As a first step, it is recommended to reset the passwords of local SolarWinds users and follow all updates released from SolarWinds.
Relevant Snort\Yara rules have been published regarding the attack. Following analysis conducted on them and on the nature of the attack, Check Point covers this threat with the following Threat Prevention products:
Anti-Virus:
Trojan.Win32.SUNBURST.TC.XXX
Threat Emulation: HackTool.Wins.FE_RT.A<XX>
HackTool.Wins.FE_RT.F
HackTool.Wins.FE_RT.G
Anti-Bot:Backdoor.Win32.SUNBURST.XX
Backdoor.Win32.Beacon.<A-H>
IPS: Sunburst Backdoor Suspicious Traffic
SolarWinds SUPERNOVA .NET Webshell Traffic
|
This solution has been verified for the specific scenario, described by the combination of Product, Version and Symptoms. It may not work in other scenarios.
|