“It’s not realistic to not depend on any third parties,” says Katie Nickels, director of intelligence at the security firm Red Canary. “It’s just not realistic the way any network is run. But what we saw for the first week or two, even after the initial SolarWinds revelations, was some organizations just trying to figure out whether they even use SolarWinds products. So I think the shift has to be to knowing those dependencies and understanding how they should and shouldn’t be interacting.”SolarWinds emphasizes that, unlike the Russian hackers, who used their access to SolarWinds to infiltrate targets, the Chinese hackers exploited the vulnerability only after already breaking into a network by some other means. They then used the flaw to bore deeper. “We are aware of one instance of this happening, and there is no reason to believe these attackers were inside the SolarWinds environment at any time,” the company said in a statement. “This is separate from the broad and sophisticated attack that targeted multiple software companies as vectors."
A USDA spokesperson said in a statement that the agency removed SolarWinds Orion products from its networks in December per an emergency directive from the Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency. “While we continue to look into it, we have no evidence of a data breach of the USDA National Finance Center,” the spokesperson said. The ubiquity of software like Microsoft Windows or, until recently, Adobe Flash makes them popular targets for a wide variety of hackers. As a company that’s more than two decades old and has a big customer base—including a large number of government contracts in the United States and abroad—SolarWinds makes perfect sense for hackers to prod. But SolarWinds is also just one of a multitude of enterprise tools and IT management services that companies need to run constantly and simultaneously. Each represents a potential inroad for attackers.
“I’ve got hundreds of different vendors we use, from Microsoft to Box, Zoom, Slack, and so on. It only takes one,” says Marcin Kleczynski, CEO of the antivirus maker Malwarebytes, which disclosed in January that it had been a victim of the suspected Russian hacking spree. “It’s a catch-22. Rely on one vendor and you’re screwed if they get hit. Rely on multiple and all it takes is one. Rely on the big brands and deal with the consequences that they’re the most targeted. Rely on the small brands and deal with the consequences that they’re not yet investing in security.”
Malwarebytes is illustrative of that tension in another key way; the Russian hackers who compromised it got in through a method other than SolarWinds. Brandon Wales, acting director of CISA, told The Wall Street Journal in January that the hackers “gained access to their targets in a variety of ways.” You can defend your treasure by hiding it in a castle on a mountain surrounded by a big wall and an alligator-filled moat, or you can scatter it around the world in strong but inconspicuous lockboxes. Both approaches invite their own set of risks.
Turn On Auto-Updates Everywhere You Can