![solarwinds network performance monitor datasheet solarwinds network performance monitor datasheet](https://www.itmanageworks.com/images/NTA/NTA_4-0_CBQOS-PERFORMANCE-VIEWS.jpg)
FireEye’s findings revealed that the backdoor communicates with third-party servers via HTTP, after an initial dormant period following deployment.
#Solarwinds network performance monitor datasheet install#
Russian cybercriminals are suspected to have used SolarWinds Orion software updates to install the SUNBURST backdoor on enterprise users’ IT systems and networks, causing a serious attack of unprecedented proportions. The initial list of victims not only included the U.S government, but other consulting and technology firms in North America, Europe, Asia and the Middle East as shown in the chart below: 2 However, the attackers were only interested in a few hundreds of these customers who received secondary payloads, such as the post-exploitation tool named Teardrop.
![solarwinds network performance monitor datasheet solarwinds network performance monitor datasheet](https://www.itmanageworks.com/images/NTA/NTA_4-0_NETWORK-TRAFFIC-FORENSICS_sm.jpg)
1 The said trojanized software updates may have been installed by as many as 17,000 customers. In December 2020, SolarWinds Inc., leading provider of IT monitoring and management solutions for enterprises, disclosed that it has fallen prey to a widespread supply chain attack trojanizing its Orion business software updates.įireEye & CrowdStrike who have been supporting SolarWinds in its investigation reported that the attackers deployed a novel malicious tool, SUNSPOT (hasn’t been attributed to any known adversary), into the build environment of Orion’s platform to inject SUNBURST backdoor. As this narrative was getting stronger, the final weeks of an already challenging year exposed a supply chain vulnerability of nearly global importance. In the year 2020, the onset of the pandemic disrupted supply chains worldwide with rapid digitization, ramping up cyber risks associated with supply chains.