No other goods have been identified to incorporate malicious code equivalent to the one found in the Orion platform, IT program enterprise SolarWinds claimed on Tuesday.

The firm’s assertion will come right after it carried out an interior audit of all its apps after news broke on Sunday that Russian condition-sponsored hackers breached its interior network and inserted malware inside Orion, a community monitoring and inventory platform.

The malware, named SUNBURST (or Solorigate), was inserted in Orion app variations 2019.4 by way of 2020.2.1, unveiled between March 2020 and June 2020.

“We have scanned the code of all our computer software goods for markers similar to people employed in the assault on our Orion System solutions recognized earlier mentioned, and we have uncovered no evidence that other versions of our Orion Platform goods or our other solutions contain those markers,” the firm said right now.

“We have also located no evidence that our SolarWinds MSP solutions, such as RMM and N-central, and any of our absolutely free applications or brokers include the markers stated higher than,” it added in an update to a security advisory it originally published on Sunday.

But while SolarWinds was happy that the malware did not make its way into other merchandise, the reality that it manufactured it into Orion, 1 of its most popular offerings, was more than enough.

In SEC filings on Monday, SolarWinds stated that of its 300,000 complete clients, far more than 33,000 made use of the Orion platform, and about 18,000 downloaded the malware-laced versions.

However, hackers didn’t hassle accessing the networks of all these corporations instead, only restricting on their own to breaking into a couple picked targets. At the time of producing, the checklist of identified victims hacked by using the Orion platform as an entry point features the likes of:

  • US cybersecurity company FireEye
  • The US Treasury Division
  • The US Office of Commerce’s Countrywide Telecommunications and Information and facts Administration (NTIA)
  • The Office of Health’s Countrywide Institutes of Health (NIH)
  • The Cybersecurity and Infrastructure Agency (CISA)
  • The Section of Homeland Stability (DHS)
  • The US Office of Point out

New Orion update unveiled now to clear away malware components

At the moment, SolarWinds is in destruction regulate manner and is seeking to prohibit the extent of the hack. The firm has labored since very last week to set collectively a new Orion application update that eliminates any traces of the malware from contaminated devices.

Whilst the hackers stopped inserting their malware inside the Orion binaries considering that June and subsequent Orion updates ended up clear, parts of the SUNBURST malware remained on infected devices and could have been abused for future assaults.

This risk was also mitigated now when Microsoft and a coalition of tech and govt partners intervened to seize the malware’s command and manage server.

SolarWinds is now asking buyers to update to versions 2019.4 HF 6 and 2020.2.1 HF 2 to swap the Orion malware-laced parts with clean variations and do away with any danger.

The transfer comes just in time as Microsoft also announced programs to put regarded destructive Orion application binaries in quarantine starting tomorrow, Wednesday, December 16, which would have most very likely resulted in unpredicted crashes for Orion application buyers.