Cisco Event Responses 2024年07月05日
Cisco Event Response: SolarWinds Orion Platform Software Attack
index_new5.html
../../../zaker_core/zaker_tpl_static/wap/tpl_guoji1.html

 

2020年12月,SolarWinds公司宣布其Orion网络监控产品在2020年3月至6月期间发布的版本遭到高度复杂的供应链攻击。Cisco对此事件进行了全面调查,并采取了一系列安全措施,包括隔离受影响的Orion安装、加强网络和端点监控、阻止访问已知的命令和控制服务器等。目前,Cisco尚未发现任何证据表明其产品、服务或客户数据受到影响。

💥 Cisco对SolarWinds攻击事件的回应:Cisco在事件发生后立即启动了既定的事件响应流程,隔离并移除了一小部分Cisco资产上的Orion安装。目前,尚未发现任何证据表明Cisco产品、服务或客户数据受到影响。

🛡️ Cisco采取的安全措施:Cisco拥有广泛的网络和端点监控功能,已利用这些功能搜索安全社区共享的入侵指标 (IOCs),以寻找威胁行为者活动的证据。任何疑似运行受感染软件的设备都被隔离到Cisco网络之外,以便进行全面调查和修复。Cisco还阻止了对所有已公布的命令和控制服务器的访问。

🔒 Cisco对客户数据的保护:Cisco将客户与Cisco共享的信息视为高度机密,并要求将其存储在经过批准的端点或经过批准的共享存储工具上。Cisco要求磁盘加密和加密企业备份,以及其他旨在防止数据意外/未经授权丢失、破坏或访问的技术和组织措施。

🕵️‍♀️ Cisco的软件开发环境安全措施:Cisco将安全视为重中之重,专门的举措包括:Cisco安全开发生命周期 (SDL)、企业监控、威胁情报和价值链安全。

🏭 Cisco的制造供应链:Cisco的制造供应链由第三方制造商的业务网络组成,这些网络由Cisco监控。Cisco的制造供应链IT网络没有显示出任何被入侵的迹象。

🤝 Cisco与供应商的合作:Cisco正在积极与供应商合作,评估其业务可能受到的影响。

Version 1.2: January 12, 2021
On December 13, 2020, SolarWinds announced it experienced a highly sophisticated, manual supply chain attack on versions of its Orion network monitoring product released between March and June 2020. Due to the exceptional nature of this industry-wide issue, Cisco will provide updates on the investigation process and answers to common questions via this page which serves as the most up-to-date authoritative status. This information is based on Cisco’s investigation to-date, currently available Indicators of Compromise (IOCs), and is subject to change.
Cisco will notify affected organizations directly or through our established communication processes if information is found that requires customer/partner-specific action.

Resources

The following resources provide further detail about this security issue and Cisco’s recommendations for customers.

The Cisco Product Security Incident Response Team (PSIRT) published a Cisco Informational Security Advisory on December 14, 2020 to communicate to customers about the issue, how it may affect their networks, and provide them with best practices for device hardening, forensics, and general network security. Cisco Talos provides security research and perspectives on industry-wide issues. Threat intelligence on the SolarWinds software attack is available from Cisco Talos at the following posts:

Cisco Security Services are available to assist customers in the event of a suspected breach. For more information, please see Cisco Security Services Information. How Cisco Protects the Enterprise: A Cisco-on-Cisco Overview

Cisco Response Following the SolarWinds cyberattack announcement, Cisco Security immediately began our established incident response processes. We have isolated and removed Orion installations from a small number of Cisco assets. At this time, there is no known impact to Cisco products, services, or to any customer data. We continue to investigate all aspects of this evolving situation with the highest priority.

Common Questions

Q: Is Cisco aware of alleged stolen source code on a website solarleaks[.]net? Cisco is aware of this website and has no evidence at this time of any theft of intellectual property related to recent events. We are committed to transparency and should we find information our customers need to be aware of, we will share it through our established channels.  Q: Did Cisco use SolarWinds Orion software? Yes. While Cisco does not generally use SolarWinds for its enterprise network management or monitoring, we have isolated and removed Orion installations from a small number of Cisco assets.  Q: Did Cisco use SolarWinds software identified by them as impacted? Yes. While Cisco does not generally use SolarWinds for its enterprise network management or monitoring, we have isolated and removed the Orion installations from a small number of Cisco assets.  Q: Has Cisco confirmed no devices are running impacted Orion software builds? Yes. To date, Cisco has isolated and removed the small number of Orion installations based on the data available. Q: What remediation actions have you taken or planned? Cisco has extensive network and endpoint monitoring capabilities. We have used these capabilities to search for the Indicators of Compromise (IOCs) shared by the security community to look for evidence of threat actor activity. Any device suspected of running the compromised software is isolated from the Cisco network for a full investigation and remediation. Cisco has also blocked access to all the published command and control servers. Q: Has any customer data been exposed as a result of this issue? There is no evidence at this time to indicate customer data has been exposed as a result of this incident. Q: What is the impact to Cisco’s business? At this time, there is no known impact to Cisco products, services, or to any customer data. Q: Does this issue impact Cisco's ability to deliver services? No. Q: Has Cisco's environment been used to attack others? Cisco has no indications that its systems were used to attack others. Q: Does Cisco use FireEye products in its network? No. Cisco does not use FireEye in its production network. Q: Has Cisco incorporated the latest protections into its products and services? Yes, at this time, Cisco products and services incorporate the latest protections against these threats. Please see the Cisco Talos threat intelligence for the latest information: https://blog.talosintelligence.com/2020/12/solarwinds-supplychain-coverage.html https://blog.talosintelligence.com/2020/12/fireeye-breach-guidance.html Q: Is the SolarWinds impacted software present in the Cisco environment? At this time, all identified devices have been isolated based on the data available. Q: How does Cisco protect its environment from potentially impacted Orion software? Cisco has extensive network and endpoint monitoring capabilities. We have used these capabilities to search for the Indicators of Compromise (IOCs) shared by the security community to look for evidence of threat actor activity. Any device suspected of running the compromised software is isolated from the Cisco network for a full investigation and remediation. Cisco has also blocked access to all the published command and control servers. Q: How is sensitive customer information protected by Cisco? Information shared by customers with Cisco is considered highly confidential and Cisco requires storage on approved endpoints or approved shared storage tools. Cisco requires disk encryption and encrypted enterprise backup as well as various other technical and organizational measures designed to protect data against accidental/unauthorized loss, destruction, or access. Q: If the vulnerability is present, have you shut down vulnerable systems until the patch is available? Any system identified as suspicious is isolated from the Cisco network until full investigation and remediation completes. Cisco has also blocked access to all the published command and control servers. Q: How does Cisco protect the integrity of its software development environment? At Cisco, security is a top priority, and specific initiatives to protect Cisco, our products, and our customers include:

The Cisco Secure Development Lifecycle - This process arms our developers with tools as well as technology and processes that are grounded in securely building, storing, and signing code from creation/collection all the way to destruction. Enterprise Monitoring - We monitor across our enterprise for intrusions and take a broad range of steps to both prevent and detect adversarial activity within our organization. Threat Intelligence - We are very active in threat intelligence organizations. We share and receive actionable information with the broader security community to help increase our awareness and protect the global Internet. Value Chain Security - We have a robust Value Chain Security program that governs our risk of third parties we do business with and obligate them to meet our standards.

Q: Is Cisco’s manufacturing supply chain affected by this issue? Cisco’s manufacturing supply chain is comprised of third-party manufacturers’ business networks that are monitored by Cisco. Cisco’s manufacturing supply chain IT networks have shown no evidence of compromise. If Cisco third party manufacturers have IT networks not associated with Cisco’s business, Cisco does not have visibility to those networks. Q: When will Cisco receive impact assessments for its vendors/suppliers? Cisco is actively engaging with vendors to assess any potential impacts to their business. Q: What is Cisco's response to the Volexity research post on December 14 describing an attack involving SolarWinds that bypasses Duo MFA to access email accounts? This bypass technique is not due to a vulnerability in the Duo product, rather, it is a potential consequence that can occur if Duo integration credentials are exposed to attackers. Similar to other highly privileged APIs such as those used for cloud infrastructure management, HR platforms, or software build systems, the credentials used for Duo integrations must be securely handled and stored for the security properties of the Duo integration to be maintained. For information on how to reset the credentials for a Duo-protected app, please see https://help.duo.com/s/article/2306. For more general information on what Duo application credentials are and how to protect them, please see https://help.duo.com/s/article/application-credentials.

Product Support

Please note that Cisco is receiving a high volume of information requests, and we are actively updating this page with our latest information. Due to high-demand and the ongoing nature of this investigation, we may be unable to provide individual responses beyond the information provided on the page. Cisco customers or partners with questions related to Cisco products are advised to contact the Cisco Technical Assistance Center (TAC) or their contracted maintenance providers. https://www.cisco.com/c/en/us/support/web/tsd-cisco-worldwide-contacts.html

 

This document is part of the Cisco Security portal. Cisco provides the official information contained on the Cisco Security portal in English only.

This document is provided on an “as is” basis and does not imply any kind of guarantee or warranty, including the warranties of merchantability or fitness for a particular use. Your use of the information in the document or materials linked from the document is at your own risk. Cisco reserves the right to change or update this document without notice at any time.

Back to Top

Fish AI Reader

Fish AI Reader

AI辅助创作,多种专业模板,深度分析,高质量内容生成。从观点提取到深度思考,FishAI为您提供全方位的创作支持。新版本引入自定义参数,让您的创作更加个性化和精准。

FishAI

FishAI

鱼阅,AI 时代的下一个智能信息助手,助你摆脱信息焦虑

联系邮箱 441953276@qq.com

相关标签

SolarWinds 网络攻击 供应链攻击 Cisco 安全 威胁情报
相关文章