{"id":17902,"date":"2020-12-21T19:45:25","date_gmt":"2020-12-21T18:45:25","guid":{"rendered":"http:\/\/159.69.82.204\/win\/?p=17902"},"modified":"2022-09-04T22:12:15","modified_gmt":"2022-09-04T20:12:15","slug":"sunburst-hack-microsofts-analysen-und-neues","status":"publish","type":"post","link":"https:\/\/borncity.com\/win\/2020\/12\/21\/sunburst-hack-microsofts-analysen-und-neues\/","title":{"rendered":"SUNBURST hack: Microsoft's analysis and news"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline\" src=\"https:\/\/www.borncity.com\/blog\/wp-content\/uploads\/2015\/01\/Schutz.jpg\" width=\"40\" align=\"left\" height=\"47\">[<a href=\"https:\/\/www.borncity.com\/blog\/2020\/12\/20\/sunburst-hack-microsofts-analysen-und-neues\/\" target=\"_blank\" rel=\"noopener\">German<\/a>]The hack of many US agencies and companies via the SUNBURST backdoor, executed by hackers suspected to be close to the state, is drawing wider circles. It was probably uncovered by accident, US President Trump is pointing the finger at the Chinese, and Microsoft is providing more detailed analysis. Here is a brief overview.<\/p>\n<p><!--more--><\/p>\n<h2>To the facts<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" alt=\"\" src=\"https:\/\/vg05.met.vgwort.de\/na\/0eedeb236bd844c1a3b6472fd8c3af59\" width=\"1\" height=\"1\">For months, numerous U.S. agencies and ministries, as well as companies around the world, have been hacked through a backdoor, and attackers have managed to pull numerous documents. I first reported on these hacks in the articles <a href=\"https:\/\/www.borncity.com\/blog\/2020\/12\/09\/fireeye-wenn-hacker-eine-sicherheitsfirma-plndern\/\">FireEye hacked, Red Team tools stolen<\/a> and <a href=\"https:\/\/borncity.com\/win\/2020\/12\/14\/us-finanzministerium-und-weitere-us-behrde-gehackt\/\">US Treasury and US NTIA hacked<\/a>. Hackers have been able to look around their IT systems for months, reading mails and pulling documents.<\/p>\n<p>It is a huge espionage operation that, because of its sophistication and effort, is attributed to state-related hackers. This is because the attackers managed to contaminate updates for a widely used network monitoring software (SolarWinds Orion) with a Trojan called SUNBURST. I had reported in detail in the posts linked at the end of the article. <\/p>\n<p>In my perception, the case has taken on a new dimension and is likely to shake the US IT landscape in the marketplace. Certainties of the kind 'we are the best, we are safe, nobody can do anything to us' have just gone down the drain. Wired <a href=\"https:\/\/www.wired.com\/story\/russia-hack-supply-chain-reckoning\/\" target=\"_blank\" rel=\"noopener\">writes here<\/a> that experts believe the U.S. is poorly positioned to defend against supply chain attacks, as was the case here.&nbsp; <\/p>\n<h2>Trump downplays the case<\/h2>\n<p>The media and authorities have been pointing to Russia as the beneficiary of the spying action since it came to light. <a href=\"https:\/\/apnews.com\/article\/donald-trump-politics-mark-levin-coronavirus-pandemic-hacking-6080f156125a4a46edef2a6dcf826611\" target=\"_blank\" rel=\"noopener\">This article says<\/a> that they already had an official statement prepared for last Friday, naming Russia as the originator. But there was a publication stop.&nbsp; <\/p>\n<p><a href=\"https:\/\/twitter.com\/realdonaldtrump\/status\/1340333619299147781\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" title=\"Trump-Tweets zum Super-Hack\" alt=\"Trump-Tweets zum Super-Hack\" src=\"https:\/\/i.imgur.com\/9nQS3ev.png\"><\/a><\/p>\n<p>Donald Trump has his own view of things (see also <a href=\"https:\/\/web.archive.org\/web\/20210725081627\/https:\/\/www.axios.com\/trump-russian-cyberattack-f95835d0-1aa7-4a52-9b49-ea3c34d7952a.html\" target=\"_blank\" rel=\"noopener\">here<\/a>). In above <a href=\"https:\/\/twitter.com\/realdonaldtrump\/status\/1340333619299147781\" target=\"_blank\" rel=\"noopener\">tweets<\/a> he downplays the hack and writes that it could have been China (wouldn't be impossible). But the funny thing is that he immediately links it to mini-tampering with the voting machines and claims that the election was stolen. Twitter has added a warning to this tweet that Joe Biden is the winner of the US election. <\/p>\n<h2>Hack came to light by accident<\/h2>\n<p>I had hinted at it in my posts before: the mistake the state hackers made was probably not being able to resist infiltrating security vendor FireEye and stealing their Red Team tools. That's because the billion-dollar EINSTEIN program, which is supposed to protect U.S. government IT from such attacks, failed and didn't notice. The Washington Post <a href=\"https:\/\/www.wsj.com\/articles\/hack-suggests-new-scope-sophistication-for-cyberattacks-11608251360?mod=djemalertNEWS\" target=\"_blank\" rel=\"noopener\">writes here<\/a> that the whole operation was uncovered by a fluke. <\/p>\n<blockquote>\n<p>The SolarWinds attack escaped U.S. security measures so much that it was discovered not by intelligence officials, but almost by accident thanks to an automated security alert sent in recent weeks to a FireEye employee who had himself been quietly compromised.<\/p>\n<p>The alert, which was also sent to the company's security team, told the FireEye employee that someone had used the employee's credentials to log into the company's virtual private network from an unrecognized device &#8211; the kind of security message that company employees routinely delete. <\/p>\n<\/p>\n<\/blockquote>\n<p>Had this not caught the attention of FireEye executives, the attack likely still would not have been detected. The devil is a squirrel, and from that moment on, things started rolling. <\/p>\n<h2>Microsoft presents two analyses<\/h2>\n<p>For people who are in enterprise network administration, I'd like to point out two more analyses from Microsoft that go a little deeper into the story. There's a nice analysis from the Microsoft 365 Defender Research Team: <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2020\/12\/18\/analyzing-solorigate-the-compromised-dll-file-that-started-a-sophisticated-cyberattack-and-how-microsoft-defender-helps-protect\/\" target=\"_blank\" rel=\"noopener\">Analyzing Solorigate, the compromised DLL file that started a sophisticated cyberattack, and how Microsoft Defender helps protect customers<\/a>. Microsoft's Defender detects the Trojan (see also <a href=\"https:\/\/docs.microsoft.com\/en-us\/answers\/questions\/199280\/solarwinds-vulnerability-scep-2012-protection-beha.html\" target=\"_blank\" rel=\"noopener\">here<\/a>).<\/p>\n<p>And there is another document from the Microsoft 365 Defender Threat Intelligence Team <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2020\/12\/15\/ensuring-customers-are-protected-from-solorigate\/\" target=\"_blank\" rel=\"noopener\">Ensuring customers are protected from Solorigate<\/a> which deals with defensive measures. Microsoft also provides the document<a href=\"https:\/\/msrc-blog.microsoft.com\/2020\/12\/13\/customer-guidance-on-recent-nation-state-cyber-attacks\/\" target=\"_blank\" rel=\"noopener\">Customer Guidance on Recent Nation-State Cyber Attacks<\/a> with further details.<\/p>\n<p><strong>Similar articles:<\/strong><br \/><a href=\"https:\/\/www.borncity.com\/blog\/2020\/12\/09\/fireeye-wenn-hacker-eine-sicherheitsfirma-plndern\/\">FireEye hacked, Red Team tools stolen<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2020\/12\/14\/us-finanzministerium-und-weitere-us-behrde-gehackt\/\">US Treasury and US NTIA hacked<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2020\/12\/14\/solarwinds-produkte-mit-sunburst-backdoor-ursache-fr-fireeye-und-us-behrden-hacks\/\">SolarWinds products with SunBurst backdoor, cause of FireEye and US government hacks?<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2020\/12\/15\/sloppiness-at-solarwinds-responsible-for-compromised-software\/\">Sloppiness at SolarWinds responsible for compromised software?<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2020\/12\/16\/neues-im-kampf-gegen-die-sunburst-infektion-domain-beschlagnahmt\/\">News in the fight against SUNBURST infection, domain seized<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2020\/12\/17\/sunburst-malware-analytic-tool-solarflare-a-kill-switch-and-einsteins-fail\/\">SUNBURST malware: Analytic Tool SolarFlare, a 'Kill Switch' and EINSTEIN's fail<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2020\/12\/17\/sunburst-malware-was-injected-into-solarwinds-source-code-base\/\">SUNBURST malware was injected into SolarWind's source code base<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2020\/12\/18\/sunburst-hack-auch-us-atomwaffenbehrde-gehackt-neue-erkenntnisse\/\">SUNBURST: US nuclear weapons agency also hacked, new findings<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2020\/12\/18\/solarwinds-hack-auch-microsoft-co-betroffen\/\">SolarWinds hack: Microsoft and others also affected?<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>[German]The hack of many US agencies and companies via the SUNBURST backdoor, executed by hackers suspected to be close to the state, is drawing wider circles. It was probably uncovered by accident, US President Trump is pointing the finger at &hellip; <a href=\"https:\/\/borncity.com\/win\/2020\/12\/21\/sunburst-hack-microsofts-analysen-und-neues\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[580],"tags":[69],"class_list":["post-17902","post","type-post","status-publish","format-standard","hentry","category-security","tag-security"],"_links":{"self":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/17902","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/comments?post=17902"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/17902\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/media?parent=17902"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/categories?post=17902"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/tags?post=17902"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}