SolarWinds Hack

Last updated: June 29, 2025

Target Audience

Keywords

Introduction

Overview

The SolarWinds hack, discovered in December 2020, was a sophisticated cyberattack targeting SolarWinds, a prominent IT management software company. Hackers, believed to be state-sponsored, inserted a malicious code into SolarWinds' Orion software updates, which were then distributed to thousands of SolarWinds customers, including numerous government agencies and major corporations. This backdoor allowed the attackers to infiltrate networks, steal sensitive data, and conduct espionage undetected for months. The breach raised significant concerns about the security of software supply chains and the vulnerability of critical infrastructure to cyber threats.

Vulnerability Details

Hackers infiltrated SolarWinds' software development environment and injected malicious code into the Orion software updates. This code was then unwittingly distributed to thousands of SolarWinds customers when they downloaded and installed updates for the Orion platform. The attackers meticulously crafted the malware to remain undetected, leveraging techniques such as code obfuscation and encryption, and even mimicking legitimate software behavior to evade detection by security measures. The compromised updates were signed with legitimate SolarWinds digital certificates, making it difficult to detect the malicious activity.

Learning Objectives

  • Describe the SolarWinds hack
  • Explain themes in supply chain security
  • Explain Advanced Persistent Threat (APT)
  • List common defense mechanisms against cyber attacks
  • Explain backdoors and how to prevent them

Download

  • Includes a PDF case study adapted from a real-world cyber breach
  • Guided questions for student engagement
  • Instructor materials including context and background
  • All content packaged in a downloadable ZIP file

Remote Terminal

Terminal Description

In this lab, we are going to recreate a simplified version of solarwinds breach and how it was performed. The attackers injected malicious code into a .DLL file called SolarWinds.Orion.Core.BusinessLayer.dll, which they used to establish their backdoor connection.
Below is an example of what the SolarWinds.Orion.Core.BusinessLayer.dll file could have looked like, written in C#. The attackers obfuscated their code to appear as if it was performing normal business operations by keeping in line with the variable syntax style and naming conventions used by the original authors.

Module Questions

How early was it believed that SolarWinds was initially compromised?
What was the impacted software, Orion, designed to do?
How were the attackers able to plant their malware into the Orion platform?
How were the attackers able to propagate their SUNBURST malware to SolarWinds clients?
Who did the United States formally accuse as perpetrators of the attack?
What was the American government response to the attack?
What is an important lesson learned from the SolarWinds attack?