New Name, Same Exceptional Service! Introducing Lockstep Technology Group

Transformyx: A Lockstep Technology Group Company
Edit Current Layout

Alert (AA20-352A) Advanced Persistent Threat Compromise of Government Agencies, Critical Infrastructure, and Private Sector Organizations

CISA • Feb 10, 2021

Alert (AA20-352A) - Advanced Persistent Threat Compromise of Government Agencies, Critical Infrastructure, and Private Sector Organizations

Summary

The Cybersecurity and Infrastructure Security Agency (CISA) is aware of compromises of U.S. government agencies, critical infrastructure entities, and private sector organizations by an advanced persistent threat (APT) actor beginning in at least March 2020. This APT actor has demonstrated patience, operational security, and complex tradecraft in these intrusions. CISA expects that removing this threat actor from compromised environments will be highly complex and challenging for organizations.


(Updated January 6, 2021): One of the initial access vectors for this activity is a supply chain compromise of a Dynamic Link Library (DLL) in the following SolarWinds Orion products (see Appendix A). Note: prior versions of this Alert included a single bullet that listed two platform versions for the same DLL. For clarity, the Alert now lists these platform versions that share the same DLL version number separately, as both are considered affected versions.


  • Orion Platform 2019.4 HF5, version 2019.4.5200.9083
  • Orion Platform 2020.2 RC1, version 2020.2.100.12219
  • Orion Platform 2020.2 RC2, version 2020.2.5200.12394
  • Orion Platform 2020.2, version 2020.2.5300.12432
  • Orion Platform 2020.2 HF1, version 2020.2.5300.12432


Note (updated January 6, 2021): CISA has evidence that there are initial access vectors other than the SolarWinds Orion platform and has identified legitimate account abuse as one of these vectors (for details refer to Initial Access Vectors section). Specifically, we are investigating incidents in which activity indicating abuse of Security Assertion Markup Language (SAML) tokens consistent with this adversary’s behavior is present, yet where impacted SolarWinds instances have not been identified. CISA is continuing to work to confirm initial access vectors and identify any changes to the tactics, techniques, and procedures (TTPs). CISA will update this Alert as new information becomes available. Refer to CISA.gov/supply-chain-compromise for additional resources.


(Updated January 6, 2021): On December 13, 2020, CISA released Emergency Directive 21-01: Mitigate SolarWinds Orion Code Compromise, ordering federal civilian executive branch departments and agencies to disconnect affected devices. CISA has subsequently issued supplemental guidance to Emergency Directive (ED) 21-01, most recently on January 6, 2021. Note: this Activity Alert does not supersede the requirements of ED 21-01 or any supplemental guidance and does not represent formal guidance to federal agencies under ED 21-01.


CISA has determined that this threat poses a grave risk to the Federal Government and state, local, tribal, and territorial governments as well as critical infrastructure entities and other private sector organizations. CISA advises stakeholders to read this Alert and review the enclosed indicators (see Appendix B).


Key Takeaways (updated December 18, 2020)

  • This is a patient, well-resourced, and focused adversary that has sustained long duration activity on victim networks.
  • CISA is investigating other initial access vectors in addition to the SolarWinds Orion supply chain compromise. 
  • Not all organizations that have the backdoor delivered through SolarWinds Orion have been targeted by the adversary with follow-on actions.
  • Organizations with suspected compromises need to be highly conscious of operational security, including when engaging in incident response activities and planning and implementing remediation plans. 


For more information click here.


Ned Fasullo, Manager, Mid-Market Division

For more information:

Email us | Sales@tfmx.com

Call us | 225.761.0088 ext 112


By Ivana Rhodes 19 Dec, 2023
Increasing Efficiency Through Cloud Managed Meraki SD-WAN & Security
By Ivana Rhodes 09 Aug, 2023
Announcing ProComputing to the Lockstep Technology Group Brand!
09 Jun, 2023
Introducing Lockstep: Keeping You a Step Ahead of the Technology Curve
16 Mar, 2022
Lockstep Technology Group, a leading provider of technology solutions for SLED organizations, is adding Transformyx, a leader in technology infrastructure and managed services, to become the leading full-service provider of IT solutions and services focused exclusively on optimizing the IT strategies of organizations in the education, healthcare, government, and commercial sectors across the Southeast. Lockstep and Transformyx share a common purpose to provide technology solutions that enable a robust, scalable, innovative, secure, and highly engaging environment for working and learning. With combined resources, Lockstep, based in Atlanta, GA and Greenville, SC, and Transformyx, based in Baton Rouge, LA, will strengthen their market positions in the Southeast and offer their clients turn-key solutions that include managed services, data & infrastructure, security & compliance, and end point technology solutions. Both organizations take pride in being customer-centric and client obsessed and have partnered with thousands of organizations spanning schools, colleges, healthcare, municipalities, and business over the past decade. “The passion and purpose embodied by the Transformyx team align with everything we do at Lockstep. We’re excited to be able to immediately offer a wide range of technology solutions that enable success.” Mahendran Jawaharlal, CEO, Lockstep Technology Group.
02 Mar, 2022
ASA Powered Managed Security Services
By Ned Fasullo 23 Sep, 2021
During a 2020 study on IT decision makers and C-level executives at enterprise organizations, it was found that 64 percent of respondents believed that those in a senior management positions are the most likely to be targeted by malicious cyber attacks within their organizations. In contrast, only 34 percent of respondents reported freelance support positions as being most likely to be targeted.
By Ned Fasullo 23 Sep, 2021
According to data collected throughout 2020, the most widespread type of mobile malware worldwide were variants from the Agent Tesla family. This accounted for nearly 30 percent of all mobile malware attacks that year. Formbook malware was the second most common type found, followed by those from the family LokiBot.
By Ned Fasullo 23 Sep, 2021
According to data collected throughout 2020, the most prevalent malware threats to corporate networks across the globe that year were from the malware family Emotet, representing 19 percent of all reported attacks. The second highest number of attacks came from the Agent Tesla malware family, followed by Dridex variants.
By Ned Fasullo 23 Sep, 2021
In 2020, the majority of reported botnet attacks globally was caused by malware from the Emotet family. This represented over 30 percent of all attacks. Although an additional 15 and 14 percent of botnet crime was traced to Dridex and Trickbot respectively, 17 percent of attacks that year involved malware from other families.
By Ned Fasullo 23 Sep, 2021
Malware - Statistics & Facts
More Posts
Share by: