Over the past few weeks, a number of high-profile cyber-attacks have been made public. First was the FireEye breach where a sophisticated threat actor managed to compromise one of the world’s leading cybersecurity and incident response firms and stole about 300 proprietary hacking tools used by internal “Red Teams” to test their clients’ networks and security. The next attack to make the news was against the US Treasury and Commerce Department where it was confirmed that a sophisticated attacker had fully breached the network. Then followed the disclosure of the SolarWinds attack that tied them all together and is implicated in a slew of government and private sector breaches that are now coming to light across the public and private sectors, with some of the most troubling being the DOE and NSA, the agencies tasked with the maintenance and security of the nation’s stockpile of nuclear weapons and materials.
The Attack
Supply Chain
What it Means to Your Organization
What to Expect
What Can be Done Today
- Determine if your organization has been impacted (the resources mentioned above can assist with this as well as additional resources on CISA’s website). This means checking the latest intel to see if any of the known impacted files are extant in your environment and watching for associated unexpected or malicious behavior.
- If your organization is or may likely be affected, make incident response, containment, and remediation your TOP priority. The effort should start with leadership and involve legal, financial, operations, risk, IT, security, and any other personnel who are identified through the response and investigation. Information Security/Cybersecurity personnel must be supported and empowered to engage other areas of the organization and to take actions required to contain and eradicate the threat from the environment.
- Allocate sufficient resources, a full scope response requires complete support from the executive level down to the analysts, and must empower those tasked with managing the response to make operational decisions which could impact other areas of the organization and have financial implications. Organizations should consider bringing in third party resources and may need to add tooling and capabilities to identify and evict the threat actors in the environment. Following the response, it may be necessary to rebuild all network and many IT enterprise assets (anything monitored by SolarWinds or connected to something that was). This will potentially be a massive, complex, and protracted operation.