CIC-ATT&CK

Critical Infrastructure Cybersecurity

Secure Environment
Critical Infrastructure Cybersecurity Framework
HomeAttack Flows

Interactive Attack Flows

Visualize Real-World Attack Sequences

Step-by-step visualizations of documented cyber attacks showing how adversaries chain techniques together to achieve their objectives.

SolarWinds Supply Chain Attack

The SUNBURST attack compromised SolarWinds Orion software updates to gain access to thousands of organizations including government agencies.

APT29 (Cozy Bear)Government, Technology
Initial Access
T1195.002
Supply Chain Compromise
Step 1
Execution
T1569.002
System Services
Step 2
Defense Evasion
T1027
Obfuscated Files or Information
Step 3
Command and Control
T1071.004
Application Layer Protocol
Step 4
Credential Access
T1552.004
Unsecured Credentials
Step 5
Lateral Movement
T1550.001
Use Alternate Authentication Material
Step 6
Step 1 of 6

Initial Access

T1195.002

Supply Chain Compromise: Compromise Software Supply Chain

Adversaries compromised the SolarWinds Orion build process to inject malicious code (SUNBURST) into legitimate software updates.

Indicators of Compromise
  • Modified DLL files in Orion updates
  • Unusual build process modifications
  • Code signing with legitimate certificates
Mitigations
  • Software supply chain integrity verification
  • Code signing validation
  • Build process security

By using this website, you agree to our legal documents. Please review our Privacy Policy, Terms of Use, and Accessibility Statement in the footer.