Company type | Public company |
---|---|
| |
ISIN | US83417Q1058 |
Industry | Software |
Genre | Network monitoring |
Founded | 1999Tulsa, Oklahoma, U.S. | in
Founders |
|
Headquarters | , U.S. |
Key people | Sudhakar Ramakrishna (CEO) [1] |
Products | AppOptics, Loggly, Pingdom, Papertrail |
Revenue | US$719 million (2022) |
US$−820 million (2022) | |
US$−929 million (2022) | |
Total assets | US$3.20 billion (2022) |
Total equity | US$1.37 billion (2022) |
Number of employees | 2,305 (Dec 2022) |
Website | www |
Footnotes /references [2] |
SolarWinds Corporation is an American company that develops software for businesses to help manage their networks, systems, and information technology infrastructure. It is headquartered in Austin, Texas, with sales and product development offices in a number of locations in the United States and several other countries. [3] The company was publicly traded from May 2009 until the end of 2015, and again from October 2018. It has also acquired a number of other companies, some of which it still operates under their original names, including Pingdom, Papertrail, and Loggly. [4] It had about 300,000 customers as of December 2020, including nearly all Fortune 500 companies and numerous agencies of the US federal government. [5] [6]
A SolarWinds product, Orion, used by about 33,000 public and private sector customers, was the focus of a large-scale attack disclosed in December 2020. The attack persisted undetected for months in 2020, and additional details about the breadth and depth of compromised systems continued to surface after the initial disclosure. [7] In February 2021, Microsoft President Brad Smith said that it was "the largest and most sophisticated attack the world has ever seen". [8]
SolarWinds began in 1999 in Tulsa, Oklahoma, co-founded by Donald Yonce (a former executive at Walmart) and his brother Dave Yonce. [9] [10] [11] [12] SolarWinds released its first products, Trace Route and Ping Sweep, earlier in March 1998 and released its first web-based network performance monitoring application in November 2001. [13] SolarWinds got its name by combining two words that evoke natural, powerful, and dynamic forces. "Solar" refers to the sun, symbolizing energy, light, and vitality, while "Winds" suggests movement, change, and momentum. Together, the name reflects the company's goal of providing efficient and powerful IT management software that brings solutions to businesses in a dynamic and impactful way. In 2006, the company moved its headquarters to Austin, Texas, [10] where about 300 of the company's total 450 employees were based as of 2011. [9] The company was profitable from its founding through its IPO in 2009. [14]
During 2007, SolarWinds raised funding from Austin Ventures, Bain Capital, and Insight Venture Partners. [15] [16] SolarWinds completed an initial public offering of US$112.5 million in May 2009, [10] closing at higher prices after its initial day of trading. [17] The IPO from SolarWinds was followed by another from OpenTable (an online restaurant-reservation service), which was perceived to break a dry spell during the Great Recession, when very few companies went public. [18] Both Bain Capital and Insight Venture Partners backed the IPO and used the opportunity to sell some of their shares during the offering. [14]
Analysts and company executives anticipated continued expansion post-IPO, including several acquisitions. [19] In 2010, Bennett retired as CEO and was replaced by the company's former chief financial officer Kevin Thompson. [10] In May 2013, SolarWinds announced plans to invest in an operations hub in Salt Lake City, Utah. It was named by Forbes as "Best Small Company in America, citing high-functioning products for low costs and impressive company growth." By 2013, SolarWinds employed about 900 people. [20]
Acquisition by private equity technology investment firms Silver Lake Partners and Thoma Bravo, LLC. was announced in late 2015, [21] [22] and by January 2016, SolarWinds was taken private in a $4.5 billion deal. At the time, the company had 1,770 employees worldwide with 510 based in Austin, and reported revenues of about half a billion dollars a year. [23]
In November 2017, SolarWinds released AppOptics which integrates much of their software portfolio, including Librato and TraceView, into a single software-as-a-service package. AppOptics included compatibility with Amazon Web Services and Microsoft Azure. [24]
In September 2018, SolarWinds filed for a public offering again, after three years of being owned by private equity firms. [25] SolarWinds completed their public offering on October 19, 2018. [26]
On December 7, 2020, CEO Kevin Thompson retired, to be replaced by Sudhakar Ramakrishna, CEO of Pulse Secure, effective January 4, 2021. [1] [27] [28]
On January 8, 2021, SolarWinds hired former CISA director Chris Krebs to help the company work through the recent cyber attack. [29]
In July 2021, SolarWinds separated its managed service provider (MSP) business from the main company. The new separately-traded public company is named N-able. [30]
According to The Wall Street Journal , SolarWinds offers freely downloadable software to potential clients and then markets more advanced software to them by offering trial versions. [31] Following the funding in 2007, SolarWinds acquired several companies including Neon Software and ipMonitor Corp. and opened a European sales office in Ireland. [32]
During and after its IPO in 2009, SolarWinds acquired a number of other companies and products, including the acquisition of the New Zealand–based software maker Kiwi Enterprises, which was announced in January 2009. [33]
SolarWinds acquired several companies in 2011 and was ranked number 10 on Forbes magazine's list of fastest-growing tech companies. [34] In January 2011, it acquired Hyper9 Inc, an Austin-based virtualization management company with undisclosed terms. [35] In July, SolarWinds completed the acquisition of the Idaho-based network security company TriGeo for $35 million. [34] [36] TriGeo's offices in Post Falls were added to the list of SolarWinds location which already included satellite offices in Dallas, Salt Lake City, and Tulsa, as well as operations in Australia, the Czech Republic, India, Ireland, and Singapore. [37] In 2012 SolarWinds acquired the patch management software provider EminentWare, [38] and RhinoSoft, adding the latter company's FTP Voyager product to SolarWinds' product suite. [39]
In early 2013, SolarWinds acquired N-able Technologies, a cloud-based information technology services provider. The deal was reportedly valued $120 million in cash. [40] In late 2013, it acquired the Boulder, Colorado–based database performance management company Confio Software. With the $103 million agreement, SolarWinds gained a sales office in London and Confio's main product, Ignite. [41] Between 2014 and 2015, the company acquired the Swedish web-monitoring company Pingdom, [42] [43] the San Francisco–based metrics and monitoring company Librato (for $40 million), [44] and the log management service Papertrail (for $41 million). [45]
Between 2015 and 2020, SolarWinds acquired Librato (a monitoring company), [46] Capzure Technology (an MSP Manager software to N-able which SolarWinds had previously acquired), [47] LogicNow (a remote monitoring software company), [48] SpamExperts (an email security company), [49] Loggly (a log management and analytics company), [4] Trusted Metrics (a provider of threat monitoring and management software), [50] Samanage (a service desk and IT asset management provider), [51] VividCortex (a database performance monitor), [52] and SentryOne (a provider of database performance monitoring). [53]
On December 13, 2020, The Washington Post reported that multiple government agencies were breached through SolarWinds's Orion software. [54] The next day, the company stated in an SEC filing that fewer than 18,000 of its 33,000 Orion customers were affected, involving certain hotfixes of versions 2019.4 through 2020.2.1, released between March 2020 and June 2020. [5] According to Microsoft, hackers acquired superuser access to SAML token-signing certificates. [55] This SAML certificate was then used to forge new tokens to allow hackers trusted and highly privileged access to networks. [56] The Cybersecurity and Infrastructure Security Agency issued Emergency Directive 21–01 in response to the incident, advising all federal civilian agencies to disable Orion. [57]
APT29, aka Cozy Bear, working for the Russian Foreign Intelligence Service (SVR), was reported to be behind the 2020 attack. [58] [59] Victims of this attack include the cybersecurity firm FireEye, the US Treasury Department, the US Department of Commerce's National Telecommunications and Information Administration, as well as the US Department of Homeland Security. [60] [61] Prominent international SolarWinds customers investigating whether they were impacted include the North Atlantic Treaty Organization (NATO), the European Parliament, UK Government Communications Headquarters, the UK Ministry of Defence, the UK National Health Service (NHS), the UK Home Office, and AstraZeneca. [62] [63] FireEye reported the hackers inserted "malicious code into legitimate software updates for the Orion software that allow an attacker remote access into the victim's environment" and that they have found "indications of compromise dating back to the spring of 2020". [64] FireEye named the malware SUNBURST. [65] [66] Microsoft called it Solorigate. [67] [66]
The attack used a backdoor in a SolarWinds library; when an update to SolarWinds occurred, the malicious attack would go unnoticed due to the trusted certificate. [68] In November 2019, a security researcher notified SolarWinds that credentials to a third party FTP server had a weak password of "solarwinds123", warning that "any hacker could upload malicious [code]" that would then be distributed to SolarWinds customers. [69] [70] [71] The New York Times reported SolarWinds did not employ a chief information security officer and that employee passwords had been posted on GitHub in 2019. [72]
On December 15, 2020, SolarWinds reported the breach to the Securities and Exchange Commission. [73] However, SolarWinds continued to distribute malware-infected updates, and did not immediately revoke the compromised digital certificate used to sign them. [69] [74] [75]
On December 16, 2020, German IT news portal Heise.de reported that SolarWinds had for some time been encouraging customers to disable anti-malware tools before installing SolarWinds products. [76] [77]
On December 17, 2020, SolarWinds said they would revoke the compromised certificates by December 21, 2020. [78]
On December 21, 2020, Attorney General William Barr stated that he believed that the SolarWinds hack appears to have been perpetrated by Russia, contradicting speculations by President Donald Trump that China, not Russia, might be to blame. [79]
In late December 2020, Trustwave, a cybersecurity firm, reached out to SolarWinds to report new security flaws they had discovered in software produced by SolarWinds. Although these vulnerabilities hadn't been taken advantage of by hackers, it raised questions concerning the network security of SolarWinds' customers. [80]
The magnitude of the monetary damage has yet to be calculated, but on January 14, 2021, CRN.com reported that the attack could cost cyber insurance firms at least $90 million. [81] [82]
On March 1, 2021, SolarWinds CEO, Sudhakar Ramakrishna, blamed a company intern for using an insecure password ("solarwinds123") on their update server. Speculation that this led to the attack is discounted by the company and security professionals. [83] [84] More than the intern using a weak password, experts noted that the main issue this fact highlights is the poor security culture the company has. [85]
In the aftermath of the incident there has been question raised within the US Government about the role Microsoft carried blame in enabling the breach. This relates to the "golden SAML" vulnerability in Microsoft's directory offerings that the company had knowledge of but did not address. Senator Ron Wyden questioned why the US Government spent so much money on Microsoft software without the company warning it of this hacking technique. [86]
On December 19, 2020, Microsoft said that its investigations into supply chain attacks at SolarWinds had found evidence of an attempted supply chain attack distinct from the attack in which SUNBURST malware was inserted into Orion binaries (see previous section). [87] [88] This second attack has been dubbed SUPERNOVA. [87] [88]
Security researchers from Palo Alto Networks said the SUPERNOVA malware was implemented stealthily. [89] SUPERNOVA comprises a very small number of changes to the Orion source code, implementing a web shell that acts as a remote access tool. [89] [90] The shell is assembled in-memory during SUPERNOVA execution, thus minimizing its forensic footprint. [89]
Unlike SUNBURST, SUPERNOVA does not possess a digital signature. [89] This is among the reasons why it is thought to have originated with a different group than the one responsible for SUNBURST. [89] [91]
SolarWinds's share price fell 25% within days of the SUNBURST breach becoming public knowledge, [73] and 40% within a week. [92] Insiders at the company had sold approximately $280 million in stock shortly before this became publicly known, [93] which was months after the attack had started. A spokesperson said that those who sold the stock had not been aware of the breach at the time. [1] [94] [95]
In November 2021 Microsoft issued an alert [96] in relation to the advanced persistent threat (APT) actor Nobelium (aka APT29; Cozy Bear) that was responsible for the 2020 SolarWinds supply chain attack is targeting cloud service providers (CSPs), managed service providers (MSPs), and other IT service providers. Microsoft Threat Intelligence Center (MSTIC) released a range of recommendations for service providers and downstream businesses to implement in order to address the threat. [97]
In January 2021, a class action lawsuit was filed against SolarWinds in relation to its security failures and subsequent fall in share price. [98] [99] SolarWinds attempted to have this case dismissed; in March 2022, a judge ruled that the class action lawsuit could move forward. [100] SolarWinds settled the suit for $26 million in November 2022, and was notified by the SEC that it intended to take enforcement action. [101]
Computer security is the protection of computer software, systems and networks from threats that can lead to unauthorized information disclosure, theft or damage to hardware, software, or data, as well as from the disruption or misdirection of the services they provide.
Blackbaud, Inc. is a cloud computing provider that supports nonprofits, foundations, corporations, education institutions, healthcare organizations, religious organizations, and individual change agents. Its products focus on fundraising, website management, CRM, analytics, financial management, ticketing, and education administration.
Fortinet, Inc. is a cybersecurity company with headquarters in Sunnyvale, California. The company develops and sells security solutions like firewalls, endpoint security and intrusion detection systems. Fortinet has offices located all over the world.
Ivanti is an IT software company headquartered in South Jordan, Utah, United States. It produces software for IT Security, IT Service Management, IT Asset Management, Unified Endpoint Management, Identity Management and supply chain management. It was formed in January 2017 with the merger of LANDESK and HEAT Software, and later acquired Cherwell Software. The company became more widely known after several major security incidents related to the VPN hardware it sells.
A supply chain attack is a cyber-attack that seeks to damage an organization by targeting less secure elements in the supply chain. A supply chain attack can occur in any industry, from the financial sector, oil industry, to a government sector. A supply chain attack can happen in software or hardware. Cybercriminals typically tamper with the manufacturing or distribution of a product by installing malware or hardware-based spying components. Symantec's 2019 Internet Security Threat Report states that supply chain attacks increased by 78 percent in 2018.
Cyberwarfare by Russia includes denial of service attacks, hacker attacks, dissemination of disinformation and propaganda, participation of state-sponsored teams in political blogs, internet surveillance using SORM technology, persecution of cyber-dissidents and other active measures. According to investigative journalist Andrei Soldatov, some of these activities were coordinated by the Russian signals intelligence, which was part of the FSB and formerly a part of the 16th KGB department. An analysis by the Defense Intelligence Agency in 2017 outlines Russia's view of "Information Countermeasures" or IPb as "strategically decisive and critically important to control its domestic populace and influence adversary states", dividing 'Information Countermeasures' into two categories of "Informational-Technical" and "Informational-Psychological" groups. The former encompasses network operations relating to defense, attack, and exploitation and the latter to "attempts to change people's behavior or beliefs in favor of Russian governmental objectives."
Trellix is a privately held cybersecurity company that was founded in 2022. It has been involved in the detection and prevention of major cybersecurity attacks. It provides hardware, software, and services to investigate cybersecurity attacks, protect against malicious software, and analyze IT security risks.
Malwarebytes Inc. is an American Internet security company that specializes in protecting home computers, smartphones, and companies from malware and other threats. It has offices in Santa Clara, California; Clearwater, Florida; Tallinn, Estonia; Bastia Umbra, Italy; and Cork, Ireland.
Mimecast Limited is an American–British, Jersey-domiciled company specializing in cloud-based email management for Google Workspace, Microsoft Exchange and Microsoft Office 365, including security, archiving, and continuity services to protect business mail.
Imperva, Inc. is an American cyber security software and services company which provides protection to enterprise data and application software. The company is headquartered in San Mateo, California.
Trustwave is an American cybersecurity subsidiary of The Chertoff Group. It focuses on providing managed detection and response (MDR), managed security services (MSS), database security, and email security to organizations around the globe.
Mandiant, Inc. is an American cybersecurity firm and a subsidiary of Google. Mandiant received attention in February 2013 when it released a report directly implicating China in cyber espionage. In December 2013, Mandiant was acquired by FireEye for $1 billion, who eventually sold the FireEye product line, name, and its employees to Symphony Technology Group for $1.2 billion in June 2021.
Cozy Bear is a Russian advanced persistent threat hacker group believed to be associated with Russian foreign intelligence by United States intelligence agencies and those of allied countries. Dutch signals intelligence (AIVD) and American intelligence had been monitoring the group since 2014 and was able to link the hacker group to the Russian foreign intelligence agency (SVR) after compromising security cameras in their office. CrowdStrike and Estonian intelligence reported a tentative link to the Russian domestic/foreign intelligence agency (FSB). Various groups designate it CozyCar, CozyDuke, Dark Halo, The Dukes, Midnight Blizzard, NOBELIUM, Office Monkeys, StellarParticle, UNC2452 with a tentative connection to Russian hacker group YTTRIUM. Symantec reported that Cozy Bear had been compromising diplomatic organizations and national governments since at least 2010. Der Spiegel published documents in 2023 purporting to link Russian IT firm NTC Vulkan to Cozy Bear operations.
CrowdStrike Holdings, Inc. is an American cybersecurity technology company based in Austin, Texas. It provides endpoint security, threat intelligence, and cyberattack response services.
Alex Stamos is an American computer scientist and adjunct professor at Stanford University's Center for International Security and Cooperation. He is the former chief security officer (CSO) at Facebook. His planned departure from the company, following disagreement with other executives about how to address the Russian government's use of its platform to spread disinformation during the 2016 U.S. presidential election, was reported in March 2018.
Okta, Inc. is an American identity and access management company based in San Francisco. It provides cloud software that helps companies manage and secure user authentication into applications, and for developers to build identity controls into applications, website, web services, and devices. It was founded in 2009 and had its initial public offering in 2017, reaching a valuation of over $6 billion.
Christopher Cox Krebs is an American attorney who served as Director of the Cybersecurity and Infrastructure Security Agency in the United States Department of Homeland Security from November 2018 until November 17, 2020, when President Donald Trump fired Krebs for contradicting Trump's claims of election fraud in the 2020 presidential election.
In 2020, a major cyberattack suspected to have been committed by a group backed by the Russian government penetrated thousands of organizations globally including multiple parts of the United States federal government, leading to a series of data breaches. The cyberattack and data breach were reported to be among the worst cyber-espionage incidents ever suffered by the U.S., due to the sensitivity and high profile of the targets and the long duration in which the hackers had access. Within days of its discovery, at least 200 organizations around the world had been reported to be affected by the attack, and some of these may also have suffered data breaches. Affected organizations worldwide included NATO, the U.K. government, the European Parliament, Microsoft and others.
A global wave of cyberattacks and data breaches began in January 2021 after four zero-day exploits were discovered in on-premises Microsoft Exchange Servers, giving attackers full access to user emails and passwords on affected servers, administrator privileges on the server, and access to connected devices on the same network. Attackers typically install a backdoor that allows the attacker full access to impacted servers even if the server is later updated to no longer be vulnerable to the original exploits. As of 9 March 2021, it was estimated that 250,000 servers fell victim to the attacks, including servers belonging to around 30,000 organizations in the United States, 7,000 servers in the United Kingdom, as well as the European Banking Authority, the Norwegian Parliament, and Chile's Commission for the Financial Market (CMF).