Resources for the SolarWinds Breach

Helpful videos, articles, and links to keep you informed on all the latest happenings with the SolarWinds cyberattack.


Subscribe to our newsletter

Subscribe to get the most up-to-date third-party risk management information and resources.


SolarWinds and the Supply Chain, the Threat We’ve Ignored for Too Long

Watch this panel discussion featuring Jim Routh, Head of Enterprise Cyber Security at MassMutual and Robert Brese, VP at Gartner and the former CIO of the US DoE examining the immediate impact of the SolarWinds hack, including what could have been done to prevent this incident and how to ensure it does not happen to your firm. 

RiskRecon Assets


Entities Signaling to SUNBURST C2 Infrastructure

RiskRecon’s analysis of nearly 140,000 SUNBURST C2 subdomains reveals 129 distinct entities potentially signaling to the SUNBURST command and control servers, ranging from defense contractors to the United Nations. This blog post details the analysis conducted by the RiskRecon team including the Data Sources and Methodology.

Data File

Analysis of SUNBURST Signaling Entities

RiskRecon is making the list of potentially impacted entities available to risk professionals. If you would like to receive the data file containing the list of the companies identified, along with the associated data, please click the learn more button and our Customer Support team can validate your request.

Key Articles


SolarWinds hack that breached gov networks poses a “grave risk” to the nation

This article from ARS Technica discusses the tactics used in the SolarWinds supply chain hack and goes through some of the identified areas of the federal government which will have long-lasting security effects.


SolarWinds Hack Could Affect 18K Customers

Krebs on Security provides in-depth coverage on the possible ecosystem of the breach that could affect as many as 18,000 SolarWinds customers.


Highly Evasive Attacker Leverages SolarWinds Supply Chain to Compromise Multiple Global Victims With SUNBURST Backdoor

FireEye's Threat Research team put together a write describing the global intrusion campaign that impacted their systems.

Government Notifications


Alert (AA20-352A) - Advanced Persistent Threat Compromise of Government Agencies, Critical Infrastructure, and Private Sector Organizations

The Cybersecurity and Infrastructure Security Agency (CISA) is aware of compromises of U.S. government agencies, critical infrastructure entities, and private sector organizations by an advanced persistent threat (APT) actor beginning in at least March 2020. This APT actor has demonstrated patience, operational security, and complex tradecraft in these intrusions. CISA expects that removing this threat actor from compromised environments will be highly complex and challenging for organizations.


Emergency Directive 21-01-Mitigate SolarWinds Orion Code Compromise

This page contains a web-friendly version of the Cybersecurity and Infrastructure Security Agency’s Emergency Directive 21-01, “Mitigate SolarWinds Orion Code Compromise”.

“BitSight has been great to work with, they are always very responsive and have one of the best post-sales support teams I have worked with.”

Director, IT Security in the Finance Industry at a $3B - $10-B organization

Bi-weekly group demos & live Q&A

We will demonstrate different product features, best practices, and how to tackle varying use cases.