Skip to content
This repository has been archived by the owner on Nov 16, 2023. It is now read-only.

Latest commit

 

History

History
54 lines (41 loc) · 2.69 KB

known-affected-software-orion[Solorigate].md

File metadata and controls

54 lines (41 loc) · 2.69 KB

View data on software identified as affected by Solorigate

This query was originally published in the threat analytics report, Solorigate supply chain attack.

Microsoft detects the 2020 SolarWinds supply chain attack implant and its other components as Solorigate. A threat actor silently added malicious code to legitimate software updates for Orion, which is IT monitoring software provided by SolarWinds. In this way, malicious dynamic link libraries (DLLs) were distributed to SolarWinds customers.

The following query searches Threat and Vulnerability Management (TVM) data for Orion software known to be affected by Solorigate.

More Solorigate-related queries can be found listed under the See also section of this document.

Query

DeviceTvmSoftwareInventoryVulnerabilities
| where CveId == 'TVM-2020-0002'
| project DeviceId, DeviceName, SoftwareVendor, SoftwareName, SoftwareVersion

Category

This query can be used to detect the following attack techniques and tactics (see MITRE ATT&CK framework) or security configuration states.

Technique, tactic, or state Covered? (v=yes) Notes
Initial access
Execution
Persistence
Privilege escalation
Defense evasion
Credential Access
Discovery
Lateral movement
Collection
Command and control
Exfiltration
Impact v
Vulnerability
Misconfiguration
Malware, component

See also

Contributor info

Contributor: Microsoft Threat Protection team