January 8, 2021

Well configured firewalls against Solarwinds backdoor style c2 compromises

A rule that only allowed the Solarwinds server access to the Internet if it was using the OIP protocol AND using the FQDN [api.solarwinds.com](https://api.solarwinds.com) would have protected any network.

Hindsight can teach us something here.

We need to be very selective at what traffic we are allowing out from critical systems. If we need telemetry or updates we need to be able to whitelist these explicitly.

If you follow this simple suggestion the next backdoor we discover like this will be completely blocked by YOUR firewall.

Leave a Reply

Your email address will not be published. Required fields are marked *

Note: By filling this form and submitting your commen, you acknowledge, agree and comply with our terms of service. In addition you acknowledge that you are willingly sharing your email address with AiOWikis and you might receive notification emails from AiOWikis for comment notifications. AiOWiksi guarantees that your email address WILL NOT be used for advertisement or email marketting purposes.

This site uses Akismet to reduce spam. Learn how your comment data is processed.