From 778774fe33e2a678457d694e92c003941e42d7ec Mon Sep 17 00:00:00 2001 From: Anton Livaja Date: Wed, 21 Aug 2024 13:22:55 -0400 Subject: [PATCH] add notes about compiler poc and solar winds mitigation --- stagex/stagex.md | 34 ++++++++++++++++++++++++++++++++++ 1 file changed, 34 insertions(+) diff --git a/stagex/stagex.md b/stagex/stagex.md index 6e442dc..4514934 100644 --- a/stagex/stagex.md +++ b/stagex/stagex.md @@ -97,6 +97,11 @@ toolchain --> + --- @@ -174,6 +179,35 @@ StageX allows us to bootstrap the compiler toolchain, making it easy to verify t --- +# Solar Winds + +According to: https://www.crowdstrike.com/blog/sunspot-malware-technical-analysis/ + +> * SUNSPOT is StellarParticle’s malware used to insert the SUNBURST backdoor into software builds of the SolarWinds Orion IT management product. +> * SUNSPOT monitors running processes for those involved in compilation of the Orion product and replaces one of the source files to include the SUNBURST backdoor code. +> * Several safeguards were added to SUNSPOT to avoid the Orion builds from failing, potentially alerting developers to the adversary’s presence. + + + +--- + # **What's Next?** Packaging more software