Return to the list of client alerts
Just in case you thought that everyone was asleep at the wheel when the Russians hacked SolarWinds, Microsoft is shedding some interesting light on the subject.
This comes from the Microsoft Defender Research Team, Microsoft Threat Intelligence Center and Microsoft Cyber Defense Operations Center.
The SolarWinds attack is a multi-stage attack. The second stage, called Solorigate, deploys the custom Cobalt Strike loaders (Teardrop, Raindrop and others) after dropping the Solorigate (AKA Sunburst) DLL backdoor.
Microsoft says that the hackers who orchestrated the SolarWinds attack used a range of tactics, operational security and anti-forensic behavior that drastically decreased the breached organizations’ ability to detect their malicious actions.
They used best practices to minimize traces and avoid detection.
Some of the techniques used include:
Some examples of SolarWinds hackers’ evasion tactics as discovered and highlighted by Microsoft:
It is amazing that they were able to do some of these things; it is indicative of the level of permission that they had inside the target environments.
For more information see this Bleeping Computer summary and Microsoft Blog post.