

#SOLARWINDS SECURITY VULNERABILITY DOWNLOAD#
While the automated, initial malware execution is a critical initial step to understand, the behavior was pre-configured for the malware and included the download of further payloads and the connection to domain-generation-algorithm (DGA) based subdomains of avsvmcloudcom.


These stages are also near-impossible to predict, as they are driven by the attacker’s intentions and goals for each individual victim at this stage – making the use of signatures, threat intelligence or static use cases virtually useless. This post-exploitation part of the attack is much more varied and stealthy. We want to focus on the most sophisticated details of the hands-on intrusion that in many cases followed the initial automated attack. Cyber AI Analyst saves critical time for security teams, and its results should be treated with a high priority during this period of vigilance. Using a self-learning approach is the best possible mechanism to catch an attacker who gains access into your systems using a degree of stealth so as to not trigger signature-based detection.Ī number of these models may fire in combination with other models in order to make a strong detection over a time-series – and this is exactly where Darktrace’s autonomous incident triage capability, Cyber AI Analyst, plays a crucial role in investigating the alerts on behalf of security teams. The technology automatically clusters devices into ‘peer groups’, allowing it to detect cases of an individual device behaving unusually. These examples stress the value of self-learning Cyber AI capable of understanding the evolving normal ‘patterns of life’ within an enterprise – as opposed to a signature-based approach that looks at historical data to predict today’s threat.Īs Darktrace detects device activity patterns rather than known malicious signatures, detecting use of these techniques will fall into the scope of Darktrace’s capabilities without further need for configuration. This is not an example of a SolarWinds compromise, but examples of anomalous behaviors we can expect to see from this type of breach. In what follows, we explore a set of Darktrace detections that highlight and alert security teams to the types of behaviors related to this breach. However, SolarWinds is an IT discovery tool that is used by a significant number of Darktrace customers.
#SOLARWINDS SECURITY VULNERABILITY SOFTWARE#
Malware installed during software updates in March 2020 has allowed advanced attackers to gain unauthorized access to files that may include customer data and intellectual property.ĭarktrace does not use SolarWinds, and its operations remain unaffected by this breach. The SUNBURST malware attacks against SolarWinds have heightened companies’ concerns about the risk to their digital environments. For a high-level explanation of the SolarWinds hack, watch our video below.
