www.zdnet.com Open in urlscan Pro
2a04:4e42:4c::666  Public Scan

URL: https://www.zdnet.com/article/microsoft-and-industry-partners-seize-key-domain-used-in-solarwinds-hack/
Submission: On April 30 via api from CA — Scanned from CA

Form analysis 1 forms found in the DOM

<form class="c-smartSearch_form"><input aria-label="Search" placeholder="What are you looking for?" type="search" autocomplete="off" aria-autocomplete="list" aria-activedescendant="" aria-controls="c-searchSmartSearchResults" name="query" value="">
  <button type="submit"><span class="search-go">Go</span> <svg>
      <use xlink:href="#arrow-thin" aria-hidden="false"></use>
    </svg></button></form>

Text Content

/>
X

Trending
 * What is ChatGPT and why does it matter? Here's what you need to know
 * Apple sets June date for its biggest conference of 2023, with headset launch
   expected
 * What is Lemon8 and why is everyone talking about it on TikTok?
 * The best AI art generators: DALL-E 2 and other fun alternatives to try
 * ChatGPT's intelligence is zero, but it's a revolution in usefulness, says AI
   expert
 * 

 * ZDNET Recommends
 * Testing RFID blocking cards: Do they work? Do you need one?
 * This almost-great Raspberry Pi alternative is missing one key feature
 * This $75 dock turns your Mac Mini into a Mac Studio (sort of)
 * Samsung's Galaxy S23 Plus is the Goldilocks of Smartphones
 * 

 * Mobile World Congress 2023
 * Best massage chairs
 * Best iRobot vacuums
 * Best headphones for sleeping
 * Best smart treadmills
   

Tech
 * Gaming
 * Headphones
 * Laptops
 * Mobile Accessories
 * Networking
 * PCs
 * 

 * Printers
 * Smartphones
 * Smart Watches
 * Speakers
 * Streaming Devices
 * Streaming Services
 * 

 * Tablets
 * TVs
 * Wearables
 * 

 * Kitchen & Household
 * Office Furniture
 * Office Hardware & Appliances
 * Smart Home
 * Smart Lighting
 * Yard & Outdoors
   

Innovation
 * Artificial Intelligence
 * AR + VR
 * Cloud
 * Digital Transformation
 * Energy
 * 

 * Robotics
 * Sustainability
 * Transportation
 * Work Life
 * 

 * Accelerate your tech game Paid Content
 * How the New Space Race Will Drive Innovation
 * How the metaverse will change the future of work and society
 * 

 * Managing the Multicloud
 * The Future of the Internet
 * The New Rules of Work
 * The Tech Trends to Watch in 2023
   

Business
 * See all Business
 * Amazon
 * Apple
 * Developer
 * E-Commerce
 * 

 * Edge Computing
 * Enterprise Software
 * Executive
 * Google
 * Microsoft
 * 

 * Professional Development
 * Social Media
 * SMB
 * Windows
 * 

 * Digital transformation: Trends and insights for success
 * Software development: Emerging trends and changing roles
   

Security
 * See all Security
 * Cyber Threats
 * Password Manager
 * Ransomware
 * VPN
 * 

 * Cybersecurity: Let's get tactical
 * Securing the Cloud
   

Advice
 * Deals
 * How-to
 * Product Comparisons
 * Product Spotlights
 * Reviews
   

Buying Guides
 * See all Buying Guides
 * Best all-in-one computers
 * Best budget TVs
 * Best gaming CPUs
 * Best gaming laptops
 * Best gaming PCs
 * 

 * Best headphones
 * Best iPads
 * Best iPhones
 * Best laptops
 * Best large tablets
 * Best OLED TVs
 * 

 * Best robot vacuum mops
 * Best rugged tablets
 * Best Samsung phones
 * Best smart rings
 * Best smartphones
 * Best smartwatches
 * 

 * Best speakers
 * Best tablets
 * Best travel VPNs
 * Best TVs
 * Best VPNs
   

tomorrow belongs to those who embrace it today
 * Asia
 * Australia
 * Europe
 * India
 * United Kingdom
 * United States
   

 * ZDNET France
 * ZDNET Germany
 * ZDNET Korea
 * ZDNET Japan
   

Go

Most Popular



 * See all Topics
 * Finance
 * Education
 * Health
   

 * Special Features
 * ZDNET In Depth
 * ZDNET Recommends
   

 * Newsletters
 * Videos
 * Editorial Guidelines
   

 * Trending
   What is ChatGPT and why does it matter? Here's what you need to know Apple
   sets June date for its biggest conference of 2023, with headset launch
   expected What is Lemon8 and why is everyone talking about it on TikTok? The
   best AI art generators: DALL-E 2 and other fun alternatives to try ChatGPT's
   intelligence is zero, but it's a revolution in usefulness, says AI expert
   ZDNET Recommends Testing RFID blocking cards: Do they work? Do you need one?
   This almost-great Raspberry Pi alternative is missing one key feature This
   $75 dock turns your Mac Mini into a Mac Studio (sort of) Samsung's Galaxy S23
   Plus is the Goldilocks of Smartphones
   Mobile World Congress 2023 Best massage chairs Best iRobot vacuums Best
   headphones for sleeping Best smart treadmills

 * Tech
   Gaming Headphones Laptops Mobile Accessories Networking PCs
   Printers Smartphones Smart Watches Speakers Streaming Devices Streaming
   Services
   Tablets TVs Wearables
   Kitchen & Household Office Furniture Office Hardware & Appliances Smart Home
   Smart Lighting Yard & Outdoors

 * Innovation
   Artificial Intelligence AR + VR Cloud Digital Transformation Energy
   Robotics Sustainability Transportation Work Life
   Accelerate your tech game Paid Content How the New Space Race Will Drive
   Innovation How the metaverse will change the future of work and society
   Managing the Multicloud The Future of the Internet The New Rules of Work The
   Tech Trends to Watch in 2023

 * Business
   See all Business Amazon Apple Developer E-Commerce
   Edge Computing Enterprise Software Executive Google Microsoft
   Professional Development Social Media SMB Windows
   Digital transformation: Trends and insights for success Software development:
   Emerging trends and changing roles

 * Security
   
   
   See all Security Cyber Threats Password Manager Ransomware VPN
   Cybersecurity: Let's get tactical Securing the Cloud

 * Advice
   
   
   Deals How-to Product Comparisons Product Spotlights Reviews

 * Buying Guides
   See all Buying Guides Best all-in-one computers Best budget TVs Best gaming
   CPUs Best gaming laptops Best gaming PCs
   Best headphones Best iPads Best iPhones Best laptops Best large tablets Best
   OLED TVs
   Best robot vacuum mops Best rugged tablets Best Samsung phones Best smart
   rings Best smartphones Best smartwatches
   Best speakers Best tablets Best travel VPNs Best TVs Best VPNs

 * More
   
   See all Topics Finance Education Health
   Special Features ZDNET In Depth ZDNET Recommends
   Newsletters Videos Editorial Guidelines

Tech
Home Tech Security


MICROSOFT AND INDUSTRY PARTNERS SEIZE KEY DOMAIN USED IN SOLARWINDS HACK

UPDATED: The seized domain has been turned into a killswitch to prevent the
SolarWinds hackers to escalate infections and make new victims.
Written by Catalin Cimpanu, Contributor on Dec. 15, 2020

 * 
 * 
 * 
 * 
 * 


MUST READ

I used ChatGPT to write the same routine in 10 programming languages

Read now

Microsoft and a coalition of tech companies have intervened today to seize and
sinkhole a domain that played a central role in the SolarWinds hack, ZDNet has
learned from sources familiar with the matter.


ZDNET RECOMMENDS


HOW THE TOP VPNS COMPARE: PLUS, SHOULD YOU TRY A FREE VPN?

We tested the best VPN services -- focusing on the number of servers, ability to
unlock streaming services, and more -- to determine a No. 1 overall. Plus, we
tell you whether free VPNs are worth trying.

Read now

The domain in question is avsvmcloud[.]com, which served as command and control
(C&C) server for malware delivered to around 18,000 SolarWinds customers via a
trojanized update for the company's Orion app.



SolarWinds Orion updates versions 2019.4 through 2020.2.1, released between
March 2020 and June 2020, contained a strain of malware named SUNBURST (also
known as Solorigate).

Once installed on a computer, the malware would sit dormant for 12 to 14 days
and then ping a subdomain of avsvmcloud[.]com.

According to analysis from security firm FireEye, the C&C domain would reply
with a DNS response that contained a CNAME field with information on another
domain from where the SUNBURST malware would obtain further instructions and
additional payloads to execute on an infected company's network.


TAKEDOWN TO PREVENT LAST-DITCH HACKS

Earlier today, a coalition of tech companies seized and sinkholed
avsvmcloud[.]com, transferring the domain into Microsoft's possession.



Sources familiar with today's actions described the takedown as "protective
work" done to prevent the threat actor behind the SolarWinds hack from
delivering new orders to infected computers.

Even if the SolarWinds hack became public on Sunday, the SUNBURST operators
still had the ability to deploy additional malware payloads on the networks of
companies that failed to update their Orion apps and still have the SUNBURST
malware installed on their networks.

In SEC documents filed on Monday, SolarWinds estimated that at least 18,000
customers installed the trojanized Orion app update and most likely have the
first-stage SUNBURST malware on their internal networks.



However, the hackers do not appear to have taken advatange of all these systems
and only carried out a handful of carefully-orchestrated intrusions into the
networks of high-profile targets.




SOLARWINDS UPDATES

 * SolarWinds: The more we learn, the worse it looks
 * CISA: US govt agencies must update right away
 * A second hacking group targets SolarWinds systems
 * Hackers accessed Microsoft source code
 * Microsoft quarantines trojanized apps
 * Microsoft identifies 40+ victims, most in US
 * Microsoft and industry partners seize key domain used in hack
 * SEC filing: 18,000 customers impacted
 * Breach is not a marketing opportunity

This was confirmed in a report on Monday from US security firm Symantec, which
said that it discovered the SUNBURST malware on the internal networks of 100 of
its customers, but it did not see any evidence of second-stage payloads or
network escalation activity.

Similarly, Reuters also reported on Monday, confirmed with independent sources
by ZDNet, that many companies that installed the trojanized Orion app update did
not discover evidence of additional activity and escalation on internal
networks, confirming that hackers only went after high-profile targets.

Since Sunday, when the SolarWinds hack came to light, the number of confirmed
victims has grown to include:

 * US cybersecurity firm FireEye
 * The US Treasury Department
 * The US Department of Commerce's National Telecommunications and Information
   Administration (NTIA)
 * The Department of Health's National Institutes of Health (NIH)
 * The Cybersecurity and Infrastructure Agency (CISA)
 * The Department of Homeland Security (DHS)
 * The US Department of State


SINKHOLING EFFORTS UNDERWAY TO DISCOVER ALL VICTIMS

Currently, the avsvmcloud[.]com domain redirects to an IP address owned by
Microsoft, with Microsoft and its partners receiving beacons from all the
systems where the trojanized SolarWinds app has been installed.



This technique, known as sinkholing, is allowing Microsoft and its partners to
build a list of all infected victims, which the organizations plan to use to
notify all affected companies and government agencies.



Image via Teri Radichel

"This is not the first time a domain associated with malware has been seized by
international law enforcement and even by a provider," ExtraHop CTO Jesse
Rothstein told ZDNet in an email, referring to Microsoft's previous takedown and
sinkholing efforts against the Necurs and TrickBot botnets.



Current takedown and sinkholing efforts also include representatives for the
Federal Bureau of Investigation and the Cybersecurity and Infrastructure
Security Agency, looking to find other US government agencies that might have
been compromised.



Due to SolarWinds' extensive US government clientele, government officials are
treating the SolarWinds compromise as a national security emergency. A day
before the SolarWinds breach became public, the White House held a rare meeting
of the US National Security Council to discuss the hack and its repercussions.

Indicators of compromise and instructions on how to discover and deal with a
SUNBURST malware infection are available from Microsoft, FireEye, and CISA.

--------------------------------------------------------------------------------

UPDATED on December 16: In an emailed statement FireEye formally confirmed a
coordinated takedown of the SUNBURST C&C domain, together with Microsoft and
GoDaddy. The explained that what ZDNet sources described as "protective work"
was a killswitch mechanism found in the SUNBURST domain that could stop
attackers from escalating infections. Full statement below:

"As part of our commitment to our customers and community, FireEye continues to
take action to protect organizations from the SolarWinds supply chain attack. We
disclosed the supply chain attack shortly after we discovered it, and we
provided information on related malicious activity and coordinated with partners
to disable some malware related to this activity.



 "SUNBURST is the malware that was distributed through SolarWinds software. As
part of FireEye's analysis of SUNBURST, we identified a killswitch that would
prevent SUNBURST from continuing to operate.

 "Depending on the IP address returned when the malware resolves
avsvmcloud[.]com, under certain conditions, the malware would terminate itself
and prevent further execution. FireEye collaborated with GoDaddy and Microsoft
to deactivate SUNBURST infections.

 "This killswitch will affect new and previous SUNBURST infections by disabling
SUNBURST deployments that are still beaconing to avsvmcloud[.]com. However, in
the intrusions FireEye has seen, this actor moved quickly to establish
additional persistent mechanisms to access to victim networks beyond the
SUNBURST backdoor. This killswitch will not remove the actor from victim
networks where they have established other backdoors. However, it will make it
more difficult to for the actor to leverage the previously distributed versions
of SUNBURST."



SOLARWINDS UPDATES


SolarWinds: The more we learn, the worse it looks

CISA: US govt agencies must update right away

A second hacking group targets SolarWinds systems

Hackers accessed Microsoft source code

Microsoft quarantines trojanized apps

Microsoft identifies 40+ victims, most in US

Microsoft and industry partners seize key domain used in hack

SEC filing: 18,000 customers impacted

Breach is not a marketing opportunity

 * 
   SolarWinds: The more we learn, the worse it looks
 * 
   CISA: US govt agencies must update right away
 * 
   A second hacking group targets SolarWinds systems
 * 
   Hackers accessed Microsoft source code
 * 
   Microsoft quarantines trojanized apps
 * 
   Microsoft identifies 40+ victims, most in US
 * 
   Microsoft and industry partners seize key domain used in hack
 * 
   SEC filing: 18,000 customers impacted
 * 
   Breach is not a marketing opportunity




Editorial standards
Show Comments
Log In to Comment Community Guidelines




x

player version3.2.1stream typeHLSplayback state1duration393.693288current
time6.24buffer length393.69total dropped frames187average dropped
(fps)0.47playback framerate (fps)0.00switching modeautotransition
statecompletestart index bitrate (B/s)-0.00kcurrent index bitrate
(B/s)508.41kcurrent bandwidth (B/s)0.00k




Replay video Large play-pause toggle
Play pause

00:06 06:34 Live
Closed captions Share Fullscreen



Learn More

Click to unmute



RELATED




MICROSOFT'S ACTIVISION BLIZZARD ACQUISITION GETS BLOCKED IN THE U.K.




MICROSOFT LAUNCHES BUG BOUNTY PROGRAM FOR THE NEW BING




THE BEST VPNS FOR IPHONE AND IPAD (AND WHY YOU SHOULD USE ONE)









ZDNET
we equip you to harness the power of disruptive innovation, at work and at home.
 * Topics
 * Galleries
 * Videos
 * Do Not Sell or Share My Personal Information

 * about ZDNET
 * Meet The Team
 * Sitemap
 * Reprint Policy

 * Join
   |
   Log In
 * Newsletters
 * Site Assistance
 * Licensing

 * 
 * 
 * 
 * 
 * 
 * 

© 2023 ZDNET, A Red Ventures company. All rights reserved. Privacy Policy |
Cookie Settings
| Advertise | Terms of Use
Cookie Settings