Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

FireEye Identifies Killswitch for SolarWinds Malware as Victims Scramble to Respond
https://www.darkreading.com ^ | 12 16 2020 | Jai Vijayan

Posted on 12/20/2020 2:00:33 PM PST by ATOMIC_PUNK

White House National Security Council establishes unified group to coordinate response across federal agencies to the threat. FireEye, which last Sunday disclosed a compromise at network management software vendor SolarWinds that allowed an unknown attacker to distribute malware to potentially thousands of organizations, has identified a killswitch that it says would prevent the malware from operating on infected networks.

But in networks where the attackers might have already deployed additional persistence mechanisms, the killswitch will not remove the threat from victim networks, according to the security vendor.

FireEye on Sunday said that an investigation it was conducting into a breach of its own network last week uncovered a threat actor widely distributing a backdoor dubbed SUNBURST by hiding it in legitimate updates of SolarWinds' Orion network management technology.

SUNBURST (SolarWinds.Orion.Core.BusinessLayer dot dll) is a sort of first-stage Trojan that the attackers were using to drop additional payloads for escalating privileges, lateral movement, and data theft on infected networks, FireEye explained. The stealth, planning, and precision with which the attack was executed had all the hallmarks of a nation state-backed actor, the vendor said. FireEye is currently tracking the threat actor as UNC2452, but says it has not been able to identify whether and on whose behalf it might be operating.

Security experts as well as some members of Congress who received classified briefings on the attack, point to Russia as the likely perpetrator.


TOPICS: Crime/Corruption; Extended News; Technical
KEYWORDS: hacking; malware; nationalsecurity; solarwinds; tech

1 posted on 12/20/2020 2:00:33 PM PST by ATOMIC_PUNK
[ Post Reply | Private Reply | View Replies]

To: ATOMIC_PUNK

This story reminds me of Marcus Hutchins . He was a hacker who was pushed into doing bad things but redeemed himself by discovering the kill switch for a truly wicked virus.


2 posted on 12/20/2020 2:10:39 PM PST by Nateman (Democracy dies with voted fraud darkness.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: ATOMIC_PUNK

12/16. Outdated.


3 posted on 12/20/2020 2:11:47 PM PST by TexasGator (Z1z)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Nateman
Something weird. When I clicked on the DarkReading.com link, it showed my email addresses in a small window at the top left. That is spooky. What is this website doing? I did not type in any email address. I don't think I trust DarkReading.

Good Hunting... from Varmint Al

4 posted on 12/20/2020 2:22:40 PM PST by Varmint Al
[ Post Reply | Private Reply | To 2 | View Replies]

To: ATOMIC_PUNK

β€œ...SUNBURST (SolarWinds.Orion.Core.BusinessLayer dot dll) is a sort of first-stage Trojan that the attackers were using to drop additional payloads for escalating privileges, lateral movement, and data theft on infected networks, FireEye explained....

...Security experts as well as some members of Congress who received classified briefings on the attack, point to Russia as the likely perpetrator....”
***************************************************************
Of course it’s Russia, Russia, Russia. Why would we ever suspect China. The Chinese would NEVER be interested in stealing sensitive data and information from us. /SARC


5 posted on 12/20/2020 2:25:33 PM PST by House Atreides
[ Post Reply | Private Reply | To 1 | View Replies]

To: Nateman
I crossed paths some time ago with a serious hacker. How he got into hacking was as a teenage hacker, he got into a network for a multinational chemical company. The company was impressed so instead of pressing charges, they offered him a full ride college scholarship to a top computer science program. He interned summers with the company as well. After college, he was hired to be their corporate in-house white hat hacker to break into their computer systems around the world.

So, what he did was to fly into town, setup in a fancy hotel and hack away. After a few days or a week he would surface at the plant and call a meeting with local management, IT and security. He'd brief them on if and how he penetrated into their networks and what he could see, change or steal. Corporate used the detail information to plug security holes.

6 posted on 12/20/2020 2:36:19 PM PST by Hootowl99
[ Post Reply | Private Reply | To 2 | View Replies]

To: ATOMIC_PUNK

So, it sounds like there isn’t any evidence that it was Russia. It’s just who they want it to be.


7 posted on 12/20/2020 2:43:17 PM PST by virgil (The evil that men do lives after them )
[ Post Reply | Private Reply | To 1 | View Replies]

To: Nateman

Marcus Hutchins, born in 1994-5, also known online as MalwareTech, is a British computer security researcher known for temporarily stopping the WannaCry ransomware attack. He is employed by cybersecurity firm Kryptos Logic. Hutchins is from Ilfracombe in Devon.


8 posted on 12/20/2020 3:04:26 PM PST by Robert DeLong
[ Post Reply | Private Reply | To 2 | View Replies]

To: Varmint Al

Doesn’t do that to mine sounds like you may already have a malware problem !


9 posted on 12/20/2020 3:05:48 PM PST by ATOMIC_PUNK (I'm not a psychopath, I'm a high-functioning sociopath.~ Sherlock Holmes )
[ Post Reply | Private Reply | To 4 | View Replies]

To: Hootowl99

While at the University of Arizona I knew a hacker who busted into the system simply to have game time. He eventually got caught but ended up being hired as a security expert somewhere.


10 posted on 12/20/2020 3:11:30 PM PST by Nateman (Democracy dies with voted fraud darkness.)
[ Post Reply | Private Reply | To 6 | View Replies]

To: Varmint Al
When I clicked on the DarkReading.com link, it showed my email addresses in a small window at the top left. That is spooky.

It does not do that to me. VirusTotal shows the site as clean.

11 posted on 12/20/2020 3:22:22 PM PST by TChad (The MSM, having nuked its own credibility, is now bombing the rubble.)
[ Post Reply | Private Reply | To 4 | View Replies]

To: Varmint Al

You might be logged into Facebook, Twitter, or LinkedIn (or another Microsoft site)

Each of those have a plug in to send out the link to friends on that page.

You are likely your own problem.


12 posted on 12/20/2020 3:26:43 PM PST by ConservativeMind (Trump: Befuddling Democrats, Republicans, and the Media for the benefit of the US and all mankind.)
[ Post Reply | Private Reply | To 4 | View Replies]

To: Varmint Al

#4 I see it in Firefox. Not the full address.
It does not display in Edge, Chrome or IE11


13 posted on 12/20/2020 6:49:41 PM PST by minnesota_bound (I need more money. )
[ Post Reply | Private Reply | To 4 | View Replies]

To: House Atreides

I don’t want to say it’s China but its China. πŸ˜‰


14 posted on 12/20/2020 9:21:52 PM PST by Georgia Girl 2 (The only purpose of a pistol is to fight your way back to the rifle you should never have dropped)
[ Post Reply | Private Reply | To 5 | View Replies]

To: ATOMIC_PUNK

The hacker is unknown.


15 posted on 12/20/2020 9:34:19 PM PST by linMcHlp
[ Post Reply | Private Reply | To 1 | View Replies]

To: ATOMIC_PUNK
That C. Wray has been compromised is a fact.

(Fire Eye says...)

(FBI Director Christopher Wray Has Been Hiding His Connections to a Russian Energy Company Likely Connected to Uranium One)

(from the "Way Back Machine)

16 posted on 12/21/2020 11:20:22 AM PST by yoe (President Trump works for We The People - not China as Biden has and will.)
[ Post Reply | Private Reply | To 1 | View Replies]

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson