Support Center > Search Results > SecureKnowledge Details
Check Point response to SolarWinds supply chain attack Technical Level
Symptoms
Solution

As a first step, it is recommended to reset the passwords of local SolarWinds users and follow all updates released from SolarWinds.

Relevant Snort\Yara rules have been published regarding the attack. Following analysis conducted on them and on the nature of the attack, Check Point covers this threat with the following Threat Prevention products:

Anti-Virus:

Trojan.Win32.SUNBURST.TC.XXX

Threat Emulation:

HackTool.Wins.FE_RT.A<XX>

HackTool.Wins.FE_RT.F

HackTool.Wins.FE_RT.G

Anti-Bot:

Backdoor.Win32.SUNBURST.XX

Backdoor.Win32.Beacon.<A-H>

IPS:

Sunburst Backdoor Suspicious Traffic

SolarWinds SUPERNOVA .NET Webshell Traffic

This solution has been verified for the specific scenario, described by the combination of Product, Version and Symptoms. It may not work in other scenarios.

Give us Feedback
Please rate this document
[1=Worst,5=Best]
Comment