Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Government Security United States

SolarWinds' Former CEO Blames Intern for 'solarwinds123' Password Leak (cnn.com) 172

"Current and former top executives at SolarWinds are blaming a company intern for a critical lapse in password security that apparently went undiagnosed for years," reports CNN. The password in question, "solarwinds123," was discovered in 2019 on the public internet by an independent security researcher who warned the company that the leak had exposed a SolarWinds file server...

It is still unclear what role, if any, the leaked password may have played in enabling suspected Russian hackers to spy on multiple federal agencies and businesses in one of the most serious security breaches in U.S. history. Stolen credentials are one of three possible avenues of attack SolarWinds is investigating as it tries to uncover how it was first compromised by the hackers, who went on to hide malicious code in software updates that SolarWinds then pushed to some 18,000 customers, including numerous federal agencies. Other theories SolarWinds is exploring, said SolarWinds CEO Sudhakar Ramakrishna, include the brute-force guessing of company passwords, as well as the possibility the hackers could have entered via compromised third-party software.

Confronted by Rep. Rashida Tlaib, former SolarWinds CEO Kevin Thompson said the password issue was "a mistake that an intern made... They violated our password policies and they posted that password on an internal, on their own private Github account," Thompson said. "As soon as it was identified and brought to the attention of my security team, they took that down...."

Ramakrishna later testified that the password had been in use as early as 2017... That timeframe is considerably longer than what had been reported.

The remarks were made at a hearing of a House security committee, where Representative Katie Porter also strongly criticized the company. "I've got a stronger password than 'solarwinds123' to stop my kids from watching too much YouTube on their iPad! You and your company were supposed to be preventing the Russians from reading Defense Department emails!"

CNN also reports that Microsoft (which is leading the forensic investigation into the breach) "later said there is no evidence that the Pentagon was actually affected by the Russian spying campaign."
This discussion has been archived. No new comments can be posted.

SolarWinds' Former CEO Blames Intern for 'solarwinds123' Password Leak

Comments Filter:
  • Fuck that guy (Score:5, Insightful)

    by darkain ( 749283 ) on Saturday February 27, 2021 @04:38PM (#61106640) Homepage

    Yeah, fuck that guy (the c-suites, not the intern)

    Its not the intern's fault that a SECURITY COMPANY didn't have SECURITY POLICIES in place.

    • Re: Fuck that guy (Score:5, Insightful)

      by soccer1mt ( 5332547 ) on Saturday February 27, 2021 @04:57PM (#61106688)
      Yup this. Pretty pathetic move to blame an intern.
      • by ceoyoyo ( 59147 )

        As soon as a corporate type gets out of the mail room every other sentence starts with "as a leader...."

        There are two ways to spot an actual leader. They never call themselves that, and they never pass off the blame.

    • by AmiMoJo ( 196126 )

      2019 and they didn't have anything in place to detect crap passwords.

    • The CEO also ordered a flunky to change the combination on his luggage to something besides "solarwinds123".

    • Re: Fuck that guy (Score:5, Insightful)

      by orlanz ( 882574 ) on Saturday February 27, 2021 @05:50PM (#61106810)

      Honestly, I blame the reporter, the CEO, Congress, and their Auditor for gross stupidity and incompetence. To even say such an answer tells of a incompetence at multiple levels of the organization!

      Rather than just being another form of media of consumption of the vomit of an answer this was, the reporters and Congressional staff should have responded with: You mean your personal incompetence in your inability to manage a security company and being unable to find a mediocre security and audit group allowed an employee at the lowest levels of your organization to easily violate one of the most widely known and used policies? Yes or No?

      And that's before we begin discussions on how that could possibly result in bypassing your CRB, SOD, and production infrastructure protection processes.

      I am sorry, but that answer shows not only how incompetent this company was but most likely how many of their customers are. Apologies if there was more details in the article and I totally misunderstood the situation.

      • Solarwinds was founded in 1999. In that era, even Linux distros had telnet ports open by default.

        The world has since moved on to more secure policies. Solarwinds went to less secure policies.

        • Solarwinds had terrible security. But many government and industry organizations were relying on them for critical security without ever asking for a security audit. Even an ISO-9001 audit should have uncovered their lax practices.

          This debacle was a failure on many levels.

          • Yeah. And many government and industry organizations will continue to use them. As one military IT administrator told me, "everyone is using them."

            • As one military IT administrator told me, "everyone is using them."

              There is safety in numbers.

              Nobody ever got fired for buying Solarwinds.

      • What's CRB ? I could not find any useful info. (Assuming it's nothing on the Wikipedia disambiguation page.)

        And SOD is "separation of duties", right? (Makes me think of "GRUB" and "GIMP", in terms of how well the acronym was chosen.)

    • Comment removed based on user account deletion
    • In other news, Solarwinds intern blames former CEO for lack of leadership.
      • CEO: "Yeah, the intern posted the password on an internal github repo. As soon as we heard about that, we took it down."

        Real Security Expert: "You took the password down from the Repo? Why didn't you remove or change the internal password in the product and notify your customers?"

        CEO: "It was all Justin's fault."
    • by hey! ( 33014 )

      Oh, I'm sure they had security policies in place, but you're right, if the company can't make those policies stick, fuck the CEO.

    • by slazzy ( 864185 )
      The fact that they are using un-checked production code from an intern is actually far worse than missing a hardcoded password.
    • Came here to say that. Left happy that someone first posted it.

    • Actually, they did have the SECURITY POLICY in place. What they lacked was training on said policies, automated enforcement mechanisms, and proper auditing that the policy is effective. Writing a policy is only one part of effective security. I think there is also some access control, data leak protection, password policy (like this craptstic password being used on anything, changing, etc) changes, boundary enforcement, and other security mechanisms missing.

      The real fault lies with the direct manager of
    • The other sad thing is that everyone is going to keep using SolarWinds. And the hacking will continue.

  • by gweihir ( 88907 ) on Saturday February 27, 2021 @04:40PM (#61106652)

    Some really stupid people may even for a second believe that is the person that screwed up. In actual reality, you had no password changes, did not disable the password after the intern left, did give an intern far too much access and failed to notice for a long, long time that people that had no business doing so were in your network. Of course, all that is the fault of said intern too, right?

    Smart people, on the other hand, will see that not only is it _you_ that screwed up, but also that you have no honor or integrity, which you nicely demonstrated by blaming things on somebody that likely cannot defend themselves and has the smallest part of the blame in things.

  • by mysidia ( 191772 ) on Saturday February 27, 2021 @04:52PM (#61106668)

    "a mistake that an intern made... They violated our password policies and they posted that password on an internal, on their own private Github account," Thompson said.

    The issue sounds to me like Not a leak of password strings if that is indeed what the string was. "solarwinds123" is not a secure string to use as a password, period - It was insecure from the moment it was set, So the idea that someone "broke" a policy by leaking this variant of password123 is absurd, and it's more ridiculous to try and blame a breach on such a leak of solarwinds123 -- It seems to me like they could properly intuit that (common company name)123 is obvious and NOT a secure password, therefore it's not been valued to keep secret, and such (dictionaryword)123 passwords are common and among the world's most commonly used passwords, take password123, for example, so any person making a code project that does anything related to solarwinds could easily be using the same one by coincidence, whether they're affiliated or not with SolarWinds.

    The failure would be on SolarWinds part, for (1) Failing to implement technical measures to enforce a secure password policy,, (2) Failing to regularly audit their network using password crackers for password strength and detect such weak passwords, or (3) Failure to ensure whatever affected servers were adequately monitored and covered by such policies and auditing measures.

    In addition (4) Critical resources should require Two-Factor Authentication. They are failing to meet
      the bare minimum among industry best practices by not ensuring a Security Key or second factor is required for client device user logins to file servers/server systems.

    • by gweihir ( 88907 )

      Indeed. And they failed at all that while being an IT security company!

      That said, interns are supposed to screw up from time to time. If an intern screwing up breaks the whole security of your company at a fundamental level, then you have no business being in IT security because you are just completely and utterly incompetent.

    • by fahrbot-bot ( 874524 ) on Saturday February 27, 2021 @05:23PM (#61106742)

      The issue sounds to me like Not a leak of password strings if that is indeed what the string was. "solarwinds123" is not a secure string to use as a password, period ...

      Ya, but if they had just switched the "1" and "i" ... :-)

    • Comment removed based on user account deletion
    • by quantaman ( 517394 ) on Saturday February 27, 2021 @06:53PM (#61106902)

      Agreed.

      With a password like 'solarwinds123' there's a good possibility that the hackers found the password not via leak, but with a straightforward dictionary attack.

      • They still need to guess the username, right? Unless it was intern123.
        • probably "root" or "Administrator" or "solarwinds".

          Fun fact: 25% of all banks in Luxemburg have the password "Administrator" or "Telindus". The latter is the company setting up half the systems there, and my sources told me, 50% never change the pasword after they leave. At least that was the case, a decade or so ago.

          • Oh it looks like they found it with a google dork so probably the username was there too. I got hacked this way myself once. Intern left his password somewhere and we got hit with a ransomware.
    • I had worked in a company where (company name)123 was widely used.

      It is specifically used to send documents through email, between people within the company, in order to prevent outlook filtering it. Put it in a zip and password it with the company wide known password. the outlook is too stupid to see what's in there and so prevent you sending word documents or python scripts or similar things.

      It is not a security thing at all. It's a workaround for outlook policies that prevent you getting work done.

      If act

      • ...the CEO should be replaced by the intern, who by now has probably learned a lesson, unlike the CEO.

        QFL (Quoted for Lulz)

        Yeah, it's always a balancing act between risk, security and usability.

    • A lot of time people lack the understanding of how big organizations work.

      It is entirely possible the company had a wonderful password policy.
      It's very possible, someone wrote entire policy documents on the password policy and how often it needs to be changed.

      Given how prevalent SolarWinds is, I'd venture to bet they have all kinds of amazing documents detailing their security policies. They'd definitely need it to get into many organizations.

      Yet, there is such a thing as making sure your policy is actually

  • by WoodstockJeff ( 568111 ) on Saturday February 27, 2021 @04:52PM (#61106670) Homepage

    Was it leaked as "You wouldn't BELIEVE how stupid their passwords are around here!"?

  • by Proudrooster ( 580120 ) on Saturday February 27, 2021 @04:53PM (#61106674) Homepage

    I see how it is, one of the biggest technology blunders in recent times and you blame the intern.

    If any interns at Solar Winds are reading this, if you could embed this video on the main website of SolarWinds that would be great. I am sure you have the password, try "Solarwinds1234" if you have to guess. They probably changed the password rules to have one upper case and 4 numbers now.

    https://youtu.be/T_x6QmuJdms [youtu.be]

    • Ha, I've run into password rules on web sites that disallowed uppercase and some special characters.
      Probably the special characters because they just append the password to an SQL query, but I never understood why upper case would be disallowed.

      • Comment removed based on user account deletion
        • Old mainframe backend and database. They simply can't do it because the field in the database is a crusty sixty year old relic that they insist on reusing and which cannot hold anything approaching the length of a properly hashed password value. So they limit your password to whatever the old mainframe can handle.

          That would be my bank.

      • I've ran into rules on websites that won't accept my work email since it ends in .aero...I would assume excluding some special characters is some internal vulnerability that might be triggered and they haven't / don't patch.
  • Intern? (Score:5, Insightful)

    by grasshoppa ( 657393 ) on Saturday February 27, 2021 @04:53PM (#61106676) Homepage

    If the actions of a single intern can compromise your network, then it's not the intern's fault; it's yours. The appropriate response is to thank the intern for highlighting the flaw and fix it.

    • by gweihir ( 88907 )

      If the actions of a single intern can compromise your network, then it's not the intern's fault; it's yours. The appropriate response is to thank the intern for highlighting the flaw and fix it.

      Very much so, yes. Interns make mistakes. Not expecting that disqualifies this company from doing anything in IT, let alone IT security.

    • Re:Intern? (Score:5, Interesting)

      by Darinbob ( 1142669 ) on Saturday February 27, 2021 @05:53PM (#61106818)

      A company that used to be next to us went quickly out of business because they stored all the customers passwords in plain text in a file that could be accessed remotely. This was the CEOs decision because it was a small startup and apparently good security is too expensive. We expanded into their space once they left.

      I mean, nobody with a brain has used plain text passwords since the 70s, and any decent system will not even see the plaintext password. And yet once I got an email from a third party trainer who said I had a new account for trainng and here is the password to use to log in, and the password was my work password in plain text. So something on our system had the passwords, maybe some other internal web site, maybe there was a keylogger, maybe whatever active directory does stores the plain text, but it was pretty unnerving to see. No one really seemed that concerned about it, which was even more concerning.

      Good security is often treated as an afterthought, something you do after you get hacked. Security is by necessity, inconvenient and expensive, and thus it gets bypassed a lot.

  • The remarks were made at a hearing of a House security committee, where Representative Katie Porter also strongly criticized the company. "I've got a stronger password than 'solarwinds123' to stop my kids from watching too much YouTube on their iPad! You and your company were supposed to be preventing the Russians from reading Defense Department emails!"

    I so desperately need to see video [youtu.be] of this.

    • by gweihir ( 88907 )

      I so desperately need to see video [youtu.be] of this.

      Now I wonder what this screw-up that pretended to be a CEO has as combination on his luggage....

    • Yes, found it [twitter.com]!

    • Got me! I clicked, expecting to see a CongressCritter berating an executive about stupid passwords. Well played!

      Though I think I'll look for a vid about it. Watching bullshitters wallow in their, um, product, is fun.

  • by TheNameOfNick ( 7286618 ) on Saturday February 27, 2021 @04:55PM (#61106684)

    Clearly the CEO isn't in charge. Give his pay to the intern, the guy who makes security decisions. Huge responsibility. Isn't that why the people up top allegedly make the big bucks?

  • You're doing something seriously wrong if Solarwinds is used to protect your email.

    • by gweihir ( 88907 )

      Well, there is a reason this former "CEO" thinks this ludicrous excuse may work: He knows his customers are even more stupid than he is.

    • Well, it is worth noting that the person who said that was a congressperson, another of whom asked a general if he was worried that Guam might capsize if there were too many soldiers deployed to the military base there.
    • Yeah, absolutely right. But great line, anyways.

  • by grumpy-cowboy ( 4342983 ) on Saturday February 27, 2021 @05:00PM (#61106700)

    Really?!

    • Every user probably has access to a file share for personal / department use...the bigger issue is that Solarwinds isn't monitoring or restricting access to third-party cloud environments like Github, My users are restricted to access on such sites on the firewall, vlan, and other mechanisms. One can't even get to such sites without specific approved tickets, additional training, and we then monitor those connections and actively audit them.
  • Literally, every hacker knows to try 123 .. even before trying "password" you don't need an intern to tell you that. Almost everyone in the world knows many companies use that as a password, it's common knowledge.

  • by Ostracus ( 1354233 ) on Saturday February 27, 2021 @05:09PM (#61106714) Journal

    You hear that? That's the sound an intern makes when thrown under a bus.

  • It was an engineering intern.... So someone with privileges and rights as an engineer did it.

    And of course they aren't around anymore to be questioned about how it happened.

    How CONVENIENT! -- Charlie did it but he's dead now. Oh Well.

  • Isn't that one of the roles of interns?

  • Thank you solarwind after explaining to my normal friends and relatives, that normally portrait hacking as seen in movies is just not real .. thank you for proving me wrong.

    Hacker1: "You cannot break into that computer network, it's a high security service company"
    female Hacker to Hacker2(one on the keyboard): "Start with the basics try solarwinds123."
    Hacker1: "Yeah right, nobody with a sane mind would use that .."
    Hacker2: "I'm in!"
    Hacker1: .. password?

    conclusion:
    But don't worry it really was the interns fa

  • "solarwinds123" is a password? When used for Solarwinds?

    Ridiculous.

  • I used to "google" password a few times a month to see which idiots that I was providing services to were "helping" our business partners.

    I caught about 10 or 15 internal clients that I promptly referred to corporate IT security.

    Some of them got their hands slapped, some of them had their system account privileges revoked.

  • Who in their right mind would hire a security company whose file server password is "solarwinds123"?

    Answer: Probably a president who uses "12345" for the combination to his luggage.

  • Not having procedures in place to limit the damage of Junior level employees isn't quite the fault of those employees.

    But not really surprising nevertheless. I worked for a huge tech company who had a big presence in network security and discovered that all of the offices and small engineering data centers had APC UPSes which were all connected to the network. I enquired about getting power utilization statistics for an upcoming deployment and the facilities team had no clue how to give me the data... so
  • If the House security committee buys this excuse and absolves SolarWinds of the responsibility, US cybersecurity is going to be a laughing stock of the world. If this story is even remotely true, SolarWinds should not be trusted with anything requiring security beyond passing messages in a high school classroom of who likes whom. If the story is a complete fabrication and the committee buys it, then we have a completely incompetent government.

  • >"Other theories SolarWinds is exploring, said SolarWinds CEO Sudhakar Ramakrishna, include the brute-force guessing of company passwords"

    Any system that ALLOWS brute-force guessing of passwords is broken. Full-stop. It is not a problem with passwords. Brute force is easily stopped with trial delays, filters, number of trial limits, and auto account locking (even if just temporary).

    • Point of order, with the password being solarwinds123 that would have been, at most, the 3rd password tried. So all those measures could have been in place, and with the password used it wouldn't have mattered.

      • >"Point of order, with the password being solarwinds123 that would have been, at most, the 3rd password tried. "

        Are you sure?

        solarwinds
        Solarwinds
        solarwinds1
        solarwinds[2-9]
        [etc]

        Had it been solarwinds1, I would probably agree with you, since most systems require 1 number. Yes, it was a pretty obvious password, but people tend to think of "brute force" as throwing thousands and millions of tries at something.

  • .. blaming maintainers for their dodgy AF gaming the regulations that made a critical system non-redundant.

    So, we still have no proof Russia had anything to do with it.... yet more deflection?

    • At this point I'd assume everybody except maybe the Nigerians but including the Russians were up in Solarwind's servers, all routing their traffic through Russian VPNs.

  • I wonder if they also gave complete access to all accounts to all interns. I wonder if the CEO also gave the interns his own personal credit card numbers, pins, accounts and more.?
  • No. This is the kind of shit that rolls UPHILL.
    This password should NEVER have existed.

  • alphabet123, cisco123, apple123, ....
  • If an intern can fuck up hundreds of prominent customer systems completely, then the correct statement is "we had problems with out internal review and quality assurance processes".

  • by mwvdlee ( 775178 ) on Sunday February 28, 2021 @02:44PM (#61109012) Homepage

    Which is worse?

    A) An intern set a dumb password
    B) A security company created a system allowing any old intern to set a dumb password.

/earth: file system full.

Working...