SolarWinds Supply Chain Espionage Campaign
Executive Summary
The SolarWinds campaign was a multi-stage espionage operation conducted by Russia’s SVR, tracked publicly as APT29. The operators compromised the SolarWinds Orion software build pipeline, implanted the SUNBURST backdoor into signed updates, and distributed those updates to roughly 18,000 customers between March and June 2020. Only a much smaller subset of victims were selected for hands-on follow-on exploitation, but those targets included U.S. federal agencies, consultancies, and major technology providers.
What made the campaign exceptional was not just the build-system compromise itself, but the disciplined follow-on tradecraft. Once inside selected environments, the operators abused identity infrastructure, cloud application permissions, and mail systems to conduct long-dwell intelligence collection while blending into legitimate administrative activity. The operation remained publicly unknown until FireEye disclosed its own breach in December 2020, triggering a government-wide response and later formal U.S. and U.K. attribution in April 2021.
Technical Analysis
The campaign hinged on a compromise of SolarWinds’ Orion build environment no later than fall 2019. The operators used SUNSPOT to watch the Orion build process and inject SUNBURST into the SolarWinds.Orion.Core.BusinessLayer.dll component during compilation. Because the malicious code moved through the legitimate build and signing pipeline, downstream customers received a trusted SolarWinds update that executed in a normal product context.
SUNBURST used delay and environment-aware logic to reduce the chance of early discovery. After installation it waited through a dormancy window, profiled the host and domain, and then initiated staged beaconing through attacker-controlled infrastructure masquerading as Orion telemetry. This allowed the operators to separate mass distribution from selective exploitation: the backdoor gave broad reach, but the human operators only escalated on organizations that matched intelligence priorities.
For those selected targets, the campaign quickly became an identity and cloud access operation. Public reporting tied the activity to additional credential theft, mailbox collection, OAuth application abuse, federation-trust manipulation, and forged SAML token use. Secondary tools such as TEARDROP and RAINDROP appeared in some environments, but the strategic value of the campaign came from abusing trusted enterprise control planes rather than deploying noisy malware at scale.
Attack Chain
Stage 1: Build Pipeline Compromise
APT29 obtained access to SolarWinds’ development or build environment and positioned SUNSPOT to tamper with Orion builds.
Stage 2: Trusted Software Distribution
Trojanized Orion releases were signed and delivered through SolarWinds’ standard update mechanism, giving the campaign broad reach across government and enterprise networks.
Stage 3: Dormant Beaconing and Victim Profiling
SUNBURST delayed execution, profiled host environments, and beaconed through infrastructure designed to resemble legitimate Orion traffic so operators could identify high-value victims.
Stage 4: Selective Follow-on Exploitation
Operators deployed additional tooling only into chosen environments, preserving stealth and reducing the forensic footprint across the broader 18,000-install population.
Stage 5: Identity and Cloud Abuse
Within priority victims, the campaign shifted to credential theft, OAuth and service principal abuse, federation trust changes, and mailbox collection to sustain intelligence access.
Stage 6: Intelligence Collection
The final objective was long-dwell access to executive communications, policy documents, cloud-hosted content, and other strategic material aligned with SVR collection priorities.
MITRE ATT&CK Mapping
Initial Access
T1195.002 - Supply Chain Compromise: Compromise Software Supply Chain: The campaign’s defining access vector was the insertion of SUNBURST into signed Orion software releases.
Command and Control
T1071.001 - Application Layer Protocol: Web Protocols: SUNBURST used web traffic patterns that mimicked Orion telemetry to hide C2.
Persistence
T1098.001 - Account Manipulation: Additional Cloud Credentials: Follow-on activity included adding or hijacking credentials on cloud application objects.
Defense Evasion
T1484.002 - Domain or Tenant Policy Modification: Trust Modification: Operators modified federation trust material to support forged SAML token abuse.
Collection
T1114.002 - Email Collection: Remote Email Collection: Mailbox access and export were central to the intelligence objective of the campaign.
Timeline
2019-10-01 - Build Environment Access Established
Public reporting places attacker access to SolarWinds systems by fall 2019, giving the operators time to study and tamper with the Orion build process.
2020-03-26 - First Trojanized Orion Update Released
SolarWinds began distributing compromised Orion releases that contained the SUNBURST backdoor.
2020-06-01 - Compromised Update Window Closes
The known SUNBURST distribution period ended after the affected Orion releases had been pushed to customers.
2020-12-08 - FireEye Detects Its Own Intrusion
FireEye’s investigation into stolen red-team tooling set off the chain of disclosure that exposed the SolarWinds intrusion set.
2020-12-13 - SolarWinds Compromise Publicly Identified
Mandiant and Microsoft published early technical reporting, while CISA issued Emergency Directive 21-01 for federal agencies.
2021-04-15 - U.S. and U.K. Governments Attribute the Campaign to SVR
The White House and the U.K. NCSC publicly linked the campaign to Russia’s Foreign Intelligence Service and imposed costs in response.
Remediation & Mitigation
Organizations affected by the campaign had to treat the issue as both a software supply chain compromise and an identity compromise. Immediate actions included isolating affected Orion infrastructure, hunting for SUNBURST and follow-on indicators, and determining whether post-compromise abuse extended into Active Directory, AD FS, Azure AD, Exchange, or Microsoft 365.
The campaign underscored several durable defensive priorities: harden build pipelines, monitor privileged identity changes, restrict service-principal and federation-trust modifications, alert on unexpected mailbox export activity, and require stronger review around third-party software trust. For cloud-facing environments, remediation had to include certificate rotation, credential rotation, OAuth application review, and validation that no unauthorized trust material remained in place.
Sources & References
- CISA: ED 21-01 - Mitigate SolarWinds Orion Code Compromise — CISA, 2020-12-13
- CISA: AA20-352A - Advanced Persistent Threat Compromise of Government Agencies, Critical Infrastructure, and Private Sector Organizations — CISA, 2020-12-17
- The White House: Imposing Costs for Harmful Foreign Activities by the Russian Government — The White House, 2021-04-15
- Mandiant: Highly Evasive Attacker Leverages SolarWinds Supply Chain to Compromise Multiple Global Victims With SUNBURST Backdoor — Mandiant, 2020-12-13
- Microsoft Security: Analyzing Solorigate, the Compromised DLL File That Started a Sophisticated Cyberattack — Microsoft Security, 2020-12-18
- MITRE ATT&CK: SolarWinds Compromise (C0024) — MITRE ATT&CK, 2025-09-19