SlideShare a Scribd company logo
Copyright © 2020 Ivanti. All rights reserved.Copyright © 2020 Ivanti. All rights reserved.
Chris Goettl / Phil Richards
Hosted by Adrian Vernon
DECEMBER 16, 2020
FireEye Breach Investigation
Uncovers Much Larger SolarWinds
Breach
Copyright © 2020 Ivanti. All rights reserved.
Situation Analysis Recommendations
Exploit Type:
Exposure: Attack Vectors:Impact:
Vendor Risk Management
Endpoint Detection and Response
FireEye is an organization well equipped to investigate a security breach. It is
no surprise that the cybersecurity firm quickly found how the attackers gained
entry and what they compromised. The scope of the true incident is surprising.
The source of the attack was found to be a backdoor introduced into
SolarWinds Orion which may have been downloaded by as many as 18,000
entities globally.
Ransomware
FireEye Breach Part of a Larger Incident
25
Confirmed
entities
victimized by
SolarWinds
backdoor
Data Theft SolarWinds Orion
Trojan
Continuous Vulnerability Management
Red Team Exercises
Emergency Response Planning
Data Protection
Copyright © 2020 Ivanti. All rights reserved.
1.CVE-2019-11510 – pre-auth arbitrary file reading from Pulse Secure SSL VPNs - CVSS 10.0
2.CVE-2020-1472 – Microsoft Active Directory escalation of privileges - CVSS 10.0
3.CVE-2018-13379 – pre-auth arbitrary file reading from Fortinet Fortigate SSL VPN - CVSS 9.8
4.CVE-2018-15961 – RCE via Adobe ColdFusion (arbitrary file upload that can be used to upload a JSP web shell) - CVSS 9.8
5.CVE-2019-0604 – RCE for Microsoft Sharepoint - CVSS 9.8
6.CVE-2019-0708 – RCE of Windows Remote Desktop Services (RDS) - CVSS 9.8
7.CVE-2019-11580 - Atlassian Crowd Remote Code Execution - CVSS 9.8
8.CVE-2019-19781 – RCE of Citrix Application Delivery Controller and Citrix Gateway - CVSS 9.8
9.CVE-2020-10189 – RCE for ZoHo ManageEngine Desktop Central - CVSS 9.8
10.CVE-2014-1812 – Windows Local Privilege Escalation - CVSS 9.0
11.CVE-2019-3398 – Confluence Authenticated Remote Code Execution - CVSS 8.8
12.CVE-2020-0688 – Remote Command Execution in Microsoft Exchange - CVSS 8.8
13.CVE-2016-0167 – local privilege escalation on older versions of Microsoft Windows - CVSS 7.8
14.CVE-2017-11774 – RCE in Microsoft Outlook via crafted document execution (phishing) - CVSS 7.8
15.CVE-2018-8581 - Microsoft Exchange Server escalation of privileges - CVSS 7.4
16.CVE-2019-8394 – arbitrary pre-auth file upload to ZoHo ManageEngine ServiceDesk Plus - CVSS 6.5
What was stolen from FireEye?
Copyright © 2020 Ivanti. All rights reserved.
If a top cybersecurity firm can be
breached what chance do we stand?
• First and most important, there is no 100% in cybersecurity. There is always going to be the
next threat, the next exploit, the next zero day.
• FireEye and SolarWinds were targeted by a well-funded, sophisticated, and persistent nation
state threat actor with top-tier offensive capabilities.
A strong cybersecurity program:
• is about identifying and mitigating risk.
• understands that no defense is perfect, and uses defense in depth.
• assumes incidents will occur and plans to respond.
• is always evolving and adapting based on real world attacks and information.
• uses well-known security frameworks
Copyright © 2020 Ivanti. All rights reserved.
Prioritizing for 2021
• FireEye Breach CVE List
• NSA Top 25 CVEs targeted by Chinese State-Sponsored Actors
• DHS CISA Top 10 Routinely Exploited Vulnerabilities
• Gartner Top 10 Security Projects for 2021
• Coveware Ransomware Trends
• Verizon Data Breach Investigations Report
Footer
Copyright © 2020 Ivanti. All rights reserved.
See you in January, 2021 as we launch the Ivanti Insights podcast series!
Thank You!

More Related Content

PPTX
Webinar Ivanti Neurons For Patch Intelligence
PDF
Virtual Lunch & Learn - Netherlands
PPTX
Ivanti for msp
PDF
Navigating Zero Trust Presentation Slides
PPTX
6 Defence-In-Depth Security Tactics as Recommended by the National Cyber Secu...
PPTX
Addressing Healthcare Challenges Today
PDF
Cybersecurity Insiders Webinar - Zero Trust: Best Practices for Securing the...
PDF
How Zero Trust Makes the Mission Simple & Secure
Webinar Ivanti Neurons For Patch Intelligence
Virtual Lunch & Learn - Netherlands
Ivanti for msp
Navigating Zero Trust Presentation Slides
6 Defence-In-Depth Security Tactics as Recommended by the National Cyber Secu...
Addressing Healthcare Challenges Today
Cybersecurity Insiders Webinar - Zero Trust: Best Practices for Securing the...
How Zero Trust Makes the Mission Simple & Secure

What's hot (20)

PPTX
How to Perform Continuous Vulnerability Management
PPTX
Challenges and Solution to Mitigate the cyber-attack on Critical Infrastruct...
PPTX
The State Of Information and Cyber Security in 2016
PDF
Solving the Asset Management Challenge for Cybersecurity (It’s About Time)
PPTX
NDIA 2021 - solar winds overview and takeaways
PPTX
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
PDF
Cyber Security For Organization Proposal PowerPoint Presentation Slides
PDF
Cyber Threat Intelligence: Highlights and Trends for 2020
PDF
Protect your company from zero-day with ESET Dynamic Threat Defense
PPTX
SC Magazine & ForeScout Survey Results
PDF
Moving Beyond Zero Trust
PPTX
Cyber Ethics: Cyber Security Services | VAPT and WAPT
PDF
Top Cybersecurity Trends of 2021
PPTX
Securing medical apps in the age of covid final
PDF
Tomorrow Starts Here - Security Everywhere
PPTX
The Zero Trust Model of Information Security
PPTX
Symantec and ForeScout Delivering a Unified Cyber Security Solution
PDF
Top 7 Security Measures for IoT Systems
PDF
Enhancing Authentication to Secure the Open Enterprise
PDF
Uncover security incidents with ESET Enterprise Inspector
How to Perform Continuous Vulnerability Management
Challenges and Solution to Mitigate the cyber-attack on Critical Infrastruct...
The State Of Information and Cyber Security in 2016
Solving the Asset Management Challenge for Cybersecurity (It’s About Time)
NDIA 2021 - solar winds overview and takeaways
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
Cyber Security For Organization Proposal PowerPoint Presentation Slides
Cyber Threat Intelligence: Highlights and Trends for 2020
Protect your company from zero-day with ESET Dynamic Threat Defense
SC Magazine & ForeScout Survey Results
Moving Beyond Zero Trust
Cyber Ethics: Cyber Security Services | VAPT and WAPT
Top Cybersecurity Trends of 2021
Securing medical apps in the age of covid final
Tomorrow Starts Here - Security Everywhere
The Zero Trust Model of Information Security
Symantec and ForeScout Delivering a Unified Cyber Security Solution
Top 7 Security Measures for IoT Systems
Enhancing Authentication to Secure the Open Enterprise
Uncover security incidents with ESET Enterprise Inspector
Ad

Similar to Ivanti Insights Podcast - FireEye Breach (20)

PPTX
Everything You Need to Know About BlueKeep
PPTX
Michael andersson - att ligga steget före in en allt mer hotfylld värld BC14
PDF
Nuts & Bolts of the Dynamic Attack Chain
PPTX
Making Threat Management More Manageable
PPTX
2019 Cybersecurity Retrospective and a look forward to 2020
PDF
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
PPTX
Stop Watering Holes, Spear-Phishing and Drive-by Downloads
PPT
Volume And Vectors 090416
PDF
Software management, the seasonal return of DDoS - This Week in Security.pdf
PDF
IBM X-Force Threat Intelligence Quarterly Q4 2015
PDF
Rooted2020 stefano maccaglia--_the_enemy_of_my_enemy
PDF
The CISO Problems Risk Compliance Management in a Software Development 030420...
PDF
FireEye Use Cases — FireEye Solution Deployment Experience
PDF
RIFDHY RM ( Cybersecurity ).pdf
PPTX
Attack Autopsy: A Study of the Dynamic Attack Chain
PPTX
105 Common information security threats
PPTX
Task Incident Readiness with Veris, Judy Nowak at TASK Toronto, April 27, 2...
PDF
Lessons learned from 2017 cybersecurity incidents, 2018 and beyond
PPTX
Cisco Web and Email Security Overview
PDF
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Everything You Need to Know About BlueKeep
Michael andersson - att ligga steget före in en allt mer hotfylld värld BC14
Nuts & Bolts of the Dynamic Attack Chain
Making Threat Management More Manageable
2019 Cybersecurity Retrospective and a look forward to 2020
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Stop Watering Holes, Spear-Phishing and Drive-by Downloads
Volume And Vectors 090416
Software management, the seasonal return of DDoS - This Week in Security.pdf
IBM X-Force Threat Intelligence Quarterly Q4 2015
Rooted2020 stefano maccaglia--_the_enemy_of_my_enemy
The CISO Problems Risk Compliance Management in a Software Development 030420...
FireEye Use Cases — FireEye Solution Deployment Experience
RIFDHY RM ( Cybersecurity ).pdf
Attack Autopsy: A Study of the Dynamic Attack Chain
105 Common information security threats
Task Incident Readiness with Veris, Judy Nowak at TASK Toronto, April 27, 2...
Lessons learned from 2017 cybersecurity incidents, 2018 and beyond
Cisco Web and Email Security Overview
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Ad

More from Ivanti (20)

PDF
Français Patch Tuesday - Juillet
PDF
July Patch Tuesday
PDF
Français Patch Tuesday - Juin
PDF
June Patch Tuesday
PDF
Français Patch Tuesday - Mai
PDF
May Patch Tuesday
PDF
Français Patch Tuesday - Avril
PDF
April Patch Tuesday
PDF
Français Patch Tuesday - Mars
PDF
March Patch Tuesday
PDF
Français Patch Tuesday - Février
PDF
February Patch Tuesday
PDF
Patch Tuesday de Diciembre
PDF
Français Patch Tuesday - Décembre
PDF
Patch Tuesday Italia Dicembre
PDF
December Patch Tuesday
PDF
Patch Tuesday de Noviembre
PDF
Français Patch Tuesday - Novembre
PDF
Patch Tuesday Italia Novembre
PDF
November Patch Tuesday
Français Patch Tuesday - Juillet
July Patch Tuesday
Français Patch Tuesday - Juin
June Patch Tuesday
Français Patch Tuesday - Mai
May Patch Tuesday
Français Patch Tuesday - Avril
April Patch Tuesday
Français Patch Tuesday - Mars
March Patch Tuesday
Français Patch Tuesday - Février
February Patch Tuesday
Patch Tuesday de Diciembre
Français Patch Tuesday - Décembre
Patch Tuesday Italia Dicembre
December Patch Tuesday
Patch Tuesday de Noviembre
Français Patch Tuesday - Novembre
Patch Tuesday Italia Novembre
November Patch Tuesday

Recently uploaded (20)

PDF
Advanced IT Governance
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Sensors and Actuators in IoT Systems using pdf
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
Modernizing your data center with Dell and AMD
PPTX
Cloud computing and distributed systems.
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PPTX
breach-and-attack-simulation-cybersecurity-india-chennai-defenderrabbit-2025....
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
GDG Cloud Iasi [PUBLIC] Florian Blaga - Unveiling the Evolution of Cybersecur...
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Transforming Manufacturing operations through Intelligent Integrations
PDF
GamePlan Trading System Review: Professional Trader's Honest Take
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Machine learning based COVID-19 study performance prediction
PDF
solutions_manual_-_materials___processing_in_manufacturing__demargo_.pdf
Advanced IT Governance
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Sensors and Actuators in IoT Systems using pdf
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
NewMind AI Monthly Chronicles - July 2025
Modernizing your data center with Dell and AMD
Cloud computing and distributed systems.
20250228 LYD VKU AI Blended-Learning.pptx
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
breach-and-attack-simulation-cybersecurity-india-chennai-defenderrabbit-2025....
Spectral efficient network and resource selection model in 5G networks
GDG Cloud Iasi [PUBLIC] Florian Blaga - Unveiling the Evolution of Cybersecur...
“AI and Expert System Decision Support & Business Intelligence Systems”
Transforming Manufacturing operations through Intelligent Integrations
GamePlan Trading System Review: Professional Trader's Honest Take
Advanced methodologies resolving dimensionality complications for autism neur...
Review of recent advances in non-invasive hemoglobin estimation
Machine learning based COVID-19 study performance prediction
solutions_manual_-_materials___processing_in_manufacturing__demargo_.pdf

Ivanti Insights Podcast - FireEye Breach

  • 1. Copyright © 2020 Ivanti. All rights reserved.Copyright © 2020 Ivanti. All rights reserved. Chris Goettl / Phil Richards Hosted by Adrian Vernon DECEMBER 16, 2020 FireEye Breach Investigation Uncovers Much Larger SolarWinds Breach
  • 2. Copyright © 2020 Ivanti. All rights reserved. Situation Analysis Recommendations Exploit Type: Exposure: Attack Vectors:Impact: Vendor Risk Management Endpoint Detection and Response FireEye is an organization well equipped to investigate a security breach. It is no surprise that the cybersecurity firm quickly found how the attackers gained entry and what they compromised. The scope of the true incident is surprising. The source of the attack was found to be a backdoor introduced into SolarWinds Orion which may have been downloaded by as many as 18,000 entities globally. Ransomware FireEye Breach Part of a Larger Incident 25 Confirmed entities victimized by SolarWinds backdoor Data Theft SolarWinds Orion Trojan Continuous Vulnerability Management Red Team Exercises Emergency Response Planning Data Protection
  • 3. Copyright © 2020 Ivanti. All rights reserved. 1.CVE-2019-11510 – pre-auth arbitrary file reading from Pulse Secure SSL VPNs - CVSS 10.0 2.CVE-2020-1472 – Microsoft Active Directory escalation of privileges - CVSS 10.0 3.CVE-2018-13379 – pre-auth arbitrary file reading from Fortinet Fortigate SSL VPN - CVSS 9.8 4.CVE-2018-15961 – RCE via Adobe ColdFusion (arbitrary file upload that can be used to upload a JSP web shell) - CVSS 9.8 5.CVE-2019-0604 – RCE for Microsoft Sharepoint - CVSS 9.8 6.CVE-2019-0708 – RCE of Windows Remote Desktop Services (RDS) - CVSS 9.8 7.CVE-2019-11580 - Atlassian Crowd Remote Code Execution - CVSS 9.8 8.CVE-2019-19781 – RCE of Citrix Application Delivery Controller and Citrix Gateway - CVSS 9.8 9.CVE-2020-10189 – RCE for ZoHo ManageEngine Desktop Central - CVSS 9.8 10.CVE-2014-1812 – Windows Local Privilege Escalation - CVSS 9.0 11.CVE-2019-3398 – Confluence Authenticated Remote Code Execution - CVSS 8.8 12.CVE-2020-0688 – Remote Command Execution in Microsoft Exchange - CVSS 8.8 13.CVE-2016-0167 – local privilege escalation on older versions of Microsoft Windows - CVSS 7.8 14.CVE-2017-11774 – RCE in Microsoft Outlook via crafted document execution (phishing) - CVSS 7.8 15.CVE-2018-8581 - Microsoft Exchange Server escalation of privileges - CVSS 7.4 16.CVE-2019-8394 – arbitrary pre-auth file upload to ZoHo ManageEngine ServiceDesk Plus - CVSS 6.5 What was stolen from FireEye?
  • 4. Copyright © 2020 Ivanti. All rights reserved. If a top cybersecurity firm can be breached what chance do we stand? • First and most important, there is no 100% in cybersecurity. There is always going to be the next threat, the next exploit, the next zero day. • FireEye and SolarWinds were targeted by a well-funded, sophisticated, and persistent nation state threat actor with top-tier offensive capabilities. A strong cybersecurity program: • is about identifying and mitigating risk. • understands that no defense is perfect, and uses defense in depth. • assumes incidents will occur and plans to respond. • is always evolving and adapting based on real world attacks and information. • uses well-known security frameworks
  • 5. Copyright © 2020 Ivanti. All rights reserved. Prioritizing for 2021 • FireEye Breach CVE List • NSA Top 25 CVEs targeted by Chinese State-Sponsored Actors • DHS CISA Top 10 Routinely Exploited Vulnerabilities • Gartner Top 10 Security Projects for 2021 • Coveware Ransomware Trends • Verizon Data Breach Investigations Report Footer
  • 6. Copyright © 2020 Ivanti. All rights reserved. See you in January, 2021 as we launch the Ivanti Insights podcast series! Thank You!