Download PDFOpen PDF in browserSolarWinds Compromise Malware AnalysisEasyChair Preprint 1556612 pages•Date: December 13, 2024AbstractThe SolarWinds compromise was one of the most significant cyberattacks of the 21st century, not because it breached a single organization, but because it triggered a much larger supply chain incident that affected thousands of organizations globally. Attributed to the Advanced Persistent Threat (APT29) threat group, this attack leveraged sophisticated malware tools to infiltrate high-profile entities. This paper provides a detailed analysis of the four main malware variants used in the attack: SIBOT, Raindrop, GoldMax, and GoldFinder. A controlled environment was established to study the behavior of each malware, focusing on their techniques for achieving persistence, lateral movement, and evading detection. The findings contribute to enhancing threat intelligence and offer insights for improving defenses against similar attacks, highlighting the importance of taking early steps to detect and prevent advanced persistent threats. Keyphrases: Downloader, GoldFinder, GoldMax, Malware, Raindrop, SIBOT, backdoor, reverse engineering
|