San Antonio Express-News

Solarwinds grapples with fallout from breach

- By Kara Carlson

Austin-based software maker Solarwinds — along with the cybersecur­ity industry at large — continues to grapple with how to move forward from the massive cyber breach last year that allowed hackers access to multiple federal agencies and more than 100 private-sector companies.

Solarwinds is facing a week of reckoning, as the company issued its quarterly earnings Thursday — on the same week that it faced congressio­nal hearings on the breach.

While Solarwinds was the first

known supply chain victim from the attack, other technology companies, including Microsoft, were also exploited by hackers who took advantage of the companies’ large customer bases and leveraged software programs during the breach.

Since the start of the year, Solarwinds has debuted a new CEO

as it continues its investigat­ion into the breach and works to ramp up its own security. The company, which makes network and IT management software, was founded in 1999 in Tulsa before moving to Austin in 2006.

In December, media outlets began reporting that a sophisti

cated hacking group backed by a foreign government might have stolen informatio­n from U.S. government agencies, including email traffic.

Details have since emerged to reveal the breach, which was likely Russian in origin, was potentiall­y undetected for months.

Dan Ives, an analyst with Wedbush Securities, said there are still more questions than answers related to the hack, and said Solarwinds now has to work to make sure this is a “dark chapter in its history” and not what defines the company going forward.

“It’s been a living nightmare for the industry, and Solarwinds has been front and center,” Ives said. “No company in their wildest nightmares wants to be the center of a congressio­nal investigat­ion that spawned a massive fear around threats.”

Ives said the company was caught in the middle of cyber warfare that will continue to scale up as more data goes into the cloud and bad actors and nation-states continue attacking enterprise­s.

Last week, the White House said it would take several more months to investigat­e the extensive hack. The breach, which Homeland Security Department’s Cybersecur­ity and Infrastruc­ture Security Agency has called the

hack a grave risk to government and private networks, has been difficult to detect and undo, according to security experts.

Executives from Solarwinds, Microsoft and cybersecur­ity firms Fireeye and Crowdstrik­e testified Tuesday about the attack before the U.S. Senate’s Select Committee on Intelligen­ce. The companies are also expected to testify Friday before the House Oversight and Homeland Security Committees.

“We are committed to not only leading the way, with respect to secure software developmen­t but to sharing our learnings with the industry,” Solarwinds CEO Sudhakar Ramakrishn­a said at the Senate hearing. “While numerous experts have commented on the difficulti­es that these nation-state operations present to any company, we are embracing our responsibi­lity to being an active participan­t in helping prevent these types of attacks.”

In January, Ramakrishn­a took over as CEO in a move that had been announced just days before the cyberattac­k discovery. Ramakrishn­a replaced former president and CEO Kevin Thompson.

Company leaders said Tuesday they still do not know the true scope or scale of the breaches. Solarwinds and other technology leaders are calling for more transparen­cy and tools in the nation’s fight against cyber espionage.

Microsoft president Brad Smith

said the hack was the work of at least 1,000 “very skilled, very capable” technology experts. The hearing also revealed that Amazon Web Services infrastruc­ture was used in the attack. AWS declined to attend the hearing, and while there is no indication that the cloud computing systems were directly breached, researcher­s speculate the data centers were used to launch a key part of the attack.

Solarwinds said the breach is believed to be the result of hackers making their way into a number of systems by tampering with an update server on the company’s network management system. Once in, the hackers were able to gain remote access and insert malicious code that hitched a ride into other systems on a Solarwinds software update.

The company said the hackers used a “highly sophistica­ted and novel code” that was designed to inject malicious code into the system without detection by the company. The hackers also used multiple U.s.-based servers to mimic legitimate network traffic and avoid detection from affected companies and the government.

Solarwinds said as many as 18,000 of its more than 30,000 customers might have been running software that contained a vulnerabil­ity hackers used to penetrate networks. In a Thursday conference call with investors, Ramakrishn­a said the number of these companies actually compromise­d is likely “substantia­lly fewer” but did not give a specific number.

Microsoft additional­ly has notified about 60 of its customers that were likely compromise­d in the breach. The company’s Azure cloud service was used by the hackers and also its Office 365 products contained email messages and documents targeted in the attack.

Ives said the industry as a whole is attempting to learn from its mistakes, and Solarwinds appears to be trying to be a part of the solution.

“The company is not going to hide, and now they need to plow forward and handhold investors, customers and partners through this Category 5 storm,” Ives said.

Solarwinds stock has taken a hit in recent months, dropping about 30 percent in the past three months, but Thursday the company reported better than expected earnings results for the fourth quarter. The company had $265.5 million in revenue, a 6 percent year-over-year increase.

“We’ve added a level of security and review through tools, processes, automation and where necessary, manual checks around our product developmen­t processes that we believe goes well beyond industry norms to ensure the integrity and security of all of our products,” Ramakrishn­a said Thursday.

He said the company believes

there are no further risks in using the company’s products, and the company also has a committee overseeing the response to cyber incidents, and improvemen­t initiative­s.

“The sophistica­ted cyberattac­k on us and our customers at the end of the fourth quarter has taught us a great deal about the resiliency of our business, the commitment of our employees, and the support we can expect from our customers and partners,” Ramakrishn­a said.

Solarwinds also said it expects to headwinds in the coming quarters due to both the breach and the pandemic, but is confident demand will remain. Ramakrishn­a said most customers are still choosing to renew products. Solarwinds also said it expects legal and profession­al services costs related to the breach to occur.

Ives predicted that findings on the breach will continue to come out in the coming months and years. Ives said Solarwinds, in addition to Fireeye, Microsoft and other companies with be crucial to ensuring something of this scale does not happen again. He also predicted the industry at large will drasticall­y increase cybersecur­ity spending.

“For Solarwinds they can use this nightmaris­h challenge as an opportunit­y,” he said. “It’s definitely going to be a long road ahead. But the company’s back has been against the wall before.”

 ?? American-statesman / Tribune News Service file photo ?? Solarwinds, an Austin-based software company, is looking to move forward from last year's cyberattac­k breach.
American-statesman / Tribune News Service file photo Solarwinds, an Austin-based software company, is looking to move forward from last year's cyberattac­k breach.

Newspapers in English

Newspapers from United States