

 
 INSIGHTi 
 
SolarWinds Attack—No Easy Fix 
December 15, 2020 
On December 13, 2020, the cybersecurity firm FireEye published research that a malicious actor was 
exploiting a supply chain vulnerability in SolarWinds products to hack into government and private sector 
information technology (IT) networks. SolarWinds confirmed the security incident. The Cybersecurity 
and Infrastructure Security Agency (CISA) issued an emergency directive requiring federal agencies to 
remove certain SolarWinds products from agency networks.  
Media initially reported that the U.S. Treasury and Commerce departments were susceptible to this attack; 
subsequent reports added additional agencies. The list of compromised agencies and companies is 
expected to expand.  
As private sector and government researchers continue investigating this incident, the cybersecurity 
community expects to learn more about the attack, the adversary, their targets, compromised data and 
systems, and ways to recover from the incident. This Insight provides an overview of the incident, federal 
response, and policy considerations. 
The Attack 
SolarWinds (Austin, TX) makes IT management products for business customers. These products allow 
chief information officers (CIOs) to automate certain activities such as managing internet protocol (IP) 
addresses, monitoring devices, and deploying updates.  
A critical element to any software application or platform is the mechanism by which the vendor pushes 
updates and patches to users. SolarWinds built functions into their products which push update files to 
users (as is common practice). 
A malicious actor discovered a way to compromise SolarWinds’ software update service for the Orion IT 
management platform (a SolarWinds suite of products). The actor was able to compromise the update 
channel used by Orion to distribute malware. When run, the code executed the Sunburst malware in the 
SolarWinds IT management platform. Once executed, Sunburst would go dormant for a period of time (to 
avoid detection) before fetching additional instructions from its command-and-control (C2) server. The 
additional instructions allowed the actors to exfiltrate files, execute new commands, profile the system, 
and manipulate the machine. The actors sought to hide their presence by manipulating files and disguising 
their activity as normal network traffic. SolarWinds stated that of their 300,000-plus customers, roughly 
Congressional Research Service 
https://crsreports.congress.gov 
IN11559 
CRS INSIGHT 
Prepared for Members and  
 Committees of Congress 
 
  
 
Congressional Research Service 
2 
18,000 are susceptible to this attack. Known vulnerable versions of the platform were released in spring 
2020 and were still vulnerable through mid-December 2020.  
The disclosed attack is likely part of a larger campaign to which there is no easy fix. The Sunburst 
malware allowed the malicious actors a foothold in their victims’ networks. From there, they could persist 
in the network through the creation of additional credentials for other software platforms. So merely 
remedying the vulnerable versions of SolarWinds’ products would be insufficient in eradicating the 
unauthorized actors from a compromised network. 
News media has attributed the attack to Russian intelligence services, but the Russian government has 
denied involvement. The U.S. government recently attributed an unrelated exploit to VMWare products to 
Russian state-sponsored actors.  
FireEye previously disclosed a breach of its own hacking tools. FireEye’s breach did not contain 
unknown exploits or techniques, so the SolarWinds vulnerability was not part of that breach.  
Federal Actions 
On December 13, 2020, CISA directed federal agencies to: 
  disconnect and turn off certain SolarWinds products; 
  block web traffic to any SolarWinds product; and 
  hunt for adversaries that may be on the network (e.g., search for unauthorized credentials 
and files) and remove them. 
The CISA guidance encourages agencies with resident expertise to examine their SolarWinds products for 
new accounts and network traffic for new domains. If an agency does not have this expertise, they may 
request technical assistance from CISA. While these actions are compulsory for federal agencies, CISA 
recommends non-federal entities also undertake these actions.  
CISA promised to continue working with federal and non-federal partners to discover more information 
about this exploitation and is to provide additional guidance and remediation actions when available.  
The National Security Council has activated the National Cyber Incident Response Plan and has stood up 
the Unified Coordination Group to streamline interagency collaboration.  
The Defense Science Board warned of software update risks in 2017. The National Counterintelligence 
and Security Center warned of software supply chain attacks in 2019. 
Policy Considerations 
Cybersecurity is not a static goal. Instead, it is a risk management process, which involves continual 
work.  The National Institute of Standards and Technology (NIST) Cybersecurity Framework categorizes 
this process cycle as: (1) identify; (2) protect; (3) detect; (4) respond; and (5) recover. Much of the recent 
cybersecurity policy work has been on the first three processes; the SolarWinds attack highlights the need 
for the last two.  
Given the nature of the SolarWinds attack, it is unlikely existing programs would have prevented this 
incident. The Federal Information Security Modernization Act (FISMA) lays out roles for federal agency 
cybersecurity, but ultimately places implementation responsibility with agency heads. Other recent 
congressional activities, such as the SECURE IT Act and the IT MGT Act, address how agencies acquire 
and deploy technology, but not how to manage it once it’s deployed. Agencies were recently directed to
  
Congressional Research Service 
3 
create vulnerability disclosure programs (VDPs), but government contractors were not required to have a 
VDP.  
Federal incident response capabilities may be over-taxed in the aftermath of this incident. The nature of 
the attack granted the malicious actors great latitude to move about networks and carry out their 
objectives. Agencies and private sector companies may lack the expertise or capacity to conduct hunt 
activities on their own networks. Additionally, third party IT companies may not have the requisite 
experience in: 
  addressing advanced persistent threats on networks; and  
  dealing with organizations of different sizes, complexity, and operations.  
This may create a delay in remediating the consequences of the attack. 
Addressing the response provides policymakers opportunities to dictate subsequent federal actions to 
victim companies, agencies, and attributed perpetrators, and could inform how the private sector will 
prioritize scarce resources. Office of Management and Budget (OMB) guidance requires agencies to plan 
for incident response activities, but does not specifically address this particular risk. 
 
Author Information 
 
Chris Jaikaran 
   
Analyst in Cybersecurity Policy 
 
 
 
 
Disclaimer 
This document was prepared by the Congressional Research Service (CRS). CRS serves as nonpartisan shared staff 
to congressional committees and Members of Congress. It operates solely at the behest of and under the direction of 
Congress. Information in a CRS Report should not be relied upon for purposes other than public understanding of 
information that has been provided by CRS to Members of Congress in connection with CRS’s institutional role. 
CRS Reports, as a work of the United States Government, are not subject to copyright protection in the United 
States. Any CRS Report may be reproduced and distributed in its entirety without permission from CRS. However, 
as a CRS Report may include copyrighted images or material from a third party, you may need to obtain the 
permission of the copyright holder if you wish to copy or otherwise use copyrighted material. 
 
IN11559 · VERSION 1 · NEW