{"id":33423,"date":"2024-03-04T07:37:09","date_gmt":"2024-03-04T06:37:09","guid":{"rendered":"http:\/\/159.69.82.204\/win\/?p=33423"},"modified":"2024-03-04T07:38:32","modified_gmt":"2024-03-04T06:38:32","slug":"new-variant-of-the-solarwinds-attack-technique-discovered-in-2020","status":"publish","type":"post","link":"https:\/\/borncity.com\/win\/2024\/03\/04\/new-variant-of-the-solarwinds-attack-technique-discovered-in-2020\/","title":{"rendered":"New variant of the Solarwinds attack technique discovered in 2020"},"content":{"rendered":"<p><img decoding=\"async\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline;\" title=\"Sicherheit (Pexels, allgemeine Nutzung)\" src=\"https:\/\/www.borncity.com\/blog\/wp-content\/uploads\/2021\/04\/Sicherheit_klein.jpg\" alt=\"Sicherheit (Pexels, allgemeine Nutzung)\" width=\"200\" \/>[<a href=\"https:\/\/www.borncity.com\/blog\/2024\/03\/04\/neue-variante-der-solarwinds-angriffstechnik-von-2020-entdeckt\/\" target=\"_blank\" rel=\"noopener\">German<\/a>]The hack of numerous (US) authorities and companies via Solarwinds software in 2020 is probably still fresh in the minds of many readers. Now the Semperis security research team has discovered a new variant of \"golden SAML\", an attack technique that exploits the SAML authentication protocol and was used against Solarwinds by the hacker group Nobelium in 2020. The attack technique is known as \"Silver SAML\".<\/p>\n<p><!--more--><\/p>\n<p>In 2020, a hack of numerous (US) authorities and companies via Solarwinds software caused quite a stir (see <a href=\"https:\/\/borncity.com\/win\/2020\/12\/14\/us-finanzministerium-und-weitere-us-behrde-gehackt\/\">US Treasury and US NTIA hacked<\/a>). Security researchers first publicly described the attack vector known as \"golden SAML\" back in 2017 (see<a href=\"https:\/\/borncity.com\/win\/2021\/02\/27\/vorwurf-microsoft-hat-beim-solarwinds-hack-bei-der-sicherheit-gepatzt\/\"> Accusation: Microsoft failed with security in the SolarWinds hack<\/a>).<\/p>\n<p>Now the Semperis security research team has discovered a new variant of \"golden SAML\", an attack technique that exploits the SAML authentication protocol and was used against Solarwinds by the hacker group Nobelium in 2020.<\/p>\n<h2>Golden SAML<\/h2>\n<p>Golden SAML was used in the 2020 cyberattack on Solarwinds, the most sophisticated nation-state hack in history to date. The hacking group Nobelium, also known as Midnight Blizzard or Cozy Bear, injected malicious code into Solarwinds' Orion IT management software, infecting thousands of organizations, including the U.S. government. Following this attack, the Cybersecurity Infrastructure Security Agency (CISA) recommended that organizations with hybrid identity environments switch SAML authentication to a cloud identity system such as Entra ID.<\/p>\n<h2>Silver SAML<\/h2>\n<p>The newly discovered Silver SAML vulnerability can be exploited even if organizations have followed the security recommendations to protect against Golden SAML. Silver SAML allows threat actors to abuse the authentication protocol SAML (Security Assertion Markup Language) to launch attacks from an identity provider such as Entra ID against applications that use SAML for authentication, such as Salesforce.<\/p>\n<h2>Protection against Silver SAML attacks<\/h2>\n<p>To effectively protect against Silver SAML attacks in Entra ID, organizations should only use self-signed Entra ID certificates for SAML signing. Organizations should also restrict ownership of applications in Entra ID. They should also watch for changes to SAML signing keys, especially if the key is not about to expire.<\/p>\n<p>\"After the Solarwinds cyberattack, Microsoft and others, including CISA, stated that moving to Entra ID (then Azure AD) would protect against SAML response forgery, also known as Golden SAML. Unfortunately, full protection from this type of attack is more nuanced &#8211; when organizations move certain certificate management practices from Active Directory Federation Services to Entra ID, the applications in their inventory are still vulnerable to SAML response forgery, which we refer to as Silver SAML,\" said Eric Woodruff, researcher at Semperis.<\/p>\n<p>Semperis researchers classify the Silver SAML vulnerability as a moderate risk for organizations. However, should Silver SAML be used to gain unauthorized access to business-critical applications and systems, the risk could increase to a severe level depending on the system under attack. Semperis provides more information on the Silver SAML vulnerability in <a href=\"https:\/\/www.semperis.com\/blog\/meet-silver-saml\/\" target=\"_blank\" rel=\"noopener\">this blog post<\/a>.<\/p>\n<p><strong>Similar articles:<br \/>\n<\/strong><a href=\"https:\/\/borncity.com\/win\/2020\/12\/09\/fireeye-wenn-hacker-eine-sicherheitsfirma-plndern\/\">FireEye hacked, Red Team tools stolen<\/a><a href=\"https:\/\/www.borncity.com\/blog\/2021\/01\/02\/solarwinds-hacker-hatten-zugriff-auf-microsoft-quellcode\/\"><br \/>\n<\/a><a href=\"https:\/\/borncity.com\/win\/2020\/12\/14\/us-finanzministerium-und-weitere-us-behrde-gehackt\/\">US Treasury and US NTIA hacked<\/a><a href=\"https:\/\/www.borncity.com\/blog\/2021\/01\/02\/solarwinds-hacker-hatten-zugriff-auf-microsoft-quellcode\/\"><br \/>\n<\/a><a href=\"https:\/\/borncity.com\/win\/2020\/12\/14\/solarwinds-produkte-mit-sunburst-backdoor-ursache-fr-fireeye-und-us-behrden-hacks\/\">SolarWinds products with SunBurst backdoor, cause of FireEye and US government hacks?<\/a><a href=\"https:\/\/www.borncity.com\/blog\/2021\/01\/02\/solarwinds-hacker-hatten-zugriff-auf-microsoft-quellcode\/\"><br \/>\n<\/a><a href=\"https:\/\/borncity.com\/win\/2020\/12\/15\/sloppiness-at-solarwinds-responsible-for-compromised-software\/\">Sloppiness at SolarWinds responsible for compromised software?<\/a><a href=\"https:\/\/www.borncity.com\/blog\/2021\/01\/02\/solarwinds-hacker-hatten-zugriff-auf-microsoft-quellcode\/\"><br \/>\n<\/a><a href=\"https:\/\/borncity.com\/win\/2020\/12\/16\/neues-im-kampf-gegen-die-sunburst-infektion-domain-beschlagnahmt\/\">News in the fight against SUNBURST infection, domain seized<\/a><a href=\"https:\/\/www.borncity.com\/blog\/2021\/01\/02\/solarwinds-hacker-hatten-zugriff-auf-microsoft-quellcode\/\"><br \/>\n<\/a><a href=\"https:\/\/borncity.com\/win\/2020\/12\/17\/sunburst-malware-analytic-tool-solarflare-a-kill-switch-and-einsteins-fail\/\">SUNBURST malware: Analytic Tool SolarFlare, a 'Kill Switch' and EINSTEIN's fail<\/a><a href=\"https:\/\/www.borncity.com\/blog\/2021\/01\/02\/solarwinds-hacker-hatten-zugriff-auf-microsoft-quellcode\/\"><br \/>\n<\/a><a href=\"https:\/\/borncity.com\/win\/2020\/12\/17\/sunburst-malware-was-injected-into-solarwinds-source-code-base\/\">SUNBURST malware was injected into SolarWind's source code base<\/a><a href=\"https:\/\/www.borncity.com\/blog\/2021\/01\/02\/solarwinds-hacker-hatten-zugriff-auf-microsoft-quellcode\/\"><br \/>\n<\/a><a href=\"https:\/\/borncity.com\/win\/2020\/12\/18\/sunburst-hack-auch-us-atomwaffenbehrde-gehackt-neue-erkenntnisse\/\">SUNBURST: US nuclear weapons agency also hacked, new findings<\/a><a href=\"https:\/\/www.borncity.com\/blog\/2021\/01\/02\/solarwinds-hacker-hatten-zugriff-auf-microsoft-quellcode\/\"><br \/>\n<\/a><a href=\"https:\/\/borncity.com\/win\/2020\/12\/18\/solarwinds-hack-auch-microsoft-co-betroffen\/\">SolarWinds hack: Microsoft and others also affected?<\/a><a href=\"https:\/\/www.borncity.com\/blog\/2021\/01\/02\/solarwinds-hacker-hatten-zugriff-auf-microsoft-quellcode\/\"><br \/>\n<\/a><a href=\"https:\/\/borncity.com\/win\/2020\/12\/21\/sunburst-hack-microsofts-analysen-und-neues\/\">SUNBURST hack: Microsoft's analysis and news<\/a><a href=\"https:\/\/www.borncity.com\/blog\/2021\/01\/02\/solarwinds-hacker-hatten-zugriff-auf-microsoft-quellcode\/\"><br \/>\n<\/a><a href=\"https:\/\/borncity.com\/win\/2020\/12\/22\/solarwinds-systeme-mit-2-backdoor-gefunden\/\">2nd backdoor found on infected SolarWinds systems<\/a><a href=\"https:\/\/www.borncity.com\/blog\/2021\/01\/02\/solarwinds-hacker-hatten-zugriff-auf-microsoft-quellcode\/\"><br \/>\n<\/a><a href=\"https:\/\/borncity.com\/win\/2021\/01\/02\/solarwinds-hacker-hatten-zugriff-auf-microsoft-quellcode\/\">SolarWinds hackers had access to Microsoft source code<\/a><a href=\"https:\/\/www.borncity.com\/blog\/2021\/01\/02\/solarwinds-hacker-hatten-zugriff-auf-microsoft-quellcode\/\"><br \/>\n<\/a><a href=\"https:\/\/borncity.com\/win\/2021\/01\/05\/solarwinds-hack-motive-der-angreifer-outsourcing-als-schwachstelle\/\">SolarWinds hack: Hacker goals; outsourcing are under investigation?<\/a><a href=\"https:\/\/www.borncity.com\/blog\/2021\/01\/02\/solarwinds-hacker-hatten-zugriff-auf-microsoft-quellcode\/\"><br \/>\n<\/a><a href=\"https:\/\/borncity.com\/win\/2021\/01\/08\/neues-vom-solarwinds-hack-jetbrains-software-als-einfallstor\/\">News from the SolarWinds hack; JetBrains software as a gateway?<\/a><a href=\"https:\/\/www.borncity.com\/blog\/2021\/01\/02\/solarwinds-hacker-hatten-zugriff-auf-microsoft-quellcode\/\"><br \/>\n<\/a><a href=\"https:\/\/borncity.com\/win\/2021\/01\/12\/kaspersky-solarwinds-sunburst-backdoor-gleicht-russischer-atp-malware\/\">Kaspersky: SolarWinds Sunburst backdoor resembles Russian ATP malware<\/a><a href=\"https:\/\/www.borncity.com\/blog\/2021\/01\/02\/solarwinds-hacker-hatten-zugriff-auf-microsoft-quellcode\/\"><br \/>\n<\/a><a href=\"https:\/\/borncity.com\/win\/2021\/01\/14\/solarleaks-bietet-angeblich-sourcecode-von-cisco-microsoft-und-solarwinds-an\/\">SolarLeaks allegedly offers source code from Cisco, Microsoft and SolarWinds<\/a><a href=\"https:\/\/www.borncity.com\/blog\/2021\/01\/02\/solarwinds-hacker-hatten-zugriff-auf-microsoft-quellcode\/\"><br \/>\n<\/a><a href=\"https:\/\/borncity.com\/win\/2021\/01\/20\/auch-malwarebytes-von-den-solarwinds-angreifern-erfolgreich-gehackt\/\">Malwarebytes also successfully hacked by the SolarWinds attackers<\/a><a href=\"https:\/\/www.borncity.com\/blog\/2021\/01\/02\/solarwinds-hacker-hatten-zugriff-auf-microsoft-quellcode\/\"><br \/>\n<\/a><a title=\"https:\/\/borncity.com\/win\/2021\/01\/27\/vier-sicherheitsanbieter-besttigen-solarwinds-vorflle\/\" href=\"https:\/\/borncity.com\/win\/2021\/01\/27\/vier-sicherheitsanbieter-besttigen-solarwinds-vorflle\/\">Four more security vendors confirm SolarWinds incidents<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>[German]The hack of numerous (US) authorities and companies via Solarwinds software in 2020 is probably still fresh in the minds of many readers. Now the Semperis security research team has discovered a new variant of \"golden SAML\", an attack technique &hellip; <a href=\"https:\/\/borncity.com\/win\/2024\/03\/04\/new-variant-of-the-solarwinds-attack-technique-discovered-in-2020\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[580],"tags":[69],"class_list":["post-33423","post","type-post","status-publish","format-standard","hentry","category-security","tag-security"],"_links":{"self":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/33423","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/comments?post=33423"}],"version-history":[{"count":3,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/33423\/revisions"}],"predecessor-version":[{"id":33426,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/33423\/revisions\/33426"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/media?parent=33423"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/categories?post=33423"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/tags?post=33423"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}