It looks like the SolarWinds hackers had even more tricks up their sleeve.
Microsoft and FireEye on Thursday revealed three more malware strains associated with the suspected Russian perpetrators who breached SolarWinds’ Orion software and used its update to infect federal agencies and major companies.
Microsoft said the strains join the previously known SolarWinds hacker tools Sunburst and Teardrop. The traits the new malware strains exhibit are yet more evidence that the hackers behind that breach are, in fact, notably sophisticated — a term often affixed to virtually any hacking group by their victims.
“They are tailor-made for specific networks and are assessed to be introduced after the actor has gained access through compromised credentials or the SolarWinds binary and after moving laterally with TEARDROP and other hands-on-keyboard actions,” Microsoft wrote.
While FireEye couldn’t conclusively verify the connection between Sunshuttle and the SolarWinds hackers, it observed it in the network of a victim of that group, among other links.
Sunshuttle “is a sophisticated second-stage backdoor that demonstrates straightforward but elegant detection evasion techniques,” FireEye wrote.
Likewise, the malware strains Microsoft wrote about exhibited stealthiness.
“Microsoft assesses that the newly surfaced pieces of malware were used by the actor to maintain persistence and perform actions on very specific and targeted networks post-compromise, even evading initial detection during incident response,” according to the blog post.
There also are some overlapping time frames. Microsoft saw the strains active from August to September in customer networks, although the infections may have been on systems as early as June. FireEye said someone uploaded Sunshuttle to a public malware repository in August.
Corrected, 3/4/2021: to include the right number of malware strains.
The post Researchers uncover three more malware strains linked to SolarWinds hackers appeared first on CyberScoop.
Go to Source of this post
Author Of this post: Tim Starks