SolarStorm

Threat Actor updated 4 months ago (2024-05-13T16:17:33.962Z)
Download STIX
Preview STIX
SolarStorm is a threat actor group known for executing actions with malicious intent. Notable among their operations was the 2020 attack on SolarWinds Orion software, which was a sophisticated supply-chain attack that compromised the company's software updates, resulting in malware being served to its customer base. This group has demonstrated a tactical and persistent approach throughout their entire attack cycle. The activities of SolarStorm were traced back to as early as August 2019 during the infrastructure build-out phase of their operation, indicating a high level of planning and execution. In late March, a similar modus operandi was observed in an attack on 3CX, a voice over IP (VOIP) solution. In this incident, previously unknown malicious actors tampered with the company’s software update for its 3CXDesktopApp. The similarity in execution to the SolarStorm attack on SolarWinds suggests a possible link between these threat actors. However, there is still uncertainty about the full range of initial access vectors used by SolarStorm, beyond the already compromised software. SolarStorm is also associated with APT29, a group tracked under various names including UNC3524, NobleBaron, Dark Halo, NOBELIUM, Cozy Bear, and CozyDuke. This group has been known to target embassy entities using various lures, such as a BMW car sale. However, the association of the SUPERNOVA webshell with SolarStorm is now questionable due to the aforementioned .dll not being digitally signed, unlike the SUNBURST .dll. As new information comes to light, cybersecurity firms like Palo Alto Networks continue to update their threat briefs on SolarStorm and SUNBURST, ensuring customers are protected from this evolving threat.
Description last updated: 2024-05-13T15:19:25.454Z
Aliases We are not currently tracking any aliases
Miscellaneous Associations
Other elements of context that could aid in the identification of relevance
Analyst Notes & Discussion
Be the first to leave your mark here! Log in to share your views and vote.
Source Document References
Information about the SolarStorm Threat Actor was read from the documents corpus below. This display is limited to 20 results, create a free account to see more
PreviewSource LinkCreatedAtTitle
Unit42
4 months ago
Leveraging DNS Tunneling for Tracking and Scanning
Unit42
a year ago
Understanding DNS Tunneling Traffic in the Wild
CERT-EU
10 months ago
Russian hackers use Ngrok feature and WinRAR exploit to attack embassies
MITRE
2 years ago
SUPERNOVA: A Novel .NET Webshell
CERT-EU
a year ago
The Week in Security: 3CX attackers identified as North Korean, CISA pushes Secure by Design
MITRE
9 months ago
SolarStorm Supply Chain Attack Timeline