IndustryResearch BreakingDowntheSolarWindsBreach
IndustryResearch BreakingDowntheSolarWindsBreach
IndustryResearch BreakingDowntheSolarWindsBreach
THREAT REPORT
THREAT DETECTION
AND RESPONSE
CLOUD-SECURITY
ENTERPRISE
SECURITY THAT THINKS THREAT REPORT : Breaking down the SolarWinds
breach: an inside look at the methods used
TABLE OF CONTENTS
The Vectra AI detection models provide real-time early
Summary ............................................................................................... 3 warning and continuous visibility across the attack
progression from on-premise to cloud without any
Mapping the attack progression from on-premise to cloud............................ 3
dependency on IoCs, signatures, or other model updates.
Establishing a stealthy C2 channel............................................................ 5
The Domain Generation Algorithm that doesn’t behave like a DGA..........................5
Progressing the attack: Identity and the cloud pivot.................................... 6 • Multiple communication channels, phases, and tools were used to
Moving laterally to get to Domain Admin..............................................................6 establish interactive, hands-on-keyboard control. Each phase was
designed to minimize the chance of detection, with techniques
SAML Golden Ticket and Modifying Federation Trusts............................................7
that defeat IDS tool signatures, EDR, manual threat hunting, and
Persisting Access to Office 365 Email and Data....................................................7 even common approaches to ML-based detection.
Vectra® protects business by detecting and stopping cyberattacks. • Vectra’s AI will see through the evasion tactics applied and detect
As a leader in network detection and response (NDR), Vectra® AI protects the tunnels as soon as they go active.
your data, systems and infrastructure. Vectra AI enables your SOC team to
quickly discover and respond to would-be attackers —before they act. • Vectra uniquely protects the entire network of hybrid, on-premise,
Vectra AI rapidly identifies suspicious behavior and activity on your and cloud connectivity with learning behavioral models that
extended network, whether on-premises or in the cloud. Vectra will find it, understand both hosts and identities—tracking and stopping
flag it, and alert security personnel so they can respond immediately. attackers earlier in the kill chain.
2
SECURITY THAT THINKS THREAT REPORT : Breaking down the SolarWinds
breach: an inside look at the methods used
Leveraging network detection and response—where network is defined broadly The Vectra AI coverage—with no reliance on IoCs or signatures—begins as
as everything outside of the endpoint—is a better approach in defending soon as the initial C2 channel is established. The combination of behaviors
against this class of attack. The Vectra AI detection models provide real-time observed directly on the SolarWinds server caused it to be prioritized as
early warning and continuous visibility across the attack progression from “Critical” even before any lateral movement occurred, allowing for early
on-premise to cloud without any dependency on IoCs, signatures, or other containment. If the attack were to progress, additional detections would
model updates. All of this works to identify and stop attacks like Sunburst/ provide full visibility into each subsequent phase even as the attack pivots
Solorigate/SolarWinds before damage is done. into the cloud and Office 365.
3
SECURITY THAT THINKS THREAT REPORT : Breaking down the SolarWinds
breach: an inside look at the methods used
• Suspicious Sign-On
• Suspicious Email Forwarding
Vectra coverage • Suspicious Transport Rule
• Suspicious Remote Execution • eDiscovery Search
• HTTPS Hidden Tunnel • Privileged Access Anomalies • Suspicious Sign-on • Suspicious Power Automate
1 5 9
Supply Chain Establish Full-featured Admin Access to
Compromise C2 Tunnel Azure AD
A SolarWinds Orion Once the custom Cobalt Using the stolen
software update package is 4 Strike HTTPS C2 is 8 certificate to forge new 12
compromised with a Establish Initial downloaded and installed, Steal SAML SAML tokens, attackers Access Email Data
malicious binary named C2 Tunnel attackers gain richer features Signing Certificate can access Azure AD Attackers can directly
SUNBURST. More than The custom HTTPS tunnel for hands-on-keyboard Attackers leverage with admin permissions. access email in specific
18,000 organizations install connects out from the progression that drives the Domain Admin user accounts or
the trojanized update. compromised server, rest of the attack. credentials to move to leverage native O365
allowing attackers to perform the ADFS server and tools like eDiscovery and
local reconnaissance and steal the SAML Power Automate to
install additional software signing certificate. harvest specific data.
like Teardrop - an in-memory
dropper and custom
versions of Cobalt Strike.
2 6 10
Validate 3 Domain 7 Modify 11
Environment Identify C2 Domain Recon Get Domain Admin Federation Trust Modify Credentials and
SUNBURST activates 12-14 SUNBURST performs DNS Attackers identify a Attackers leverage service or for long term access OAuth Applications for
days after the trojanized lookups to a subdomain of path to gain domain admin accounts present on the To gain persistent access
admin with tools like
Persistent Access to O365
update has been installed avsvmcloud[.]com encoded with server and Windows admin to Azure AD, attackers Attackers gain access to
and validates that analysis information about the specific local ADfind and AD tools that support remote code can add new domains or applications (e.g. email archiving)
tools and antivirus engine environment. A CNAME response reconnaissance execution to move laterally from modifying the trusted that have access to organization
components are not present. back to the request will initiate a techniques similar the SolarWinds system deeper Certificate Authorities so emails by adding new credentials
custom HTTPS tunnel included in to Bloodhound. into the network. that they allow and modifying permissions.
the compromised binary. attacker-owned signing
certificates to be used.
• Vectra Threat Intelligence • Suspicious LDAP Query • Suspicious Remote Execution • Suspicious Azure • Redundant
• Custom models and • RPC Recon • Privileged Access Anomalies AD Operation Access Creation
Vectra coverage metadata-based hunting
4
SECURITY THAT THINKS THREAT REPORT : Breaking down the SolarWinds
breach: an inside look at the methods used
Establishing a stealthy C2 channel • The algorithmically generated domain was a deep subdomain (e.g.
3mu76044hgf7shjf.appsync-api.us-est-2.avsvmcloud.com). Many
The C2 channel is not only carefully designed to evade signatures, but legitimate services use randomization at this level and thus detecting on
also simple-yet-common ML approaches. Vectra’s C2 models use a more randomization would be extremely noisy and impractical.
sophisticated AI approach, seeing through the evasion tactics to detect the
• Beacons to a single sub-domain with a single piece of information, which
underlying C2.
evades DNS tunnel detectors that are looking for varying subdomains that
The Domain Generation Algorithm that doesn’t behave like a DGA would be used in order to encode more information.
• No NXDOMAINs were returned, taking away a primary signal for common After the Cobalt Strike HTTPS tunnel was established, the active, hand-on-
DGA detection. keyboard phases of the attack progression leveraged this instead.
5
SECURITY THAT THINKS THREAT REPORT : Breaking down the SolarWinds
breach: an inside look at the methods used
Both HTTPS tunnels use relatively standard methods to communicate, Progressing the attack: Identity and the cloud pivot
transferring commands and results over a periodic, encrypted beacon. There
is little-to-no innovation in this tooling. Once the C2 channel has been successfully established, it is used to provide
hands-on-keyboard control to move the attack forward. Given the human
However, as with the DNS beacon, the domains were chosen to minimize the
element, details will vary from environment to environment. However, there
probability of detection: the domains were all well-seasoned/aged and hosted
is a common progression outlined in the research on both Cozy Bear TTPs in
in Amazon AWS IP spaces. This simple tactic will, surprisingly, evade not just
general and the SolarWinds attack in particular.
passive DNS and reputation systems but most ML-based detection systems as
well. Why? Most ML detection starts by finding beacons in an environment, Moving laterally to get to Domain Admin
but due to the sheer number of legitimate beacons in networks, those models
An attacker in controlling trusted infrastructure (SolarWinds) with access
need a way to choose which beacons to alert on and which to ignore.
to various privileged accounts, including SolarWinds service accounts and
A simplistic way to address this problem is to only alert on beacons using in some cases even admin accounts, provides a short path to full domain
domains under a few weeks old, effectively giving a pass to any domain admin permissions.
with even modest age. It’s also common to whitelist some CSP IP ranges,
An obfuscated version of ADfind has been commonly reported as part of
especially from mobile devices. This approach works fine for most red teams
the attack tooling, used for domain enumeration including identification
but, as this case clearly shows, does not defend against a sophisticated
of domain admin accounts. Vectra covers domain enumeration with the
adversary that has planned the attack in advance.
Suspicious LDAP Query detection model.
Vectra uses a beacon detector as a foundation for tunnel detection. However,
Given an understanding of the group relationships and domain admin
rather than taking the approach outlined above, Vectra’s Hidden HTTP/S
accounts, the next logical step is to use RPC to map the path to domain
tunnel models use an advanced LSTM Recurrent Neural Network applied to
admin. Vectra detects this with an RPC Recon model.
time-series traffic metadata to identify C2 interaction over the beacon while
ignoring things like stock tickers. As a result, Vectra’s AI will see through the Once the path is mapped, lateral movement will begin. Research suggests that
evasion tactics applied here and detect the tunnels as soon as they go active. task scheduler invoked via Windows Management Instrumentation (WMI) with
accounts discovered on the SolarWinds server is the most common tactic used.
Vectra provides detection coverage for this lateral movement in two ways:
Vectra’s AI will see through the evasion • Privileged Access Anomalies: Vectra identifies and maps the relationships
of all privileged accounts, services, and hosts. Attempts to use privileged
tactics applied here and detect the tunnels accounts and services in unusual ways, including to execute commands,
as soon as they go active. will trigger detection. For a more detailed description of Vectra’s Privileged
Access Analytics, see our solution brief on zero trust and privileged access.
6
SECURITY THAT THINKS THREAT REPORT : Breaking down the SolarWinds
breach: an inside look at the methods used
• Suspicious Remote Execution: This model zeroes in specifically on RPC Persisting Access to Office 365 Email and Data
UUIDs associated with remote code execution via DCE/RPC, WMI, and
Office 365 holds a wealth of data, driven even more in 2020 by the increase
DCOM, with learnings on a [src, dst, account, UUID] tuple. Remote code
of collaboration and document sharing to support remote work during the
execution outside of the model learnings will trigger detection.
COVID-19 pandemic. Gaining ongoing email access appears to have been
a key objective of the attackers, at least for specific targets in the U.S.
SAML Golden Ticket and Modifying Federation Trusts
Federal government. One technique discovered employed modification of
With a Domain Admin account in hand, the attackers looked for opportunities the credentials and/or X509 keys for OAuth applications with email read/
to extend their presence into cloud environments. Given the prevalence write access (e.g. Email Archiving applications). These changes ensured easy
of MFA on Azure AD and other federated identity providers, the attackers access to all email communications on an ongoing basis via API calls, with
instead targeted and stole SAML signing certificates to forge new SAML very low chance of detection.
token—used to bypass MFA. The SAML signing certificate is available in
Vectra’s Azure AD Redundant Access Creation will trigger on these types of
memory on the Active Directory Federation Services (ADFS) server or similar.
changes to OAuth app permissions.
Techniques to move laterally to the ADFS server would be the same as those
to get to domain admin, but now with a more powerful account. With Office 365 access at admin level, a variety of other techniques could
also be used to maintain access to both email and other Office 365 data.
Vectra coverage for the move to ADFS/SAML server is the same as in
These include:
earlier phases, specifically Privileged Access Anomalies and Suspicious
Remote Execution. • Setting up eDiscovery and Compliance searches to look for specific
information across all channels in Office 365 – Email, Teams, OneDrive,
The SAML signing certificate is then used to forge a SAML token, enabling
SharePoint. These applications are covered by Vectra’s Suspicious
global admin access to Azure AD. Vectra’s Azure AD Suspicious Sign-On
eDiscovery Search and Suspicious Compliance Search detection models.
detects this access, analyzing multiple dimensions of the sign-on—including
IP, geolocation, sign-on methods, and host—to identify unusual access.
• Creating Power Automate flows to automatically exfil the data, either over
Once global admin access is achieved, the adversary gains persistent HTTP or to external destinations such as attacker-controlled Google Drive
access by modifying the domains Federated Trust configuration. This can be or Box accounts. Vectra’s Suspicious Power Automate detection addresses
achieved by either adding new trusted domains the attacker controls, or new this vector.
trusted Certificate Authorities (CAs) for creating and signing new certificates.
These changes enable the attacker to issue new SAML tokens on an ongoing • Other less stealthy techniques such as email forwarding or transport rules
basis without needing access to the ADFS above. Vectra detects unusual are also options. These are also covered by Vectra detection models –
changes to the Federated Trust configuration, as well as other Azure AD Suspicious Email Forwarding and Suspicious Transport Rule.
configuration, with the Suspicious Azure AD Operation detection model.
7
SECURITY THAT THINKS THREAT REPORT : Breaking down the SolarWinds
breach: an inside look at the methods used