{"id":4474,"date":"2020-12-15T14:45:12","date_gmt":"2020-12-15T05:45:12","guid":{"rendered":"https:\/\/cyberenso.jp\/?p=4474"},"modified":"2021-07-14T18:36:51","modified_gmt":"2021-07-14T09:36:51","slug":"the-role-of-admin-credentials-in-the-solarwinds-attack","status":"publish","type":"post","link":"https:\/\/cyberenso.jp\/en\/the-role-of-admin-credentials-in-the-solarwinds-attack\/","title":{"rendered":"The Role of Admin Credentials in the SolarWinds Attack"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"4474\" class=\"elementor elementor-4474\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-7e723b1 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"7e723b1\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4517811\" data-id=\"4517811\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-01f5d47 elementor-widget elementor-widget-text-editor\" data-id=\"01f5d47\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>I wanted to share my thoughts on the SolarWinds attack that has been used to target government agencies as well as other private\/public companies. FireEye has an excellent write-up ( <a href=\"https:\/\/www.fireeye.com\/blog\/threat-research\/2020\/12\/evasive-attacker-leverages-solarwinds-supply-chain-compromises-with-sunburst-backdoor.html\">Highly Evasive Attacker Leverages SolarWinds Supply Chain to CompromiseMultiple Global Victims With SUNBURST Backdoor<\/a>\u00a0) and I encourage everyone to read it to familiarize yourself with the exploit and attack paths. In the next few months I expect a number of companies to announce they\u2019ve been impacted, and many more will unfortunately not publicly announce it.<\/p><h4><strong>Key attacker strategies:<br \/><\/strong><i><\/i><i>The use of lateral movement from system to system using compromised administrator credentials<\/i><\/h4><p>Early indicators show the responsible party is nation-state actor. One of the key strategies of nation-state actors is to minimize footprints to evade detection. This attack uses sophisticated methods to obfuscate the malware delivery and payload, and then pivots to lateral movement using compromised administrative credentials.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-da69c82 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"da69c82\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4898d78\" data-id=\"4898d78\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-07c2b72 elementor-widget elementor-widget-image\" data-id=\"07c2b72\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"448\" src=\"https:\/\/i0.wp.com\/cyberenso.jp\/wp-content\/uploads\/2021\/07\/Solar-winds-1.png?fit=1024%2C448&amp;ssl=1\" class=\"attachment-large size-large wp-image-4476\" alt=\"\" srcset=\"https:\/\/i0.wp.com\/cyberenso.jp\/wp-content\/uploads\/2021\/07\/Solar-winds-1.png?w=1874&amp;ssl=1 1874w, https:\/\/i0.wp.com\/cyberenso.jp\/wp-content\/uploads\/2021\/07\/Solar-winds-1.png?resize=300%2C131&amp;ssl=1 300w, https:\/\/i0.wp.com\/cyberenso.jp\/wp-content\/uploads\/2021\/07\/Solar-winds-1.png?resize=1024%2C448&amp;ssl=1 1024w, https:\/\/i0.wp.com\/cyberenso.jp\/wp-content\/uploads\/2021\/07\/Solar-winds-1.png?resize=768%2C336&amp;ssl=1 768w, https:\/\/i0.wp.com\/cyberenso.jp\/wp-content\/uploads\/2021\/07\/Solar-winds-1.png?resize=1536%2C672&amp;ssl=1 1536w, https:\/\/i0.wp.com\/cyberenso.jp\/wp-content\/uploads\/2021\/07\/Solar-winds-1.png?resize=260%2C114&amp;ssl=1 260w, https:\/\/i0.wp.com\/cyberenso.jp\/wp-content\/uploads\/2021\/07\/Solar-winds-1.png?resize=50%2C22&amp;ssl=1 50w, https:\/\/i0.wp.com\/cyberenso.jp\/wp-content\/uploads\/2021\/07\/Solar-winds-1.png?resize=150%2C66&amp;ssl=1 150w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Figure: The role of administrator credentials in enabling attacker lateral movement<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-0e76f61 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"0e76f61\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-c716345\" data-id=\"c716345\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a7f7aed elementor-widget elementor-widget-text-editor\" data-id=\"a7f7aed\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<h4><strong>The Challenge with Detection:<br \/><\/strong><i>Hard to differentiate between a valid credential and a compromised one during lateral movement<\/i><\/h4><p>The lateral movement strategy is very difficult to detect, and attackers will be most successful at evasion with this technique. Whether it\u2019s a nation state actor, ransomware, or other types of attacks, lateral movement through the use of compromised admin credentials continues to be one of the leading methods used in cyber attacks today.<strong>\u00a0The greatest challenge with lateral movement is it\u2019s difficult to know the difference between a valid credential being used legitimately versus maliciously.<\/strong><\/p><h4><strong>Response &amp; Prevention with Zero Trust Privileged Access:<br \/><\/strong>R<i>emove 24&#215;7 administrator access so lateral movement cannot occur, even if the intrusion occurs.<\/i><\/h4><p>While it is difficult to detect lateral movement, with the right tools, it is feasible to contain and prevent by placing your administrators into a Zero Trust privileged access model. It is possible to revoke all the access a credential has to endpoints so they cannot be used for lateral movement. Once the access is removed, any request for access can be validated with multi-factor authentication (MFA) and added back on a time limited, resource limited basis to minimize risk.\u00a0The latest industry recommendation is to adopt a\u00a0<a href=\"https:\/\/www.gartner.com\/en\/documents\/3957029\/remove-standing-privileges-through-a-just-in-time-pam-ap\">Zero Trust for Privileged Access<\/a>\u00a0model that constitutes Zero Standing Privilege (ZSP) along with Just-in-Time Access (JITA). Removing standing admin privileges across large sets of workstations\/servers (ZSP) dramatically reduces the ability of an attacker to laterally move from endpoint to endpoint. Just-in-Time Access incorporates multi-factor authentication to dynamically provision an admin to the specific system, for just the amount time they need without impeding business operations. A successfully deployed ZSP\/JITA model would effectively eliminate lateral movement from the SolarWinds attack.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-ac16839 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"ac16839\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3937fe6\" data-id=\"3937fe6\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4a1b2fb elementor-widget elementor-widget-image\" data-id=\"4a1b2fb\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"473\" src=\"https:\/\/i0.wp.com\/cyberenso.jp\/wp-content\/uploads\/2021\/07\/Solar-winds-2.png?fit=1024%2C473&amp;ssl=1\" class=\"attachment-large size-large wp-image-4478\" alt=\"\" srcset=\"https:\/\/i0.wp.com\/cyberenso.jp\/wp-content\/uploads\/2021\/07\/Solar-winds-2.png?w=1830&amp;ssl=1 1830w, https:\/\/i0.wp.com\/cyberenso.jp\/wp-content\/uploads\/2021\/07\/Solar-winds-2.png?resize=300%2C139&amp;ssl=1 300w, https:\/\/i0.wp.com\/cyberenso.jp\/wp-content\/uploads\/2021\/07\/Solar-winds-2.png?resize=1024%2C473&amp;ssl=1 1024w, https:\/\/i0.wp.com\/cyberenso.jp\/wp-content\/uploads\/2021\/07\/Solar-winds-2.png?resize=768%2C355&amp;ssl=1 768w, https:\/\/i0.wp.com\/cyberenso.jp\/wp-content\/uploads\/2021\/07\/Solar-winds-2.png?resize=1536%2C710&amp;ssl=1 1536w, https:\/\/i0.wp.com\/cyberenso.jp\/wp-content\/uploads\/2021\/07\/Solar-winds-2.png?resize=260%2C120&amp;ssl=1 260w, https:\/\/i0.wp.com\/cyberenso.jp\/wp-content\/uploads\/2021\/07\/Solar-winds-2.png?resize=50%2C23&amp;ssl=1 50w, https:\/\/i0.wp.com\/cyberenso.jp\/wp-content\/uploads\/2021\/07\/Solar-winds-2.png?resize=150%2C69&amp;ssl=1 150w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Figure: The role of ZSP \/ JITA in containing attacker lateral movement<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-0e4a374 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"0e4a374\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-059a87b\" data-id=\"059a87b\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8069f11 elementor-widget elementor-widget-text-editor\" data-id=\"8069f11\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>Reference: <span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"https:\/\/www.remediant.com\/blog\/the-role-of-admin-credentials-in-the-solarwinds-attack\">https:\/\/www.remediant.com\/blog\/the-role-of-admin-credentials-in-the-solarwinds-attack<\/a><\/span><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>I wanted to share my thoughts on the SolarWinds attack that has been used to target government agencies as well as other private\/public companies. FireEye has an excellent write-up ( Highly Evasive Attacker Leverages SolarWinds Supply Chain to CompromiseMultiple Global Victims With SUNBURST Backdoor\u00a0) and I encourage everyone to read it to familiarize yourself with the exploit and attack paths.<span class=\"excerpt-hellip\"> [\u2026]<\/span><\/p>\n","protected":false},"author":1,"featured_media":4501,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6,12],"tags":[],"class_list":["post-4474","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-latest_news","category-read_article"],"acf":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/cyberenso.jp\/wp-content\/uploads\/2020\/12\/login-1203603_1280.png?fit=1280%2C720&ssl=1","_links":{"self":[{"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/posts\/4474"}],"collection":[{"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/comments?post=4474"}],"version-history":[{"count":18,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/posts\/4474\/revisions"}],"predecessor-version":[{"id":5056,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/posts\/4474\/revisions\/5056"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/media\/4501"}],"wp:attachment":[{"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/media?parent=4474"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/categories?post=4474"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/tags?post=4474"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}