Back to Results
Government & JudiciaryIncident Response
Judiciary Branch Response: SolarWinds Supply Chain Attack
The Challenge
In 2019, a specialized operator at the judiciary branch reached out for urgent consultation regarding a suspected cyber incident. Initial joint analysis of system logs revealed the presence of the SolarWinds supply chain attack, a sophisticated breach that compromised trusted software updates to infiltrate sensitive networks. The immediate challenge was to assess the extent of the compromise and prevent data exfiltration.
The Solution
Upon enumerating the attack vector, a comprehensive response strategy was implemented, adhering to expert-recommended phases:
- Forensic Preservation: We prioritized the preservation of SolarWinds Orion servers to enable detailed forensic examination. This involved a meticulous review of all accounts used by SolarWinds Orion and local accounts on the server operating system.
- Containment: Rigorous containment procedures were deployed to stop the lateral spread of the backdoor. This included the immediate isolation and removal of compromised accounts and affected systems from the core network.
- Eradication: Detailed eradication steps were followed to purge the backdoor from the environment. This entailed restoring systems to a known clean state and verifying the complete elimination of all malicious traces.
- Recovery: A trusted recovery process was executed to rebuild the network infrastructure. Operations were restored by reinstalling operating systems, reimaging servers for production use, and reconfiguring network settings with heightened security postulates.
The Results
- Successful Containment: effectively stopped the spread of the backdoor, protecting critical judicial data.
- Operational Recovery: Fully restored network operations through valid re-imaging and configuration.
- Future-Proofing: Organizations were advised to consider long-term implications, leading to the implementation of stronger supply chain security measures and regular third-party vendor audits to prevent future breaches.
Impact Metrics
< 24 Hours
Threat ID Time
100%
System Recovery
Preserved
Data Integrity
