Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
High
SUPERNOVA malware is a relatively new malware that is linked with SolarWinds Orion and Pulse Secure Virtual Private Networks (VPNs). In the beginning, the SolarWinds Orion tech was being targeted to install the malware separately onto servers that needed unauthorized access to the system network.
As the previous alert explained: “The SUPERNOVA malware consisted of two components. The first was malicious, unsigned [.NET] webshell… specifically written to be used on the SolarWinds Orion Platform. The second is the utilization of a vulnerability in the Orion Platform to enable deployment of the malicious code. This vulnerability in the Orion Platform has been resolved in the latest updates.”
US IP addresses were used by threat actors to masquerade as teleworking employees. Pulse Secure VPN appliances were the initial door for the malware to enter, and it was laterally moved to the SolarWinds Orion Server. The threat actors exploited CVE-2020-10148, an authentication bypass flaw in the SolarWinds Orion API that enabled them to execute API commands. The API was exploited and used to run commands.
Remote Access
Refer to ICS advisory for the complete list of mitigations and recommendations.