
The incident that was initially called “the SolarWinds hack,” but whose scope has steadily increased as we’ve learned more about it, is significant enough that it’s safe to say books will be written about it. Some of them may wind up as bestsellers. More properly described as a constellation of events rather than one, it offers a lot of lessons for everyone involved in information security; whatever your particular area of interest, there’s likely to be some part of the constellation that is pertinent. At DomainTools, not surprisingly, the infrastructure used by the adversary for command and control is of particular interest. Joe Slowik from our research team has written several excellent blogs on it, and the timeline below comes from one of those.

On a panel discussion I participated in shortly after the news broke in December, the question arose as to whether threat hunting could have uncovered this incursion in its earliest stages. The consensus was that it couldn’t have, but I was not convinced. I decided to convene a panel of our own to explore this and related questions about what reasonable expectations should be around the potential for hunting to discover supply chain breaches.
My co-panelists for the DomainTools discussion were Joe, his research team colleague Chad Anderson, and Lead Sales Engineer Taylor Wilkes-Pierce. Each of these three brings a valuable perspective on various threat hunting methods. We explored four main areas:
There was a fifth question as well, which came up during our audio check before the webinar: what can teams do to make sure their build systems are clean? More on that at the end of this post.
On the first point—what type of hunting teams should be doing now if they’re unsure of whether they’ve been compromised by the SolarWinds-related incursion—there were a few major points that the panel identified:
The question about adversary infrastructure hunting, which is treated fairly extensively in the blogs by Joe referenced earlier, raised a couple of valuable points for hunters to consider:
One of the objectives of the panel discussion was embodied in our third question, about which techniques would give hunt teams (or any SOC personnel doing ad-hoc hunting) the best bang for the buck. There were a few suggestions here, some of which fall more into the category of setting oneself up for success in hunting, vs the hunting itself.
The fourth question posed was: could SUNBURST have been detected by conventional threat hunting methods? The consensus of our panel was yes, but a qualified yes. For one thing, we wanted to acknowledge that the adversary practiced extremely good opsec in this incursion. Hunt teams that didn’t discover this incursion independently (i.e. before indicator lists were published) have no cause for shame. At the same time, much of what we addressed during the discussion, such as network traffic analysis and monitoring of crown jewels assets, could reasonably have been expected to catch some of the signals of the incursion, even if these signals would not have told the team much about the nature of the event (absent external context given after the news broke widely).
Joe also touched on the importance of understanding what an adversary’s route into your environment would have to look like; this is where threat modeling can really inform a lot of valuable hunting activities. He further pointed out that identifying behaviors such as remote logon (particularly odd logon patterns) and other lateral movement signals is both important and broadly applicable, in that it can uncover a range of activities from state sponsored, genuine APT actions to commodity malware or ransomware.
The question that came up during our audio check before the webinar, and which was also asked in close paraphrase by an audience member was this: how does one go about ensuring that compromised or flat-out malicious binaries are not part of the pipeline? Chad offered that something like a Git commit pre-hook where everything is hashed and then submitted to another server that verifies that it was built as intended, could be one methodology. However, he also acknowledged that speed of development is at odds with measures such as this, so it’s important to make any such checking as seamless as possible.
There’s no doubt that SUNBURST and its related activities will continue to be in the news for a while, and that more organizations will yet discover that they have been affected. We salute the teams working hard to mitigate this and related incursions.