January 15, 2021 Breach

On December 13, 2020, the cybersecurity world was confronted with one of the most sophisticated and far-reaching supply chain attacks ever documented. FireEye, one of the world's leading cybersecurity firms, disclosed that attackers had compromised SolarWinds' Orion IT monitoring platform by inserting a backdoor — later named SUNBURST — into software updates distributed to approximately 18,000 organizations. The attackers, subsequently attributed to Russia's Foreign Intelligence Service (SVR) and tracked as APT29 (also known as Cozy Bear), had maintained undetected access for over nine months. The SolarWinds attack fundamentally changed how the industry thinks about supply chain risk and third-party risk management.

How the Attack Worked

The attackers compromised SolarWinds' software build process, injecting malicious code into the Orion software platform's update mechanism. The SUNBURST backdoor was embedded in a digitally signed component of the Orion software — SolarWinds.Orion.Core.BusinessLayer.dll — making it appear legitimate and trusted. When customers installed Orion updates between March and June 2020 (versions 2019.4 HF 5 through 2020.2.1), they unknowingly deployed the backdoor into their own environments.

Once installed, SUNBURST remained dormant for approximately two weeks before activating. It then communicated with command-and-control servers using DNS queries disguised as legitimate SolarWinds API traffic. The malware performed reconnaissance on the victim's environment and, for high-value targets, the attackers deployed additional tools including a secondary backdoor called TEARDROP and a custom Cobalt Strike payload to deepen their access.

Impact Category Details
Organizations That Installed Compromised Updates Approximately 18,000
Organizations Actively Targeted for Follow-on Activity Estimated 100–250 (per Microsoft analysis)
Dwell Time Before Discovery Over 9 months (March – December 2020)
U.S. Government Agencies Compromised Treasury, Commerce (NTIA), DHS, State, NIH, and others
Discovery December 8, 2020 (FireEye); public disclosure December 13, 2020

Discovery by FireEye

The attack was discovered by FireEye (now Mandiant) on December 8, 2020, when the company detected that its own Red Team assessment tools had been stolen. During the investigation into this theft, FireEye's analysts identified the SUNBURST backdoor in the SolarWinds Orion software installed in their environment. FireEye immediately notified SolarWinds, law enforcement, and the Cybersecurity and Infrastructure Security Agency (CISA).

On December 13, 2020, CISA issued Emergency Directive 21-01, ordering all federal civilian agencies to immediately disconnect or power down SolarWinds Orion products. This was only the fifth emergency directive CISA had ever issued, underscoring the severity of the threat.

Government and Private Sector Impact

The scope of the compromise was staggering. Confirmed victims included the U.S. Department of the Treasury, the National Telecommunications and Information Administration (NTIA) within the Department of Commerce, the Department of Homeland Security, the State Department, the National Institutes of Health, and parts of the Pentagon. Microsoft confirmed it was also compromised and that the attackers had accessed some of its source code repositories, though Microsoft stated that no customer data or production services were affected.

In the private sector, victims included major technology companies, consulting firms, and telecommunications providers. The attackers demonstrated exceptional operational discipline, selectively pursuing targets of intelligence value and carefully covering their tracks.

TPRM Lesson Learned: The SolarWinds attack exposed the fundamental limitation of traditional vendor risk assessments: a vendor can pass every security questionnaire, hold every certification, and maintain robust controls, yet still unknowingly deliver compromised software to its customers. Supply chain attacks weaponize the trust relationship between vendors and customers. Effective TPRM must extend beyond assessing a vendor's current security posture to evaluating the integrity of their software development lifecycle, build processes, code signing practices, and update distribution mechanisms. Organizations should also implement detection capabilities for anomalous behavior from trusted vendor software, because the next supply chain attack will also arrive through a digitally signed, legitimate-looking update.

The Supply Chain Trust Problem

SolarWinds Orion was widely deployed precisely because it was a trusted, well-established IT monitoring tool. Organizations allowed it deep network access because monitoring tools, by their nature, require broad visibility. The attackers understood this and specifically targeted a product that would give them wide access once compromised.

This creates a paradox for third-party risk management: the most deeply integrated and highly privileged vendor tools are both the most valuable to attackers and the most trusted by defenders. Traditional TPRM approaches that focus on vendor questionnaires and annual assessments are insufficient to address this risk. The SolarWinds attack demonstrated the need for:

Regulatory and Industry Response

The SolarWinds attack catalyzed significant policy and regulatory changes. In May 2021, President Biden signed Executive Order 14028, "Improving the Nation's Cybersecurity," which included requirements for software supply chain security, SBOMs, and enhanced security practices for software sold to the federal government. CISA developed Secure Software Development Framework guidelines, and the National Institute of Standards and Technology (NIST) updated its cybersecurity supply chain risk management guidance.

For TPRM practitioners, the SolarWinds attack established that software supply chain risk is not a theoretical concern but an active, demonstrated threat vector. FAIR-based risk quantification can help organizations model the potential impact of supply chain compromises and justify investments in advanced detection, vendor software verification, and supply chain resilience.

Protect Your Organization from Third-Party Risk

Fair TPRM is a free, open-source platform for vendor risk management, GRC compliance, and FAIR risk quantification.

Free Demo Download Source

Sources & References

  1. Highly Evasive Attacker Leverages SolarWinds Supply Chain to Compromise Multiple Global Victims With SUNBURST Backdoor - FireEye/Mandiant, December 2020
  2. Emergency Directive 21-01: Mitigate SolarWinds Orion Code Compromise - CISA, December 2020
  3. Analyzing Solorigate: The compromised DLL file that started a sophisticated cyberattack - Microsoft Security Blog, December 2020
  4. Executive Order 14028: Improving the Nation's Cybersecurity - The White House, May 2021
  5. SolarWinds Security Advisory - SolarWinds Corporation