IoC Results: DHS Emergency Directive 21-01 - SolarWinds v1.2 - superseded
Log In or Register to download the BES file, and more.

1 Votes


Description

https://cyber.dhs.gov/ed/21-01/

Parse scan results from BES Client\BPS-Scans\ED21-01

v1.1: Additional sha256 hashes

v1.1: Additional sha256 hashes provided by  https://msrc-blog.microsoft.com/2020/12/13/customer-guidance-on-recent-nation-state-cyber-attacks/

 

Emergency Directive 21-01

December 13, 2020

Mitigate SolarWinds Orion Code Compromise

This page contains a web-friendly version of the Cybersecurity and Infrastructure Security Agency’s Emergency Directive 21-01, “Mitigate SolarWinds Orion Code Compromise”.

Section 3553(h) of title 44, U.S. Code, authorizes the Secretary of Homeland Security, in response to a known or reasonably suspected information security threat, vulnerability, or incident that represents a substantial threat to the information security of an agency, to “issue an emergency directive to the head of an agency to take any lawful action with respect to the operation of the information system, including such systems used or operated by another entity on behalf of an agency, that collects, processes, stores, transmits, disseminates, or otherwise maintains agency information, for the purpose of protecting the information system from, or mitigating, an information security threat.” 44 U.S.C. § 3553(h)(1)–(2)

Section 2205(3) of the Homeland Security Act of 2002, as amended, delegates this authority to the Director of the Cybersecurity and Infrastructure Security Agency. 6 U.S.C. § 655(3).

Federal agencies are required to comply with these directives. 44 U.S.C. § 3554 (a)(1)(B)(v)

These directives do not apply to statutorily-defined “national security systems” nor to systems operated by the Department of Defense or the Intelligence Community. 44 U.S.C. § 3553(d), (e)(2), (e)(3), (h)(1)(B).


Background

SolarWinds Orion products (affected versions are 2019.4 through 2020.2.1 HF1) are currently being exploited by malicious actors. This tactic permits an attacker to gain access to network traffic management systems. Disconnecting affected devices, as described below in Required Action 2, is the only known mitigation measure currently available.

CISA has determined that this exploitation of SolarWinds products poses an unacceptable risk to Federal Civilian Executive Branch agencies and requires emergency action. This determination is based on:

  • Current exploitation of affected products and their widespread use to monitor traffic on major federal network systems;

  • High potential for a compromise of agency information systems;

  • Grave impact of a successful compromise.

CISA understands that the vendor is working to provide updated software patches. However, agencies must wait until CISA provides further guidance before using any forthcoming patches to reinstall the SolarWinds Orion software in their enterprise.

Please refer to the MITRE ATT&CK framework for possible tactics the threat actors are using to maintain persistence in the environment.

Required Actions

This emergency directive requires the following actions:

  1. Agencies that have the expertise to take the following actions immediately must do so before proceeding to Action 2. Agencies without this capability shall proceed to Action 2.

    a. Forensically image system memory and/or host operating systems hosting all instances of SolarWinds Orion versions 2019.4 through 2020.2.1 HF1]. Analyze for new user or service accounts, privileged or otherwise.

    b. Analyze stored network traffic for indications of compromise, including new external DNS domains to which a small number of agency hosts (e.g., SolarWinds systems) have had connections.

  1. Affected agencies shall immediately disconnect or power down SolarWinds Orion products, versions 2019.4 through 2020.2.1 HF1, from their network. Until such time as CISA directs affected entities to rebuild the Windows operating system and reinstall the SolarWinds software package, agencies are prohibited from (re)joining the Windows host OS to the enterprise domain. Affected entities should expect further communications from CISA and await guidance before rebuilding from trusted sources utilizing the latest version of the product available. Additionally:

    a. Block all traffic to and from hosts, external to the enterprise, where any version of SolarWinds Orion software has been installed.

    b. Identify and remove all threat actor-controlled accounts and identified persistence mechanisms.

  1. By 12pm Eastern Standard Time on Monday December 14, 2020 agencies shall report as an incident to CISA (at https://us-cert.cisa.gov/report) the existence of any of the following:

    a. [SolarWinds.Orion.Core.BusinessLayer.dll] with a file hash of [b91ce2fa41029f6955bff20079468448]

    b. [C:\WINDOWS\SysWOW64\netsetupsvc.dll]

    c. Other indicators related to this issue to be shared by CISA

  1. After (and only after) all threat actor-controlled accounts and identified persistence mechanisms have been removed:

    a. Treat all hosts monitored by the SolarWinds Orion monitoring software as compromised by threat actors and assume that further persistence mechanisms have been deployed.

    b. Rebuild hosts monitored by the SolarWinds Orion monitoring software using trusted sources.

    c. Reset all credentials used by or stored in SolarWinds software. Such credentials should be considered compromised.

    d. Take actions to remediate kerberoasting, including, as necessary or appropriate, engaging with a 3rd party with experience eradicating APTs from enterprise networks. For Windows environments, refer to the following:

  2. By 12pm Eastern Standard Time on Monday December 14, 2020, submit a report to CISA using the provided template. Department-level Chief Information Officers (CIOs) or equivalents must submit completion reports attesting to CISA that the affected devices were either disconnected or powered down.

These requirements apply to any agency network utilizing the SolarWinds Orion product. This includes any information system used or operated by another entity on behalf of an agency, that collects, processes, stores, transmits, disseminates, or otherwise maintains agency information.

CISA Actions

  • CISA will continue to work with our partners to monitor for active exploitation associated with this vulnerability. CISA will release additional indicators of compromise as they become available.

  • CISA will provide additional guidance to agencies via the CISA website, through an emergency directive issuance coordination call, and through individual engagements upon request (via CyberDirectives@cisa.dhs.gov).

Duration

This emergency directive remains in effect until all agencies have applied the forthcoming patch or the directive is terminated through other appropriate action.

Additional Information

Frequently Asked Questions

Answers to common questions appear below.

What does the directive mean by “expertise”?

By “expertise”, we mean that you have staff or supporting personnel that are properly trained in taking a forensic image of system memory and have tooling readily-available to immediately do so.


Property Details

ID2998621
StatusAlpha - Code that was just developed
TitleIoC Results: DHS Emergency Directive 21-01 - SolarWinds v1.2
DomainBESC
KeywordsSolar Winds Orion ED21-01 SolarWinds.Orion.Core.BusinessLayer.dll DHS Sunburst
Added by on 12/14/2020 12:44:07 PM
Last Modified by on 12/14/2020 12:44:27 PM
Counters 349 Views / 18 Downloads
User Rating 1 star 2 star 3 star 4 star 5 star * Average over 0 ratings. ** Log In or Register to add your rating.

Properties

ED-21-01 - Scan Results Exist
Period Every Report
 
  * Results in a true/false
Show indented relevance
exists files "BPS-Scans\ED21-01\file_listing.txt" of storage folder of client
ED-21-01 - Scan Completion Time
Period Every Report
 
  * Results in a true/false
Show indented relevance
modification times of files "BPS-Scans\ED21-01\file_listing.txt" whose (locked line (number of locked lines of it) of it starts with "SCAN_COMPLETE") of storage folder of client
ED-21-01 - Detected Results
Period Every Report
 
  * Results in a true/false
Show indented relevance
(if it as lowercase contains "netsetupsvc.dll" then concatenation "|" of (pathname of it; size of it as string; modification time of it as string; version of it as string | "version not detected"; md5 of it | "md5 not detected"; sha1 of it | "sha1 not detected"; sha256 of it | "sha256 not detected") of file "netsetupsvc.dll" of system wow64 folder else (if it contains "SolarWinds.Orion.Core.BusinessLayer.dll" and (sha1 of it = "76640508b1e7759e548771a5359eaed353bf1eec" OR sha256 of it is contained by set of ("019085a76ba7126fff22770d71bd901c325fc68ac55aa743327984e89f4b0134";"292327e5c94afa352cc5a02ca273df543f2020d0e76368ff96c84f4e90778712";"32519b85c0b422e4656de6e6c41878e95fd95026267daab4215ee59c107d6c77";"38385a81664ce562a6777fa4564ae7b93f38f1224e1206550136e2b6b5dbb9dd";"53f8dfc65169ccda021b72a62e0c22a4db7c4077f002fa742717d41b3c40f2c7";"a25cadd48d70f6ea0c4a241d99c5241269e6faccb4054e62d16784640f8e53bc";"ac1b2b89e60707a20e9eb1ca480bc3410ead40643b386d624c5d21b47c02917c";"ad2fbf4add71f61173975989d1a18395afb8538ed889012b9d2e21c19e98bbd1";"c09040d35630d75dfef0f804f320f8b3d16a481071076918e9b236a321c1ea77";"c15abaf51e78ca56c0376522d699c978217bf041a3bd3c71d09193efa5717c71";"c20fd967d64e9722d840ec4292645b65896d0ee3ebe31090e15c5312d889c89e";"ce77d116a074dab7a22a0fd4f2c1ab475f16eec42e1ded3c0b0aa8211fe858d6";"d0d626deb3f9484e649294a8dfa814c5568f846d5aa02d4cdad5d041a29d5600";"d3c6785e18fba3749fb785bc313cf8346182f532c59172b69adfb31b96a5d0af";"dab758bf98d9b36fa057a66cd0284737abf89857b73ca89280267ee7caf62f3b";"eb6fab5a2964c5817fb239a7a5079cabca0a00464fb3e07155f28b0a57a2c0ed") OR md5 of it = "b91ce2fa41029f6955bff20079468448" ) of file (it as string) then concatenation "|" of (pathname of it; size of it as string; modification time of it as string; version of it as string | "version not detected"; md5 of it | "md5 not detected"; sha1 of it | "sha1 not detected";sha256 of it | "sha256 not detected") of file (it) else nothing) ) of locked lines whose (it does not start with "SCAN_COMPLETED") of files "BPS-Scans\ED21-01\file_listing.txt" of storage folder of client

Relevance

Used in 9 fixlets and 14 analyses   * Results in a true/false
Show indented relevance
windows of operating system AND (if exists property "in proxy agent context" then not in proxy agent context else true)

Sharing

Social Media:
Share this page on Yammer

Comments

Log In or Register to leave comments!
JasonWalker -
Corrected a false-negative due to references to file results that are redirected to 32-bit paths. Now use the 'native file' inspector to obtain the true path.
JasonWalker -
v1.2 - More sha256 hashes added to the check
JasonWalker -
Detect additional sha256 hashes provided at https://msrc-blog.microsoft.com/2020/12/13/customer-guidance-on-recent-nation-state-cyber-attacks/