Optimising IT Blog

How the Solorigate Cyber Attack Could Have Been Prevented

Computer code on a screen with a skull representing a computer virus / malware attack

 

Understanding the Command and Control Approach and Ways to Break It before It Starts

Context and Audience

This blog post is aimed at Security Professionals, Network Security Managers and anyone in a technical capacity responsible for or working in Network Security.

Background

The compromise of the Solarwinds Orion monitoring platform is no doubt one of the most impactful cyberattacks ever. And not because it caused any disruption or encrypted any data. No. Because it involved the compromise of software source code from a reputable company and went unnoticed for what is, in cyber terms, a rather long time.

There are always times when you have no option to run software that is past its sell-by date. You can do things that I have talked about in a previous post — “What to Do When You Can’t patch”.

However, in this instance, not patching would have been a good thing. If you hadn’t updated the compromised software, there would have been no “attack”.

Recap — What Is Solorigate (Sunburst)?

  • The Orion network monitoring software agents installed on servers had malicious code implemented at the source. These were compiled and distributed to many customers who use the software.
  • That compromised code was not detected by the majority of security vendors as it’s “trusted” software. At the time, there were no defined signatures or behaviours loaded into SIEM platforms, IPS or endpoint protection systems to detect and block the activity.
  • The compromised monitoring agents connected to command and control infrastructure, where they took command actions from the threat actors who carried out the attack.
  • Once the access was established, the attackers used the command and control capabilities to access other systems, capture credentials, move sideways and access cloud-based systems.
  • Circa 18,000 organisations were infiltrated using the compromised software.

How to Get to the Root Cause

I’m a big fan of a few key principles when it comes to cybersecurity:

  • Always ask, “why?”. Then keep going with the whys until you get a basic, simple answer. This is also known as the five whys.
  • Use the phrase “show me” when it comes to evaluating security.
  • Keep your environment simple and compartmentalised.
  • Does it need to have access to that system/data/network/website? Least privilege works for systems and software, not just people.
  • Get good people to continually evaluate and improve.

What Was the Solorigate (Sunburst) Root Cause?

So far, I haven’t seen a definitive root cause on how the Orion code was compromised. The latest information from Solarwinds is available here.

Now I don’t like to assume anything, as assumptions are a dangerous thing. So, I won’t speculate on how a malicious attacker managed to compromise Orion Source Code. It will be good for us to learn how that happened to prevent it from happening in the future since it’s not the first time such an attack has been used. (See this article about how a finance platform software update was compromised.)

Let’s look at the root cause from an Orion customer perspective: Trusted software compromised. It could be any software. OK, that looks bad — if I can’t trust my software, and no-one else knew about the compromise, so, therefore, it wasn’t detected for many months, what are you supposed to do?

We Can’t Fix the Root Cause – Now What?

Let’s look at how the compromised software was used. You can see more about this and how to defend against it at the O/S level in this excellent post by Microsoft and the capabilities in defender for endpoint.

Hold the phone. Orion is commonly deployed on servers in mission-critical environments. As the subsequent attacks rely on command and control (where software calls home to receive its instructions), what happens if it can’t call home? Likely not much. It didn’t encrypt files or just infect lots of systems and be overt in its nature — it’s designed to be stealthy.

For me, if the compromised software couldn’t connect to the control server(s), it couldn’t receive any commands, and therefore, that’s where the attack would end.

You Let Your Core Infrastructure Connect to What?

Two things could have prevented the compromised software from being a problem:

  • Explicit Allow
  • Default Deny

The two best firewall rules ever invented. I am stuck asking myself why so many (high security conscious) organisations would let connections initiated from core infrastructure connect to un-defined internet destinations.

Sure, they need to connect outbound to any cloud monitoring platform or download software updates — but to access a random website with no defined business purpose?

This may have been a risk-based approach: You couldn’t (easily) define what internet sites a user’s endpoint may or may not need to connect to, but it’s much easier to do for a domain controller, a file server, a database server and so on.

Even servers that serve web pages don’t need to initiate outbound connections to unknown destinations — that’s what modern firewalls (well, any firewall from at least the last, erm, 20 years) will manage by being stateful.

Key Approaches to Preventing Command and Control Attacks

Not an exhaustive list and likely not everything would be possible in all organisations, but here are some of the actions I would recommend:
Map out your known (required) connections from your server infrastructure.

  • Segment your servers into logical groups from a network perspective.
  • Do implement firewall rules between segments and the internet — limit where traffic from servers can go and what it can do.
  • Only allow internet access to known, the business required destinations for your servers. Yes, that is some work, but better than the alternative.
  • Do keep your environment as simple as possible — less is more in security terms.
  • Do mix some vendors for security but keep the list short. Microsoft was affected by this breach as they use the SolarWinds product, but they are also one of the best security vendors out there.
  • Keep your Endpoint Detection and Response systems up to date and proactively look for indicators of compromise.
  • Layer in a tighter network and other security controls based on the value of the asset you’re trying to protect. Your source code for the example is super valuable, so always put lots of protection around that.
  • Last but not least, assume breach and work from there.

Other Sources of Information

There are many, but some good ones I have read are:

How Do I Fix My Firewall Rules?

This is best explained with an easy example. Let’s take a firewall rule I see all too often:

How do I fix my firewall rules

This rule would be applied outbound in the above example, meaning anything behind your firewall in your organisation could go anywhere through the firewall using any protocol it likes. Hmmm.

Let’s try this again.

Business requirement: Internet Browsing
Re-worked rules from the above:

reworked firewall rules

Better, but now we can only use specific ports to go anywhere. It’s pretty easy to run a command and control service on port 53, for example (yes, I know, this needs to be UDP, but let’s keep the example simple).

Here is how I would like to see the same business requirement deployed as firewall rules using the above example:

final firewall rules

Clearly, this is still a challenge as we haven’t specified which destination IPs we will allow. This is where some form of protective DNS and web filtering technology will look at and filter requests higher up the TCP/IP stack, as filtering by IP alone would be an extensive list and just too complex to manage.

It doesn’t help if there is no defined information or signatures about malicious IP addresses and URLs. There is always some risk that needs to be accepted if you connect systems to the internet or have any data — this is all about minimising that risk.

Now, what about those servers that don’t need to browse the internet? In the above example, we have split our servers into two groups and applied specific rules. Anything else is immediately denied internet access by our default deny rule. Why? Note in the last table we added the order column: “Firewall rules are evaluated until a match is found”.

Anything that didn’t match the first two rules is immediately matched to the last rule and is denied. This is why the deny rule should always be at the bottom.

This isn’t complicated stuff, but it does take knowledge about your environment, a little planning and some patience. It also takes good change control to make sure no-one just puts in an Any-Any rule to get something working in a hurry. It’s always worth reviewing firewall rules regularly. Oh, wait — that is a requirement in Cyber Essentials, isn’t it? Certainly, it is in ISO27001.

Optimising IT — Cyber Security Services

Here at Optimising IT, we offer a full range of Cyber Security Services, including Cyber Consultancy, Penetration testing and Cyber Essentials, plus assessments and certifications. We also provide best in breed Security Solutions from Fortinet and Microsoft, including supply, installation and support.

Is Your Security Approach Aligned with Your Business Risk?

If you are concerned that you may have been exposed by the recent SolarWinds attack, or you are looking for an independent review of your security, Penetration Testing, Cyber Essentials certification services or some help with your network security, get in touch with us today to see how we can help.

Contact us with any of your specific questions — and keep an eye out for my series of posts. I’ll provide some more detail on network security with some examples and possibly even a diagram or two.

Climate Conscious IT

In short – it’s ‘IT for Good’. You can choose to offset your workforce’s carbon now, plan to offset their carbon in future, or do both for maximum impact.

Stay social

Latest post

Sharing is caring:
Facebook
Twitter
LinkedIn
Reddit
WhatsApp
Email