

- SOLARWINDS SECURITY VULNERABILITY INSTALL
- SOLARWINDS SECURITY VULNERABILITY UPDATE
- SOLARWINDS SECURITY VULNERABILITY PATCH
This activity group is based in China and has been observed using commercial VPN solutions and compromised consumer routers in their attacker infrastructure. Defense Industrial Base Sector and software companies. MSTIC has observed DEV-0322 targeting entities in the U.S. During the tracking and investigation phases prior to when MSTIC reaches high confidence about the origin or identity of the actor behind an operation, we refer to the unidentified threat actor as a “development group” or “DEV group” and assigns each DEV group a unique number (DEV-#) for tracking purposes. MSTIC tracks and investigates a range of malicious cyber activities and operations. Microsoft would like to thank SolarWinds for their cooperation and quick response to the vulnerability we reported. Microsoft Threat Experts customers who were affected were notified of attacker activity and were aided in responding to the attack. Our endpoint protection solution detects and raises alerts for the attacker’s follow-on malicious actions. Microsoft Defender Antivirus blocks malicious files, behavior, and payloads.
SOLARWINDS SECURITY VULNERABILITY PATCH
Microsoft 365 Defender has been protecting customers against malicious activity resulting from successful exploitation, even before the security patch was available.
SOLARWINDS SECURITY VULNERABILITY UPDATE
We strongly urge all customers to update their instances of Serv-U to the latest available version.
SOLARWINDS SECURITY VULNERABILITY INSTALL
If Serv-U’s SSH is exposed to the internet, successful exploitation would give attackers ability to remotely run arbitrary code with privileges, allowing them to perform actions like install and run malicious payloads, or view and change data. The vulnerability, which Microsoft reported to SolarWinds, exists in Serv-U’s implementation of the Secure Shell (SSH) protocol. The vulnerability being exploited is CVE-2021-35211, which was recently patched by SolarWinds. The Microsoft Threat Intelligence Center (MSTIC) attributes this campaign with high confidence to DEV-0322, a group operating out of China, based on observed victimology, tactics, and procedures. Microsoft has detected a 0-day remote code execution exploit being used to attack SolarWinds Serv-U FTP software in limited and targeted attacks. Microsoft Purview Data Lifecycle Management.Microsoft Purview Information Protection.Information protection Information protection.Microsoft Priva Subject Rights Requests.Microsoft Purview Communication Compliance.Microsoft Purview Insider Risk Management.Risk management & privacy Risk management & privacy.Microsoft Intune Endpoint Privilege Management.Endpoint security & management Endpoint security & management.Microsoft Defender External Attack Surface Management.


Microsoft Entra ID (Azure Active Directory).
