SolarWinds malware has “curious” ties to Russian-speaking hackers

A stylized skull and crossbones made out of ones and zeroes.

The malware used to hack Microsoft, safety firm FireEye, and no less than a half-dozen federal businesses has “fascinating similarities” to malicious software program that has been circulating since no less than 2015, researchers stated on Monday.

Sunburst is the title safety researchers have given to malware that infected about 18,000 organizations after they put in a malicious replace for Orion, a community administration instrument bought by Austin, Texas-based SolarWinds. The unknown attackers who planted Sunburst in Orion used it to install additional malware that burrowed additional into choose networks of curiosity. With infections that hit the Departments of Justice, Commerce, Treasury, Power, and Homeland Safety, the hack marketing campaign is among the many worst in fashionable US historical past.
The Nationwide Safety Company, the FBI, and two different federal businesses last week stated that the Russian authorities was “probably” behind the assault, which started no later than October 2019. Whereas a number of information sources, citing unnamed officers, have reported the intrusions had been the work of the Kremlin’s SVR, or Overseas Intelligence Service, researchers proceed to search for proof that definitively proves or disproves the statements.

Sort of suspicious

On Monday, researchers from Moscow-based safety firm Kaspersky Lab reported “curious similarities” within the code of Sunburst and Kazuar, a chunk of malware that first came to light in 2017. Kazuar, researchers from safety agency Palo Alto Networks stated then, was used alongside identified instruments from Turla, one of many world’s most advanced hacking groups, whose members communicate fluent Russian.

In a report published on Monday, Kaspersky Labs researchers stated they discovered no less than three similarities within the code and capabilities of Sunburst and Kazuar. They’re:

  • The algorithm used to generate the distinctive sufferer identifiers
  • The algorithm used to make the malware “sleep,” or delay taking motion, after infecting a community, and
  • Intensive use of the FNV-1a hashing algorithm to obfuscate code.

“It ought to be pointed [out] that none of those code fragments are 100% similar,” Kaspersky Lab researchers Gregory Kucherin, Igor Kuznetsov, and Costin Raiu wrote. “Nonetheless, they’re curious coincidences, to say [the] least. One coincidence wouldn’t be that uncommon, two coincidences would definitively increase an eyebrow, whereas three such coincidences are type of suspicious to us.”

Monday’s publish cautions towards drawing too many inferences from the similarities. They may imply that Sunburst was written by the identical builders behind Kazuar, however they may even be the results of an try and mislead investigators concerning the true origins of the SolarWinds provide chain assault, one thing researchers name a false flag operation.

Different potentialities embody a developer who labored on Kazuar and later went to work for the group creating Sunburst, the Sunburst builders reverse engineering Kazuar and utilizing it as inspiration, or builders of Kazuar and Sunburst acquiring their malware from the identical supply.

The Kaspersky Lab researchers wrote:

In the mean time, we have no idea which considered one of these choices is true. Whereas Kazuar and Sunburst could also be associated, the character of this relation continues to be not clear. By additional evaluation, it’s doable that proof confirming one or a number of of those factors would possibly come up. On the similar time, it’s also doable that the Sunburst builders had been actually good at their opsec and didn’t make any errors, with this hyperlink being an elaborate false flag. In any case, this overlap doesn’t change a lot for the defenders. Provide chain assaults are among the most subtle kinds of assaults these days and have been efficiently used prior to now by APT teams comparable to Winnti/Barium/APT41 and numerous cybercriminal teams.

Federal officers and researchers have stated that it might take months to know the complete influence of the months-long hacking marketing campaign. Monday’s publish known as on different researchers to additional analyze the similarities for extra clues about who’s behind the assaults.

Recent Articles

Related Stories

Stay on op - Ge the daily news in your inbox