Incident Response Blog: SUNBURST / SolarWinds

On December 13, FireEye and Microsoft released information regarding a newly discovered nation-state campaign actors leveraging access to the SolarWinds Orion Platform. The SolarWinds Orion Platform is used for IT infrastructure management in many government agencies and corporate networks. Nation-state actors compromised the SolarWinds supply chain to trojanize their software updates and gain access to SolarWinds’ customers. In response, the United States Cybersecurity and Infrastructure Security Agency (CISA) released an emergency directive to US Government agencies to disconnect or power down SolarWinds Orion products immediately. Several departments and agencies are known to be compromised and a Cyber Unified Coordination Group has been established to respond to this incident.

CTA members are working to identify and assist their customers that may be at risk of this incident and are publishing blogs and reports to detail their actions, as well as protections and mitigations that would be helpful for response efforts. As a part of this effort, CTA members are sharing information to ensure that we are coordinated and working together for the greater good. We are providing links to our members’ reports and updates related to this incident in this blog.

As of February 10, 2021, this blog is no longer being regularly updated.


Check Point



ElevenPaths – Telefónica Cyber Security Company



Palo Alto Networks

Panda Security







Symantec – A Division of Broadcom


(Last updated 3:15PM EST, February 10, 2021)

Author: Neil Jenkins