U.S. Government Formally Attributes SolarWinds Compromise to Russian SVR
The Cyber Unified Coordination Group formally attributed the SolarWinds Orion supply-chain compromise to Russia's Foreign Intelligence Service (SVR), describing it as a likely intelligence-gathering operation.
The Cyber Unified Coordination Group — composed of the FBI, NSA, CISA, and the Office of the Director of National Intelligence — issued a joint statement today formally attributing the SolarWinds Orion supply-chain compromise to an Advanced Persistent Threat actor "likely Russian in origin," widely understood to be the SVR's APT29 (Cozy Bear).
The compromise, first publicly disclosed by FireEye in December 2020 after the security firm discovered its own red-team tools had been stolen, involved trojanized updates to SolarWinds' Orion network monitoring product. An estimated 18,000 customers downloaded the malicious update, with a much smaller subset — including the Treasury, Commerce, State, Energy, and Homeland Security departments — targeted with follow-on intrusion activity.
"This work indicates that an Advanced Persistent Threat (APT) actor, likely Russian in origin, is responsible for most or all of the recently discovered, ongoing cyber compromises of both government and non-governmental networks," the agencies wrote. "This is a serious compromise that will require a sustained and dedicated effort to remediate."
The joint statement characterizes the operation as "an intelligence gathering effort" rather than a destructive attack. The Biden administration imposed sanctions on six Russian technology companies in April, and expelled ten Russian diplomats, in part as retaliation for the operation.
The SolarWinds intrusion is now considered alongside NotPetya as a defining moment in supply-chain cybersecurity, accelerating regulatory and procurement requirements around software bills of materials and code-signing practices.