{"id":17904,"date":"2020-12-22T00:10:00","date_gmt":"2020-12-21T23:10:00","guid":{"rendered":"http:\/\/159.69.82.204\/win\/?p=17904"},"modified":"2021-05-06T22:57:13","modified_gmt":"2021-05-06T20:57:13","slug":"solarwinds-systeme-mit-2-backdoor-gefunden","status":"publish","type":"post","link":"https:\/\/borncity.com\/win\/2020\/12\/22\/solarwinds-systeme-mit-2-backdoor-gefunden\/","title":{"rendered":"2nd backdoor found on infected SolarWinds systems"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline\" src=\"https:\/\/www.borncity.com\/blog\/wp-content\/uploads\/2015\/01\/Schutz.jpg\" width=\"40\" height=\"47\">[<a href=\"https:\/\/www.borncity.com\/blog\/2020\/12\/21\/solarwinds-systeme-mit-2-backdoor-gefunden\/\" target=\"_blank\" rel=\"noopener\">German<\/a>]Security researchers and forensic experts have found two other malware variants, Supernova and CosmicGale, in systems infected with the SunBurst Trojan via SolarWinds Orion software. Security researchers suspect that there is a second hacking group at work. <\/p>\n<p><!--more--><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" alt=\"\" src=\"https:\/\/vg06.met.vgwort.de\/na\/f87f4be72f484dc4a504ff936eb4ba8e\" width=\"1\" height=\"1\">It's the joke of 2020: SolarWinds Orion software is widely used to monitor IT infrastructures. And now systems on which this product has been installed are proving to be as full of holes as Swiss cheese from a security point of view. After the Sunburst backdoor was discovered more or less by accident (see <a href=\"https:\/\/borncity.com\/win\/2020\/12\/21\/sunburst-hack-microsofts-analysen-und-neues\/\">SUNBURST hack: Microsoft's analysis and news<\/a>), the iceberg is lifting and it is slowly becoming more and more visible. VMware now also had to <a href=\"https:\/\/web.archive.org\/web\/20201222095253\/https:\/\/www.vmware.com\/company\/news\/updates\/2020\/vmware-statement-solarwinds-supply-chain-compromise.html\" target=\"_blank\" rel=\"noopener\">announce<\/a> to have been compromised by the SolarWinds story (see <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/vmware-latest-to-confirm-breach-in-solarwinds-hacking-campaign\/\" target=\"_blank\" rel=\"noopener\">this article<\/a>). <\/p>\n<h2>Supernova and CosmicGale<\/h2>\n<p>Computer forensic experts are now taking a closer look at systems with SolarWinds Orion software installed. In the meantime, it has become known that further malware was found on some of the systems infected with SunBurst.<\/p>\n<p><a href=\"https:\/\/twitter.com\/campuscodi\/status\/1341020735079387138\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" title=\"SolarWinds with Supernova und CosmicGale malware\" alt=\"SolarWinds with Supernova und CosmicGale malware\" src=\"https:\/\/i.imgur.com\/O3US31w.png\"><\/a><\/p>\n<p><p>Catalin Cimpanu points out this new finding in the above tweet and has published <a href=\"https:\/\/www.zdnet.com\/article\/a-second-hacking-group-has-targeted-solarwinds-systems\/\" target=\"_blank\" rel=\"noopener\">this article<\/a> on the topic on ZDNet. Bleeping Computer also has this post about it. There are analyses from security firms <a href=\"https:\/\/www.guidepointsecurity.com\/supernova-solarwinds-net-webshell-analysis\/\" target=\"_blank\" rel=\"noopener\">Guidepoint<\/a>, <a href=\"https:\/\/symantec-enterprise-blogs.security.com\/blogs\/threat-intelligence\/sunburst-supply-chain-attack-solarwinds\" target=\"_blank\" rel=\"noopener\">Symantec<\/a>, and <a href=\"https:\/\/unit42.paloaltonetworks.com\/solarstorm-supernova\/\" target=\"_blank\" rel=\"noopener\">Palo Alto Network<\/a>that indicate more malware was found on the infected systems. The reports describe attackers also injected a .NET web shell called Supernova. Security researchers therefore assumed the attackers used the Supernova Web shell to download, compile and execute a malicious Powershell script (which some have dubbed CosmicGale). <\/p>\n<p>However, ZDNet's article points to an analysis by Microsoft's security teams that shows the SuperNove web shell is not part of the actual SunBurst attack. Companies that find SuperNova on their systems must assume a separate attack on their IT. <a href=\"https:\/\/twitter.com\/ItsReallyNick\/status\/1339530685548290051\" target=\"_blank\" rel=\"noopener\">A post by Microsoft<\/a> security analyst Nick Carr notes that the Supernova web shell appears to have been placed on SolarWinds Orion installations that were unprotected against the <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2019-8917\" target=\"_blank\" rel=\"noopener\">CVE-2019-8917<\/a> vulnerability and accessible online. The vulnerability in SolarWinds Orion products, which has been known since 2019, is described as follows: <\/p>\n<blockquote>\n<p>SolarWinds Orion NPM before 12.4 suffers from a SYSTEM remote code execution vulnerability in the OrionModuleEngine service. This service establishes a NetTcpBinding endpoint that allows remote, unauthenticated clients to connect and call publicly exposed methods. The InvokeActionMethod method may be abused by an attacker to execute commands as the SYSTEM user.<\/p>\n<\/blockquote>\n<p>The vulnerability thus allowed remote code execution (RCE) on target systems running Orion software. In an analysis, Microsoft found that the Supernova DLL, unlike the Sunburst DLL, was not signed with a legitimate digital certificate from SolarWinds. This deviates from the sophisticated approach of the SunBurst attackers so seriously that one should assume other authors. <\/p>\n<p><strong>Similar articles:<\/strong><br \/><a href=\"https:\/\/www.borncity.com\/blog\/2020\/12\/09\/fireeye-wenn-hacker-eine-sicherheitsfirma-plndern\/\">FireEye hacked, Red Team tools stolen<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2020\/12\/14\/us-finanzministerium-und-weitere-us-behrde-gehackt\/\">US Treasury and US NTIA hacked<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2020\/12\/14\/solarwinds-produkte-mit-sunburst-backdoor-ursache-fr-fireeye-und-us-behrden-hacks\/\">SolarWinds products with SunBurst backdoor, cause of FireEye and US government hacks?<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2020\/12\/15\/sloppiness-at-solarwinds-responsible-for-compromised-software\/\">Sloppiness at SolarWinds responsible for compromised software?<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2020\/12\/16\/neues-im-kampf-gegen-die-sunburst-infektion-domain-beschlagnahmt\/\">News in the fight against SUNBURST infection, domain seized<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2020\/12\/17\/sunburst-malware-analytic-tool-solarflare-a-kill-switch-and-einsteins-fail\/\">SUNBURST malware: Analytic Tool SolarFlare, a 'Kill Switch' and EINSTEIN's fail<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2020\/12\/17\/sunburst-malware-was-injected-into-solarwinds-source-code-base\/\">SUNBURST malware was injected into SolarWind's source code base<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2020\/12\/18\/sunburst-hack-auch-us-atomwaffenbehrde-gehackt-neue-erkenntnisse\/\">SUNBURST: US nuclear weapons agency also hacked, new findings<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2020\/12\/18\/solarwinds-hack-auch-microsoft-co-betroffen\/\">SolarWinds hack: Microsoft and others also affected?<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2020\/12\/21\/sunburst-hack-microsofts-analysen-und-neues\/\">SUNBURST hack: Microsoft's analysis and news<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>[German]Security researchers and forensic experts have found two other malware variants, Supernova and CosmicGale, in systems infected with the SunBurst Trojan via SolarWinds Orion software. Security researchers suspect that there is a second hacking group at work.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[580],"tags":[69],"class_list":["post-17904","post","type-post","status-publish","format-standard","hentry","category-security","tag-security"],"_links":{"self":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/17904","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/comments?post=17904"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/17904\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/media?parent=17904"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/categories?post=17904"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/tags?post=17904"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}