Skip to content
Vol. 1 · Ed. 2026
CyberGlossary
Entry № 1070

SolarWinds Sunburst

What is SolarWinds Sunburst?

SolarWinds SunburstA 2020 supply-chain attack in which a backdoor named Sunburst was inserted into SolarWinds Orion updates, compromising US government agencies and global enterprises.


Sunburst is the trojanized backdoor planted inside the SolarWinds Orion IT-management platform between March and June 2020 and discovered by FireEye in December 2020. Attackers compromised SolarWinds's build pipeline and added malicious code to legitimately signed Orion updates, which were then deployed to roughly 18,000 organizations. A subset, including the US Departments of Treasury, Commerce, Justice and Homeland Security, FireEye and Microsoft, received follow-on exploitation via the TEARDROP and Cobalt Strike implants. US authorities attributed the campaign to UNC2452 / APT29 (SVR). The incident drove widespread reform of software supply-chain security, including SBOMs and signed builds.

Examples

  1. 01

    An Orion server beacons to avsvmcloud.com and receives a second-stage Cobalt Strike payload.

  2. 02

    An agency rebuilds its Orion deployment from clean media and rotates all SAML signing certificates.

Frequently asked questions

What is SolarWinds Sunburst?

A 2020 supply-chain attack in which a backdoor named Sunburst was inserted into SolarWinds Orion updates, compromising US government agencies and global enterprises. It belongs to the Vulnerabilities category of cybersecurity.

What does SolarWinds Sunburst mean?

A 2020 supply-chain attack in which a backdoor named Sunburst was inserted into SolarWinds Orion updates, compromising US government agencies and global enterprises.

How does SolarWinds Sunburst work?

Sunburst is the trojanized backdoor planted inside the SolarWinds Orion IT-management platform between March and June 2020 and discovered by FireEye in December 2020. Attackers compromised SolarWinds's build pipeline and added malicious code to legitimately signed Orion updates, which were then deployed to roughly 18,000 organizations. A subset, including the US Departments of Treasury, Commerce, Justice and Homeland Security, FireEye and Microsoft, received follow-on exploitation via the TEARDROP and Cobalt Strike implants. US authorities attributed the campaign to UNC2452 / APT29 (SVR). The incident drove widespread reform of software supply-chain security, including SBOMs and signed builds.

How do you defend against SolarWinds Sunburst?

Defences for SolarWinds Sunburst typically combine technical controls and operational practices, as detailed in the full definition above.

What are other names for SolarWinds Sunburst?

Common alternative names include: UNC2452, Solorigate, Sunburst backdoor.

Related terms