Splunk’s Response to the SolarWinds Cyberattacks
Since mid-December and throughout the holidays, I’ve been speaking with Splunk customers and our own team about the cyberattacks impacting the SolarWinds Orion software platform. Splunk was not directly affected by this event, but as a leader in security, we want to help the industry by providing tools, guidance and support. It is critical to our entire industry that we work as a community to counter cybersecurity threats and share information about events like these.
For background, here is a recap of what happened:
- Sophisticated attackers, who appear to have been working for a foreign government, hid malware in a SolarWinds Orion software update.
- This malware, associated with the threat campaign called Sunburst, gave the attacker a foothold with SolarWinds Orion customers, allowing them to access additional information and systems.
- Confirmed victims include cybersecurity firm FireEye and government agencies, including the U.S. Departments of Treasury, Commerce and Homeland Security.
- The attackers leveraged this foothold to steal internal tools that FireEye uses to uncover weaknesses in its customers’ networks.
- There is a new threat, called Supernova, associated with this attack campaign and the situation continues to develop. We will continue to monitor as such.
Splunk is doing everything we can to assist our customers who use SolarWinds Orion, and share relevant information with the larger community.
- We’ve created a web page where we have posted and will continue to update useful and relevant information about the attack.
- We published a blog post that shows customers how to use Splunk to detect the compromised SolarWinds software update in their environment.
- We published a message to customers confirming our ongoing support and how to contact us if they suspect they have been affected.
- We proactively reached out and/or responded to inquiries from customers looking to assess our exposure.
We’ve also taken action to better protect Splunk as a business:
- The Splunk Security team continually monitors and evaluates security risks reported in the industry and the news. We took immediate action to confirm the safety of our systems and code from the SolarWinds attack.
- Again, we have found no evidence that our internal Splunk systems have been affected in any way by the SolarWinds attack, because we are not SolarWinds Orion customers.
- We are continuously monitoring our environment for signs of Sunburst and other malware.
- We’ve taken the extra precaution of confirming that all possible patches and security protocols are in place to protect against the stolen FireEye hacking tools.
Repercussions from the SolarWinds attack will continue into 2021. All of us at Splunk remain vigilant and committed to identifying various avenues to assist our customers, partners and industry organizations in their response. Be sure to visit Splunk’s SolarWinds response site for the latest materials and information.
----------------------------------------------------
Thanks!
Yassir Abousselham
Title
Related Articles
Filter
Category
Blog Limit
3
Category
security
Sort Category Shuffle Order
true
Related Articles

Predicting Cyber Fraud Through Real-World Events: Insights from Domain Registration Trends
By analyzing new domain registrations around major real-world events, researchers show how fraud campaigns take shape early, helping defenders spot threats before scams surface.

When Your Fraud Detection Tool Doubles as a Wellness Check: The Unexpected Intersection of Security and HR
Behavioral analytics can spot fraud and burnout. With UEBA built into Splunk ES Premier, one data set helps security and HR reduce risk, retain talent, faster.

Splunk Security Content for Threat Detection & Response: November Recap
Discover Splunk's November security content updates, featuring enhanced Castle RAT threat detection, UAC bypass analytics, and deeper insights for validating detections on research.splunk.com.

Security Staff Picks To Read This Month, Handpicked by Splunk Experts
Our Splunk security experts share their favorite reads of the month so you can follow the most interesting, news-worthy, and innovative stories coming from the wide world of cybersecurity.

Behind the Walls: Techniques and Tactics in Castle RAT Client Malware
Uncover CastleRAT malware's techniques (TTPs) and learn how to build Splunk detections using MITRE ATT&CK. Protect your network from this advanced RAT.

AI for Humans: A Beginner’s Field Guide
Unlock AI with the our beginner's field guide. Demystify LLMs, Generative AI, and Agentic AI, exploring their evolution and critical cybersecurity applications.

Splunk Security Content for Threat Detection & Response: November 2025 Update
Learn about the latest security content from Splunk.

Operation Defend the North: What High-Pressure Cyber Exercises Teach Us About Resilience and How OneCisco Elevates It
The OneCisco approach is not about any single platform or toolset; it's about fusing visibility, analytics, and automation into a shared source of operational truth so that teams can act decisively, even in the fog of crisis.

Data Fit for a Sovereign: How to Consider Sovereignty in Your Digital Resilience Strategy
Explore how digital sovereignty shapes resilient strategies for European organisations. Learn how to balance control, compliance, and agility in your data infrastructure with Cisco and Splunk’s flexible, secure solutions for the AI era.