Healthcare and Public Health Sector Notification Active Exploitation of SolarWinds Software Potentially Affecting HPH Sector This email is from the Division of Critical Infrastructure Protection (CIP) within the U.S. Department of Health and Human Services, Office of the Assistant Secretary for Preparedness and Response. For more information, e-mail CIP@hhs.gov or to subscribe to our email newsletters, visit our website. Traffic Light Protocol (TLP) Designation: WHITE TLP: WHITE information may be distributed without restriction. The Health Sector Cybersecurity Coordination Center (HC3) has released a Sector Alert on the Active Exploitation of SolarWinds Software Potentially Affecting HPH Sector. On 13 December 2020, FireEye and SolarWinds released security advisories detailing a highly-skilled and highly-targeted manual supply chain attack on the SolarWinds Orion Platform network management system that leverages software updates to deploy a backdoor to victim organizations. SolarWinds Orion is an IT performance monitoring platform that helps organizations manage and optimize their IT infrastructure. The actors behind this campaign have likely gained access to numerous public and private organizations around the world starting as early as Spring 2020. Signatures to detect this threat are available and mitigations are detailed in this alert and should be prioritized. Links to additional resources and information are available at the end of the HC3 Alert. Coordination Call The Cybersecurity and Infrastructure Security Agency (CISA) invites you to participate on a call today (December 14, 2020) at 4 pm Eastern addressing active exploitation of a vulnerability in SolarWinds Orion Platform software versions 2019.4 through 2020.2.1, which was released between March 2020 through June 2020. Date/Time: Monday, December 14, 2020 (4-4:30pm EST) Participant Toll Free Dial in Number: 1-800-857-6546 (passcode 9936839) International Dial in Number: 1-312-470-7237 (passcode 9936839) Analysis This supply chain compromise can allow attackers to gain access to victim organizations via Trojanized updates in the SolarWinds Orion Platform. While the attacker's post compromise activity leverages multiple techniques to evade detection and obscure their activity, there are also opportunities for detection. FireEye is tracking this threat actor as UNC2452 and news outlets suggest that APT29, also known as Cozy Bear, is behind the campaign. Alert On 13 December 2020, FireEye and SolarWinds released security advisories detailing active exploitation of SolarWinds Orion Platform software versions 2019.4 through 2020.2.1, released between March 2020 and June 2020. According to FireEye, SolarWinds.Orion.Core.BusinessLayer.dll is a SolarWinds digitally-signed component of the Orion software framework that contains a backdoor that communicates via HTTP to third party servers. This Trojanized version of the Orion plug-in has been given the names SUNBURST by FireEye and Solorigate by Microsoft. After an initial dormant period of up to two weeks, it retrieves and executes commands, called "Jobs", that include the ability to transfer files, execute files, profile the system, reboot the machine, and disable system services. The malware masquerades its network traffic as the Orion Improvement Program (OIP) protocol and stores reconnaissance results within legitimate plugin configuration files allowing it to blend in with legitimate SolarWinds activity. The backdoor uses multiple obfuscated blocklists to identify forensic and anti-virus tools running as processes, services, and drivers. Patches, Mitigations & Workarounds FireEye has released an advisory with additional details as well as signatures to detect this threat actor and supply chain attack in the wild found on its public GitHub page with detection rules in multiple languages including Snort, Yara, IOC, ClamAV. Additional mitigations include the following: - Ensure that SolarWinds servers are isolated/contained until a further review and investigation is conducted. This should include blocking all Internet egress from SolarWinds servers.
- If SolarWinds infrastructure is not isolated, consider taking the following steps:
- Restrict scope of connectivity to endpoints from SolarWinds servers, especially those that would be considered Tier 0/crown jewel assets.
- Restrict the scope of accounts that have local administrator privileged on SolarWinds servers.
- Block Internet egress from servers or other endpoints with SolarWinds software.
- Consider (at a minimum) changing passwords for accounts that have access to SolarWinds servers/infrastructure. Based upon further review/investigation, additional remediation measures may be required.
- If SolarWinds is used to manage networking infrastructure, consider conducting a review of network device configurations for unexpected/unauthorized modifications. Note, this is a proactive measure due to the scope of SolarWinds functionality, not based on investigative findings.
SolarWinds recommends upgrading to Orion Platform version 2020.2.1 HF 1 as soon as possible. An additional hotfix release, 2020.2.1 HF 2, is anticipated to be made available Tuesday, December 15, 2020, and SolarWinds recommends updating to HF 2 once released as this both replaces the compromised component and provides several additional security enhancements. DISCLAIMER: This product is provided "as is" for informational purposes only. The U.S. Department of Health and Human Services (HHS) does not provide any warranties of any kind regarding any information contained within. HHS does not endorse any commercial product or service referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking noted above. You are receiving this information because you previously signed up for an ASPR CIP mailing list. If you do not want to receive communications from ASPR CIP or the HPH Sector, you can unsubscribe using the link at the bottom of this message. U.S. Department of Health & Human Services, Office of the Assistant Secretary for Preparedness & Response 200 C Street, SW Washington, DC 20024 |