Search

The SolarWinds Attack from a Hacker’s Point of View

The attack SolarWinds is a perfect demonstration of a critical caveat in cyber risk management: Organizations can only uncover the information they’re looking for.

Companies are so busy locking down their own house doors, they ignore the tunnels accessible via third parties. Although 79% of firms have a third-party risk management (TPRM) program, most practitioners only focus on moderate and highly critical vendors.

Attackers know this all too well. They use advanced techniques to get in, cover their tracks, and create a new backdoor. At that point, it’s already too late. As was the case with the SolarWinds breach, they gain access into larger organizations through their weaker links.

While doubtful it could have been prevented, the SolarWinds attack could have been detected by looking for signals the hacker community capitalizes on.

Signals That Went Under the Radar

Reconnaissance, one of the top two elements of the MITRE ATT&CK®Matrix for Enterprise Reconnaissance and Resource Development, includes active scanning, gathering victim host information, and other data that might be notable for further analysis.

Identified through Black Kite scanning, we revealed three types of reconnaissance data which dated all the way back to 2018:

  1. SDLC Hacker Share Results show multiple exploits, including SQL injection.
  2. Credential Management reported as deficient.
  3. Related domains purchased by hackers were registered mostly by China.
The SolarWinds Attack from a Hacker’s Point of View

1. HACKTIVIST SHARES RESULTS DISPLAYS SQL INJECTION

Usually considered a major red flag, the SQL injection is rarely missed in the SDLC (Software Development Life Cycle). This chatter goes back into 2018 and continued into 2020. These problems are reported in continuous monitoring and should result in substantial caution from the user’s side. While other companies such as Microsoft or Azure may also miss something of this stature in their SDLC analysis, SolarWinds was likely identified as the easier target. Tools such as ZoneHM Exploit IT can be used by hackers to reveal such weaknesses.

The SolarWinds Attack from a Hacker’s Point of View

2. Credential Management

The number of breached credentials within a company is also a key indicator of existing resource development by hackers. For SolarWinds, 36 credentials were breached during the April 2020 timeframe. This often results from staff using the network to sign into other external platforms. If those platforms suffer a breach, the credentials become available through that platform as well—causing a ripple effect.

The SolarWinds Attack from a Hacker’s Point of View

3. Related Domains Report

These serve as an avenue for phishing and stuffing campaigns once hackers have the emails through compromised credentials, allowing for robust resource development to support potential attacks.

Letter Scores are NOT Signals

There is no magic bullet. Just as a poor cyber hygiene score is not an indicator a company has been hacked, an ‘acceptable’ score does not mean the red flags aren’t there. At first glance, SolarWinds’ cyber hygiene wouldn’t necessarily call for immediate action. However, given their full access to an outsourcer’s network, SolarWinds is an extreme vendor from a risk viewpoint. Human analysis and intervention is key to getting healthy, preventative, detective information and using it proactively to support solid processes.

Understanding your landscape—which includes the extent of your partner ecosystem, business and incident response capabilities—will help you quickly identify and reduce the potential impact of a cyber attack.

Companies should bring forth a much deeper level of analysis and a more agile response. Integrating the right risk mitigation tools that account for real-world potential impact is essential. Just as importantly, choosing the right companies to examine closely is key. Without that view, insights simply become noise.

Clear the Noise

Built from a hacker’s perspective, Black Kite combines three types of assessments to holistically assess third-party risk from a technical, financial, and compliance perspective.

Contact us for more information ➔