be; "How was Solarwinds (itself) breeched?". To me the answer is obvious ... an employee or contracted developer. Who else would know where to "plant" the corrupted .dll in a upgrade/maintenance/fix package?

  • @eigerultra6478
    @eigerultra6478 4 года назад +6

    Is there a vaccine for this ?

  • @fulleralfred6855
    @fulleralfred6855 4 года назад +3

    Thanks Jake and SANS for this exquisite presentation. This was informative and straightforward

  • @johnwojcik2924
    @johnwojcik2924 4 года назад

    Who has configured a network device so that an NMS can make changes and resolve issues? Possible, but not likely.

  • @zeroone3467
    @zeroone3467 3 года назад

    Curious. First breach is indicated as occurring back in March 2020? When our first imposed quarantine began. Makes sense. That's when many, many, systems experienced breaches as a result of lacking continuity and response due to Coronavirus. Coronavirus made for the perfect playing field and distraction. While everyone was busy trying to get their stuff together and figure it out, attackers were finding ways to make bank.

  • @dkipu266
    @dkipu266 4 года назад

    For those that didn’t use solar winds to write configurations, (and I hope that was a lot of their clients) SW could have been easily setup and ACL’d to ping, read-only WMI, read-only SNMP, and receive inbound only Netflow packets. If you’re not limiting your monitoring reporting system behind a firewall in this way, I recommend it strongly regardless of the brand of NMS you use.

  • @1995mactavish
    @1995mactavish 4 года назад

    Can be attributed to Russian SVR but the information hasn’t been shared publicly? What makes one so certain? I would hope they would be more transparent on that aspect.

    • @jenalatz3589
      @jenalatz3589 4 года назад

      Manuals are in what language?

    • @jenalatz3589
      @jenalatz3589 4 года назад

      Not going to happen, spoon fed narrative

  • @royalistparty8380
    @royalistparty8380 4 года назад

    Security Advisory: (Updated 12/24/20) SolarWinds asks ALL ORION PLATFORM CUSTOMERS to update their Orion Platform software as soon as possible to help ensure the security of your environment. More information is available in our Security Advisory and FAQ pages.

  • @lesabooth5243
    @lesabooth5243 4 года назад +1

    Why are our leaders not speaking about this?

    • @jenalatz3589
      @jenalatz3589 4 года назад

      Some know about it, some may benefit

  • @gasaxe6056
    @gasaxe6056 4 года назад

    I heard the hacked the grid.
    Can they shut it down?

  • @kristigentry9481
    @kristigentry9481 4 года назад +7

    Thank you SANS and thank you FireEye!

  • @lyledavis7175
    @lyledavis7175 4 года назад

    If they are attributing this to an APT then check to see if they are hanging out in the Registry and/or using network management tools such as PowerShell to obfuscate themselves. May need to simply turn the power off as well to remove them from the registry.

  • @HeyMJ.
    @HeyMJ. 4 года назад

    @MalwareJake Thank you for an excellent presentation; distilling critsit content into easily digestible bytes. 👍🏼

  • @samjovii
    @samjovii 4 года назад +1

    So, what really happened to Google? Though they claimed it was an Authentication Server issue, the fact that Google itself chose brevity in its communication was very out of character.
    Was the Authentication server brought down to observe their break-glass procedure? Or was it brought down as part of a phase operation?

  • @markmakineste
    @markmakineste 4 года назад +5

    Best YT video I've seen since . . I don't know when.

  • @nylsafigueroa-noaaaffiliat536
    @nylsafigueroa-noaaaffiliat536 4 года назад +5

    Fantastic presentation, thank you!

  • @thetedsingh
    @thetedsingh 4 года назад

    @24:00 Yikes - since the attackers knew the build system well enough to piggyback beyond the basic source build process means that they were there quite a bit of time before the actual software upgrade (malware) was made available.

  • @ChrisCrosby24601
    @ChrisCrosby24601 4 года назад +12

    Just skip to 27:25

  • @tacticalgaryvrgamer8913
    @tacticalgaryvrgamer8913 4 года назад +8

    Stay tactical my friends. I recently interviewed a cyberwar expert on my channel....scary!

    • @ianvulm4542
      @ianvulm4542 4 года назад +2

      Thank you Gary I really needed this. Xi and the Democrats are up to something nafarious.

    • @MelandRandy
      @MelandRandy 3 года назад

      @@ianvulm4542 yes they are why did Kris Kreps take a position at solar winds when he was the one in charge of making sure shit like that didn’t happen.

  • @dribble3111
    @dribble3111 4 года назад +1

    Wonder if has anything to do with manipulations in social media

    • @johnhoffman8203
      @johnhoffman8203 4 года назад +1

      You mean like Dominion Voting Systems?

    • @jenalatz3589
      @jenalatz3589 4 года назад

      3 state governments involved one is Arizona.

  • @cryptosfool
    @cryptosfool 4 года назад

    excellent presentation.

  • @Chanssr
    @Chanssr 4 года назад +8

    Stop call it a supply chain attack. Unless the malware was uploaded into the Orion code from a supplier. Blame the use on password authentication of NMS . Blame the lack of integrity check.

  • @paulkearns667
    @paulkearns667 4 года назад +1

    Super thanks for this.

  • @strongangel
    @strongangel 4 года назад +1

    The supply chain is always attacked .... in fact the supply chain is always the first thing to attack in military any operation ....

  • @annepargiello6572
    @annepargiello6572 4 года назад +10

    Thank you Patriots!

  • @increbulous
    @increbulous 4 года назад +24

    About twice as many words spoken as necessary. Tends to bury the valuable stuff.

    • @MegaTriumph1
      @MegaTriumph1 4 года назад +1

      He would be not in the position he's in if he made a lot sense.

    • @digitalairaire
      @digitalairaire 4 года назад +5

      I have made this letter longer than usual, only because I have not had the time to make it shorter.
      ~Blaise Pascal

  • @jamesa4958
    @jamesa4958 2 года назад

    Thank you

  • @knightwatchman
    @knightwatchman 4 года назад

    From the Solarwinds website; "We’ve been advised that the nature of this attack indicates that it may have been conducted by an outside nation state, but SolarWinds has not verified the identity of the attacker."

    • @jenalatz3589
      @jenalatz3589 4 года назад

      With inside help

    • @knightwatchman
      @knightwatchman 4 года назад

      @@jenalatz3589 I believe (too) that this was an inside job within SolarWinds. How else would someone know which .dll module to replace?

  • @fitzpatrickwm
    @fitzpatrickwm 4 года назад

    Wouldn't it be quicker to limit the network to just the systems you need to monitor? ACL(s) for the Win....

  • @shawnwilkin1941
    @shawnwilkin1941 4 года назад +2

    Awesome webinar guys, well done!

  • @felicedt4912
    @felicedt4912 3 года назад +4

    Sans?

  • @scotteddy9960
    @scotteddy9960 4 года назад +1

    Thank God people like this stuff..I just fell asleep somewhere around 7:50.

  • @iisweet
    @iisweet 4 года назад

    Thank you. good job

  • @bobchemist
    @bobchemist 4 года назад

    As the former engineering manager for the SevOne NMS I know the risks for this type of software. I think you missed one key point here: The compromise of SolarWinds.Orion.Core.BusinessLayer.dll, or any component built by a software vendor for high-risk environments, is very sloppy. Standard practice is to always build from source in secure, or air-gapped, environment and have multiple people review every commit to the codebase. Signing code after the source / build is compromised has no value.

    • @jenalatz3589
      @jenalatz3589 4 года назад

      You don't put information you want kept secret on a computer

  • @someyounggamer
    @someyounggamer 4 года назад +4

    Nobody:
    Dark Army: Its time for Stage 3

    • @EARL1995LFC
      @EARL1995LFC 4 года назад +3

      Exactly my thinking hahah

  • @wegs1756
    @wegs1756 4 года назад +2

    im surprised how the comment isnt flooded with sans from undertale

  • @githendran7785
    @githendran7785 4 года назад +6

    Thanks for the Informative Session.

    • @deathmakesmoresense5354
      @deathmakesmoresense5354 4 года назад +1

      I am pretty sure didn't even understodo half of the things he said.

    • @jenalatz3589
      @jenalatz3589 4 года назад

      @@deathmakesmoresense5354 yes Bill Gates is a physician now and journalist are IT experts.

  • @Nostrildomus
    @Nostrildomus 4 года назад

    This is where it gets difficult . And NO none of this has anything to do with civil war . Pass The Word

  • @jimbob2810
    @jimbob2810 4 года назад +4

    Oooooh ... Russia! Russia! Russia! How many times can the national security state draw from that well?

  • @helloqasim
    @helloqasim 4 года назад

    Isn't automation the main hole here

  • @kratsynot9517
    @kratsynot9517 4 года назад +4

    Thanks MalwareJake

  • @kevinfeck6050
    @kevinfeck6050 4 года назад +11

    Speaker should stick to his strengths and steer clear of politics.

  • @MichaelGuy
    @MichaelGuy 4 года назад +2

    Russia???? Where is your proof and methodology to make ANY threat actor attribution? We would all love to hear (threat actor attribution=fraud) Now apt29? This is a joke. Right? It takes a village? WHAT?

  • @JeffSmith03
    @JeffSmith03 4 года назад

    I remember now where I heard of solarwinds, a hidden application was running on two of my business PC s. When I told professional IT company means a compromised machine, he told me no because if its just for monitoring things it's harmless. Even when I reminded him absolutely nobody here nor there is using any software from them. We use different MSP software. What an idiot he was, I removed it and fired them

  • @dribble3111
    @dribble3111 4 года назад

    The amounts payed for ransoms by public service providers in past 6 years has to be astronomical

  • @konkyolife
    @konkyolife 4 года назад +10

    And WHY NOT CHINA?????

    • @ianvulm4542
      @ianvulm4542 4 года назад

      China is a person of color. Unless you want to be a racist, fine go ahead.

    • @konkyolife
      @konkyolife 4 года назад

      @@ianvulm4542 China is a CIVILIZATION.

    • @jenalatz3589
      @jenalatz3589 4 года назад

      @@ianvulm4542 everyone knows what they are talking about, language police

    • @jenalatz3589
      @jenalatz3589 4 года назад

      @@ianvulm4542 you didn't answer the question but went straight to identify politics, very telling

  • @tiger234z
    @tiger234z 4 года назад

    ty for the important info !!!!!!

  • @cybertalkswithali
    @cybertalkswithali 4 года назад

    Hello Sans,
    I really want to know how they actually injected malicious code in the software. Basically how they came inside solarwinds.

    • @infowazz
      @infowazz 4 года назад +1

      it was more simple than complex. it involved MS Dos and Cobel as well as the coronal index. Once you latch onto the index its just a matter of injecting malware as long as its binary in nature. hope that helps.

  • @lovebaja
    @lovebaja 4 года назад +4

    He is driving me NUTS with ending so many statements with the superfluous "right?" Stop saying that!!! grrrrrr...

  • @cameronempey8350
    @cameronempey8350 4 года назад +1

    Why am I just learning about this? On 12-15

    • @ultralaggerREV1
      @ultralaggerREV1 4 года назад

      It’s an emergency massive cyber attack, all of the many services we use on a daily basis (user accounts, bank accounts, passwords, etc) MIGHT be in greater risk because whoever launched Sunburst and all other viruses into Solarwinds can cause the hackers to steal sensitive government information AND our own information like emails, passwords, and many

    • @ultralaggerREV1
      @ultralaggerREV1 4 года назад +1

      Like we don’t know if our youtube accounts are in danger

    • @jenalatz3589
      @jenalatz3589 4 года назад +1

      Because MSM and big tech decide what is heard. Those that control the narrative have the power.

  • @TomokoAbe_
    @TomokoAbe_ 4 года назад

    I bet bitcoin was hacked and the value artificially elevated. Noticed bitcoin's value skyrocketed after this major hack.

  • @infowazz
    @infowazz 4 года назад

    This is amazing intel. Very sobering and professional.

  • @judotommy4774
    @judotommy4774 4 года назад

    I would have to disagree that supply chain attacks are not common, as stated at the 3:00 mark...according to Symantec, supply chain attacks almost doubled between 2018 and 2019, increasing by 78%...2018 Ponemon Institute study found that 56% of organizations suffered a breach caused by one of their vendors...having a hard time reconciling those numbers with the comment that supply chain attacks are "not common".

    • @gwebocelestron9194
      @gwebocelestron9194 4 года назад

      Yep. I can vouch for that. My company had a breach by Tableau not too long ago. Compromised credentials that gave the attacker access to our data. Didn't hear that in the news, right? A lot of things do not get publicized.

  • @lesabooth5243
    @lesabooth5243 4 года назад +1

    It makes sense that russia and china are attributed.

  • @alicecoppers8980
    @alicecoppers8980 4 года назад

    However if there’s a CME there will be no broadcasting over the Internet

  • @jacovawernett3077
    @jacovawernett3077 4 года назад +2

    Whelp, my son's middle name is Orion. It feels personal.

  • @Peace2all4vr
    @Peace2all4vr 4 года назад +17

    THE RUSSIANS AGAIN!!!! This is getting old. I'm sick of this globalists' game.

  • @residentgrey
    @residentgrey 4 года назад +3

    It would help to think of corporations as the same as the nation-states here. They hire their own goons with their own loyalties.

  • @worldeconomicforumbarbie9323
    @worldeconomicforumbarbie9323 3 года назад

    Omg. You actually used the Texas FBI.

  • @BBnSam1215
    @BBnSam1215 4 года назад +16

    Oh Russia, eh? Suuuuuure. 🙄

  • @robertandrewww
    @robertandrewww 4 года назад +2

    These comments sus af, THANKS JAKE AND SANS like naw, botments exist for a reason

    • @ianvulm4542
      @ianvulm4542 4 года назад

      Thank you Robert for your comment. I highly recommend a monthly subscription to the Washington Post. Your friend always.

  • @StoodersFam
    @StoodersFam 4 года назад +1

    Patch to HF2 - saved you an hour, which you're going to need as the SW upgrade tool is a pile of poop

  • @davenone8516
    @davenone8516 3 года назад

    I think your assessment of friendliness of one administration to another may need a little work.

  • @makedredd299
    @makedredd299 4 года назад +2

    51:57 Get your magical Pokémon SaaS immunity card. 🐤⚡️

  • @lesabooth5243
    @lesabooth5243 4 года назад +1

    Talk about backdoors

  • @aaotcis
    @aaotcis 4 года назад +18

    Spinning??? Russia??? Nice try. SMH

  • @elainemccarty1195
    @elainemccarty1195 4 года назад

    Let’s not be silly. A hacker like this would either be a group of motivated people or it would just be them, proving to each other and us that we need to upgrade. Hopefully they will make everyone, including the devilish people who have been running this country show their identification before logging back in to whatever bullshit content they hold on those servers.

  • @321Mohan
    @321Mohan 4 года назад

    Thanks ...

  • @randaldavis8976
    @randaldavis8976 4 года назад +3

    our security folks were useless at actual computer security. too political influenced by mahogany row.

  • @lesabooth5243
    @lesabooth5243 4 года назад

    DHS should be extinguished.

  • @sammen89
    @sammen89 4 года назад +1

    Clutch, thanks SANS!

  • @richardrodriguez1742
    @richardrodriguez1742 4 года назад +15

    Solar winds is connected to Amazon, looks like Jeff might go to gitmo

    • @templemanning6180
      @templemanning6180 4 года назад +8

      Probably not. He's offered up the sacrificial lamb that starts the currency reset. Its all part of the plan.

  • @Bloodsaber64
    @Bloodsaber64 4 года назад

    Can anyone give me a TLDR?

    • @kellyfj
      @kellyfj 4 года назад

      Russian Hackers :-\

    • @thomasstambaugh5181
      @thomasstambaugh5181 4 года назад +1

      Don't put sensitive data on any Microsoft product.

    • @ianvulm4542
      @ianvulm4542 4 года назад

      Irish Catholics love Commie China. Many such cases.

  • @vinsont
    @vinsont 4 года назад

    Orlando Bravo put it there obviously. Duh!

  • @knt3122
    @knt3122 4 года назад +2

    Not once did this guy mention Israel ......why?

    • @knt3122
      @knt3122 4 года назад

      I stopped watching at 40:00 I'm pretty sure I don't need to watch anymore

  • @charlesbeaudry3263
    @charlesbeaudry3263 4 года назад +1

    Attribution to Russia is dependent on how much we trust Fireye. Do you? I don't! As far as I am concerned Fireye could be NSA. Please provide evidence.