SolarStorm attack - Share your thoughts

Showing results for 
Show  only  | Search instead for 
Did you mean: 

SolarStorm attack - Share your thoughts

L1 Bithead

Hi everyone, we know there is a lot of news about the SolarWinds supply chain attack (SolarStorm Attack), and we want to let you know that we are here to help and want to make sure you have all the resources and information you need. 


We put together a blog sharing all the different ways Palo Alto Networks can help you navigate during this time. Learn about the upcoming Linkedin Live series where Palo Alto Networks leaders and industry experts will be talking about how to assess your exposure in the wake of the SolarStorm attack. We guide you through all of the information here.


L6 Presenter

I'm surprised more of these attacks haven't occurred or at least been detected.  Last year I went to an ICS security conference in Atlanta and sat through a briefing on this very topic.  A company Adolus had been working with the DHS under a SVIP project to develop protections in the ICS / IoT space against supply chain attacks.  It basically involves embedding some sort of visibility within a vendor directly monitoring suppliers directly within their core private networks.  Under this project there's an attempt to create a trust within the larger global supply chain ecosystem.  


The brief really got me excited and hopeful that something like this could be used to prevent such attacks, but it only works if you have vendor involvement, or if the government mandates it.  There have been other successful supply chain attacks in the past (Rockwell / Dragonfly) nothing as large as Solarwinds, but there's still an obvious need to better protect our supply chain.

L1 Bithead

Hi everyone! Wanted to let you all know there are some upcoming webinars that Unit 42 is hosting around the SolarStorm Attack! Ryan Olson, VP of Threat Intelligence here at Palo Alto Networks, will share some countermeasures you can take today to help protect your organization. He will also cover information about the Palo Alto Networks Response program and how it can help your organization assess and remediate risks related to SolarWinds. Find all upcoming webinars and registration information here.

I heard that even PAN got hacked as well because it is using Solarwinds in its environment.

@dtran wrote:

I heard that even PAN got hacked as well because it is using Solarwinds in its environment.

Well considering "...including more than 425 of the companies listed on the Fortune 500 as well as the top 10 telecom operators in the United States." it wouldn't surprise me if Palo Alto might have been running the affected software.  Further just because a company might have been running Orion doesn't mean they had deployed the vulnerable software versions.


That listing of 425 companies was more likely just a listing of "customers" and not necessarily customers running affected software versions.

Like what you see?

Show your appreciation!

Click Like if a post is helpful to you or if you just want to show your support.

Click Accept as Solution to acknowledge that the answer to your question has been provided.

The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!

These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!

The LIVEcommunity thanks you for your participation!