{"id":123005,"date":"2020-12-31T12:15:20","date_gmt":"2020-12-31T20:15:20","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=123005"},"modified":"2021-01-04T16:26:13","modified_gmt":"2021-01-05T00:26:13","slug":"cortex-solarstorm-variants-imitators","status":"publish","type":"post","link":"https:\/\/www2.paloaltonetworks.com\/blog\/2020\/12\/cortex-solarstorm-variants-imitators\/","title":{"rendered":"Cortex XDR: Fortify the SOC Against SolarStorm, Variants and Imitators"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\"  class=\"alignright wp-image-122676  lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2020\/12\/SW-Landing-Page-image.jpg\" alt=\"Image for SolarWinds campaign, discussing detection of and defense against SolarStorm\" width=\"544\" height=\"362\" \/><\/p>\n<p><span style=\"font-weight: 400;\">On Dec. 13, the world learned of the now-infamous SolarWinds supply chain attack. The \u201cSolarStorm\u201d threat group infected countless SolarWinds Orion servers with a Trojanized DLL file and eluded detection for months.\u00a0\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">While organizations chase down their SolarWinds servers and investigate the impact of the attack, it\u2019s important to prepare more broadly for what inevitably comes next. An attack of this level of sophistication, conducted by suspected nation-state operators, highlights a set of tactics, techniques and procedures (TTPs). It<\/span><span style=\"font-weight: 400;\">\u2019s only a matter of time before copycats reverse-engineer and reuse elements of the attack. In addition, the original threat actors behind the attack will undoubtedly update their methods, changing not only indicators of compromise (IOCs) like domain names,\u00a0 but also adversary tactics and tools to evade security controls. Protecting against these unavoidable threats requires a robust and layered defense.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Across our product portfolio, Palo Alto Networks <\/span><span style=\"font-weight: 400;\">deployed updates to <\/span><a href=\"https:\/\/unit42.paloaltonetworks.com\/fireeye-solarstorm-sunburst\/\"><span style=\"font-weight: 400;\">help customers<\/span><\/a><span style=\"font-weight: 400;\"> protect against the SolarStorm attack. In this post,\u00a0 we will specifically highlight the updates to our Cortex XDR product that helps SOC teams in the front lines defend against not just the SolarStorm attack but also SolarStorm variants and imitators. The key principle in defeating advanced adversaries is to continuously improve realtime prevention capabilities, and to give teams the right set of tools to detect and hunt threats down fast. By combining multiple layers of defense, from prevention to detection, investigation and response, Cortex XDR helps SOC teams fend off\u00a0 the risk of intrusion at every step.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Here\u2019s what we\u2019ve added to help protect security teams.<\/span><\/p>\n<h2><b>Block Threats in Realtime With Fortified Endpoint Protection<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Realtime prevention is the first line of defense in any proactive security strategy. When Palo Alto Networks\u00a0 <\/span><span style=\"font-weight: 400;\">experienced an <\/span><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2020\/12\/solarwinds-statement-solarstorm\/\"><span style=\"font-weight: 400;\">attempt to download Cobalt Strike<\/span><\/a><span style=\"font-weight: 400;\"> on one of our IT SolarWinds servers, <\/span><span style=\"font-weight: 400;\">Cortex XDR successfully prevented the SolarStorm attack<\/span><span style=\"font-weight: 400;\"> by\u00a0 blocking the attempt with our Behavioral Threat Protection capability.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Further analyzing the behaviors associated with the recent attacks, our XDR research team\u00a0 have developed additional protections in the Cortex XDR agent t<\/span><span style=\"font-weight: 400;\">o help keep our customers safe from the SolarStorm group and its imitators. Specifically, we have:\u00a0<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Introduced new Behavioral Threat Protection rules that identify the unique behaviors of the <\/span><a href=\"https:\/\/unit42.paloaltonetworks.com\/fireeye-solarstorm-sunburst\/\"><span style=\"font-weight: 400;\">SUNBURST backdoor<\/span><\/a><span style=\"font-weight: 400;\"> file and other malicious DLL files used in the attack.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Updated our machine learning models for our local analysis engine by including the\u00a0 malicious files in our training database and allowing the models to extract attributes similar to the Trojanized DLL files.\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Added new child process protection rules to prevent legitimate applications from running malicious code identified in the SolarStorm attack.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">In addition, the <\/span><a href=\"https:\/\/www.paloaltonetworks.com\/products\/secure-the-network\/wildfire\"><span style=\"font-weight: 400;\">WildFire<\/span><\/a><span style=\"font-weight: 400;\"> malware analysis engine has been updated to block the <\/span><span style=\"font-weight: 400;\">SUNBURST backdoor files and Cobalt Strike BEACON files associated with SolarStorm. The Cortex XDR agent integrates with WildFire for cloud-based analysis of files.<\/span><\/p>\n<h2><b>Detect and Hunt Down Intrusions in Near Realtime<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">In addition to the prevention controls outlined above, Cortex XDR now includes a comprehensive set of queries in the XQL query library to help hunt down intrusions that bypass prevention controls. Because the SolarStorm threat group targeted the Azure Active Directory (AD) service and attempted to read emails, the queries also identify Azure AD and email-based threats. These queries empower threat hunters to find:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">All endpoints with SolarWinds software installed.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">SolarWinds-infected processes that drop an executable, connect to a non-SolarWinds domain, create or modify a service, or conduct other malicious activity.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Changes to Azure AD authentication settings, such as disabling single sign-on, adding unverified domains or modifying domain certificates.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Azure tenants that were granted access to an Azure AD application.\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">New or updated Azure AD service accounts.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">New mail read permissions added to a user account.<\/span><\/li>\n<\/ul>\n<figure id=\"attachment_123006\" aria-describedby=\"caption-attachment-123006\" style=\"width: 1429px\" class=\"wp-caption alignnone\"><div style=\"max-width:100%\" data-width=\"1429\"><span class=\"ar-custom\" style=\"padding-bottom:56.26%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"wp-image-123006 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2020\/12\/a-screenshot-of-a-computer-description-automatica.png\" alt=\"Cortex XDR now includes a comprehensive set of SolarStorm-specific queries in the XQL query library to help hunt down, investigate and provide defense against SolarStorm in case of potential intrusions that bypass prevention controls.\" width=\"1429\" height=\"804\" \/><\/span><\/div><figcaption id=\"caption-attachment-123006\" class=\"wp-caption-text\">Figure 1. A sample query uncovers evidence of the SolarWinds attack.<\/figcaption><\/figure>\n<p><span style=\"font-weight: 400;\">In addition to the queries that expedite threat hunting,\u00a0 a number of detectors were incorporated into Cortex XDR to automatically detect behaviors associated with SolarStorm TTPs that may be deployed by a broader group of adversaries. These automated alerts\u00a0 include:\u00a0<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Domain federation settings that have been modified.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Unverified domains added to Azure AD.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">IOCs associated with the SolarStorm attack.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">The first two detection rules uncover attempts to compromise authentication controls by analyzing Azure AD audit logs. Since Active Directory is a top target for cunning adversaries the world over, these rules protect against any threat groups deploying such techniques.\u00a0 These rules, combined with Cortex XDR\u2019s extensive behavioral analytics capabilities, will rapidly detect anomalies in post-intrusion stages of attacks, including credential abuse, lateral movement and exfiltration. <\/span><\/p>\n<figure id=\"attachment_123032\" aria-describedby=\"caption-attachment-123032\" style=\"width: 1865px\" class=\"wp-caption alignnone\"><div style=\"max-width:100%\" data-width=\"1865\"><span class=\"ar-custom\" style=\"padding-bottom:42.63%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"wp-image-123032 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2020\/12\/word-image-18.png\" alt=\"Strong defense against SolarStorm includes using detection rules that identify attacks targeting Azure AD, as shown here in the Cortex XDR interface. \" width=\"1865\" height=\"795\" \/><\/span><\/div><figcaption id=\"caption-attachment-123032\" class=\"wp-caption-text\">Figure 2. Detection rules identify attacks targeting Azure AD.<\/figcaption><\/figure>\n<p><span style=\"font-weight: 400;\">These alerts and out-of-the-box queries make it easy for security teams to detect and hunt for indications of a breach.<\/span><\/p>\n<h2><strong>Palo Alto Networks: Your Port in the (Solar)Storm<\/strong><\/h2>\n<p><span style=\"font-weight: 400;\">In responding to SolarStorm, we need to protect against not only the original attack, but also the variants and copycats who try to use similar techniques and tactics. <\/span><span style=\"font-weight: 400;\">As new details of SolarStorm variants emerge, the Cortex XDR research team will continue to release updates to identify and stop associated threat vectors.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">We\u2019ve also established a <\/span><a href=\"https:\/\/www.paloaltonetworks.com\/solarstorm-rapid-response\"><span style=\"font-weight: 400;\">rapid response program<\/span><\/a><span style=\"font-weight: 400;\"> that helps you discover, investigate and recover from a breach if you\u2019ve been compromised. Visit our SolarStorm resource center to learn more about our two rapid response offerings. <\/span><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>SolarStorm variants and imitators are on the way. Read how we continue to work to improve the ability of Cortex XDR to defend against them. <\/p>\n","protected":false},"author":370,"featured_media":122676,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[308],"tags":[6849,6737,7399,7398],"coauthors":[3907],"class_list":["post-123005","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-announcement","tag-cortex-data-lake","tag-cortex-xdr","tag-solarstorm","tag-solarwinds","sec_ops_category-must-read-articles","sec_ops_category-product-features","sec_ops_category-use-cases"],"jetpack_featured_media_url":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2020\/12\/SW-Landing-Page-image.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/123005","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/370"}],"replies":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=123005"}],"version-history":[{"count":11,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/123005\/revisions"}],"predecessor-version":[{"id":123059,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/123005\/revisions\/123059"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/122676"}],"wp:attachment":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=123005"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=123005"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=123005"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=123005"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}