In this post, we track news reports on the actual breach of SolarWinds that allowed the attackers to implant SUNBURST into Orion.

Dec 21, 2020

SolarWinds appears to have had a lax attitude towards product security (1). Former employees seem to claim that given the lack of focus on security a breach of SolarWinds was inevitable.

Jan 6, 2021

SolarWinds used software (TeamCity) from a Czech company called JetBrains (2). The software is used to manage software builds (Note that SUNBURST was inserted into Orion during the build process).

Further, JetBrains’ founders and current CEO are of Russian origin (3). The company maintains multiple offices in Russia (4) - Moscow, St. Petersburg, Novosibirsk - making the company susceptible to pressure from the Russian government.

The New York Times (5) and Reuters (6)report that investigators are looking into TeamCity.

At this time, the evidence against JetBrains is circumstantial at best. None of SolarWinds, CISA, or FBI have identified JetBrains as the source of the SolarWinds breach. So far, no technical information regarding the use of TeamCity for the breach has been made available.

Feb 2, 2021

SolarWinds uses the Microsoft Office 365 suite for email. As per (7, 8), UNC2452 had compromised at least one Office 365 email account by December 2019 and perhaps even earlier than that. While uncofirmed, email could have been the initial mechanism used to compromise SolarWinds.

Feb 3, 2021

In a blog post (9), SolarWinds’ CEO did not emphasize Office 365 as the initial vector of attack. Instead, the CEO claimed that a zero-day or a (un-named) third-party application was most likely responsible for the initial breach of SolarWinds.

However, given that SolarWinds Orion had atleast three serious vulnerabilities (SUNBURST discovered by FireEye, and two other vulnerabilities discovered by Trustwave) the claims by former SolarWinds employees of lax security appear credible. With poor security, an attacker would not need a zero-day to breach SolarWinds.

Feb 23, 2021

SolarWinds declares that it can not confirm whether TeamCity had any role in the SolarWinds breach 10.

Feb 26, 2021

SANS 11 confirms that TeamCity’s role in the SolarWinds breach has not been established and may have been a false alarm.

Apr 15, 2021

See the post at 12 for additional information.

References