Microsoft blocks customer access to malicious SolarWinds binaries

The firm has moved to quarantine potential threats as reports emerge of the role of Microsoft 365 in the devastating breach

SolarWinds logo on the side of a building

Microsoft is quarantining certain compromised SolarWinds binaries related to the Orion Platform in its security products following the revelation of the devastating supply chain cyber attack by state-backed hackers

The Orion Platform binaries can be used by cyber criminals to remotely access corporate devices, Microsoft explained in a blog post, leaving them susceptible to the attack it has dubbed 'Solorigate'. 

The firm has, as a result, started blocking the known SolarWinds binaries in its Microsoft Defender Antivirus platform. This will quarantine the binary even if the process is running, which may cause complications for customers running the SolarWinds platform as it’s a server product.

The firm had previously releasing detections alerting users to the presence of these binaries, with the recommendation to isolate and investigate the devices in question. It seems these measures, however, aren’t strong enough relative to the scale and severity of the threat.

Compromised versions of SolarWinds Orion released between March and June 2020 contained the strain of malware that Microsoft has dubbed Solorigate, leading to the infiltration of thousands of organisations. 

FireEye was the first company that detected it had been compromised by state-backed hackers, and only after closer examination did the company find the hackers had a backdoor into SolarWinds. It has since emerged that at least 18,000 SolarWinds customers have been potentially compromised as part of the attack, including massive corporations and US government agencies.

The move comes as a Securities and Exchange Commission (SEC) filing revealed that the Microsoft Office 365 accounts of SolarWinds employees were broken into. The firm suggested, according to this filing, that it was aware of an attack vector used to compromise the company’s emails, with this intrusion also granting attackers access to other data contained in its Microsoft-developed productivity suite.

While Microsoft’s role in the attack may now fall under some scrutiny, this particular compromise warrants further investigation and it’s not yet conclusive as to whether the breach played a role on the attack on the Orion platform. 

A coalition of tech companies including Microsoft, meanwhile, has acted to seize a domain that played a key part in the original cyber attack, according to ZDNet.

The group seized the domain serving as the command and control server for the Solorigate malware distributed to the compromised targes swept up in the hack. This has been described as “protective work” to prevent the attackers from delivering new orders to infected systems.

Featured Resources

Choosing a collaboration platform

Eight questions every IT leader should ask

Download now

Performance benchmark: PostgreSQL/ MongoDB

Helping developers choose a database

Download now

Customer service vs. customer experience

Three-step guide to modern customer experience

Download now

Taking a proactive approach to cyber security

A complete guide to penetration testing

Download now

Recommended

HackBoss malware is using Telegram to steal cryptocurrency from other hackers
cryptocurrencies

HackBoss malware is using Telegram to steal cryptocurrency from other hackers

16 Apr 2021
What is cyber warfare?
Security

What is cyber warfare?

23 Mar 2021
A guide to cyber security certification and training
Careers & training

A guide to cyber security certification and training

22 Apr 2021
What is hacktivism?
hacking

What is hacktivism?

22 Apr 2021

Most Popular

REvil threatens to release Apple’s hardware schematics
ransomware

REvil threatens to release Apple’s hardware schematics

21 Apr 2021
How to find RAM speed, size and type
Laptops

How to find RAM speed, size and type

8 Apr 2021
Samsung Galaxy S21 Ultra review: Ultra in every sense of the word
Mobile Phones

Samsung Galaxy S21 Ultra review: Ultra in every sense of the word

22 Apr 2021