
- #Orion solarwinds api how to#
- #Orion solarwinds api install#
- #Orion solarwinds api software#
- #Orion solarwinds api code#
- #Orion solarwinds api series#
It is not directly tied to the attack group that has been blamed for the SolarWinds breach, known as APT29, but has been used by other attackers to maintain persistence on compromised Orion instances.
#Orion solarwinds api code#
It’s not the malicious code that was embedded in the Orion code itself, but is instead a backdoor that’s installed on compromised Orion instances to give the attacker persistence. Supernova is one of several pieces of malware that have been connected to the SolarWinds compromise and subsequent intrusions at a number of the company’s customers. For more information on SUPERNOVA,” the CISA alert says. The injected code is compiled and directly executed in memory.
#Orion solarwinds api software#
The SUPERNOVA webshell allows a remote operator to dynamically inject C# source code into a web portal provided via the SolarWinds software suite.
#Orion solarwinds api install#
“The threat actor then moved laterally to the entity’s SolarWinds Orion appliance and established Persistence by using a PowerShell script to decode and install SUPERNOVA. The attacker connected to the VPN from three individual residential IP addresses, and used a virtual machine. It’s not clear how the attacker originally got hold of the credentials, but was able to connect through several separate accounts, none of which had multi-factor authentication enabled. The actor is distinct from the Russian group responsible for the SolarWinds supply chain compromise and used valid credentials, rather than an exploit for a vulnerability, to connect to the VPN.ĬISA identified the new threat actor during an incident response engagement at an unnamed enterprise and found that the attacker had access to the network for nearly a year through the use of the VPN credentials. I’m hoping to develop more scripts to enhance and automate my day-to-day.The Cybersecurity and Infrastructure Security Agency has identified a new threat actor that is using the Supernova backdoor to compromise SolarWinds Orion installations after initially accessing the network through a connection to a Pulse Secure VPN. In fact, I’ve barely scratched the surface. Check out the add_nodes.py script in my orion repo. Of course! In fact, I’ve already developed a script that takes in a spreadsheet of nodes, with the custom values and adds them one-by-one to Orion NPM, configures the appropriate SNMPv3 creds, then enables them for configuration management. I look at the example Python scripts in the SDK, do some basic dissection, and build upon it.
#Orion solarwinds api how to#
#Orion solarwinds api series#
I wrote a series of articles for their site, with the goal of bringing more attention to this realm of SolarWinds. My journey toward understanding the SolarWinds API and SDK developed alongside a partnership with. However, dig deep enough, and you’ll find a wealth of useful information! I learned that “easy” is relative, and given the number of examples SolarWinds provides in their SDK, it’s really not all that bad. Although the SolarWinds Orion SDK has been around for a few years, documentation is limited and content is heavily reliant on the THWACK community. A couple of years later, and several hundred more managed nodes in the pocket, I figured it’s time to revisit this possibility. When I first heard that I could “easily” script and automate some tasks in SolarWinds, I stared askance, knowing good and well this wouldn’t be easy, if it worked at all. The manual, arduous tasks of clicking through monitoring tool menus, selecting appropriate polling agents, configuring appropriate properties, and validating node status can lead a man to madness. New nodes added to the network means new nodes to monitor. My life was a one-track record on repeat, tirelessly playing the same tune over and over.
