{"id":115543,"date":"2020-12-21T13:32:24","date_gmt":"2020-12-21T21:32:24","guid":{"rendered":"\/blogs\/?p=115543"},"modified":"2025-03-31T19:40:10","modified_gmt":"2025-04-01T02:40:10","slug":"how-a-device-to-cloud-architecture-defends-against-the-solarwinds-supply-chain-compromise","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/how-a-device-to-cloud-architecture-defends-against-the-solarwinds-supply-chain-compromise\/","title":{"rendered":"How A Device to Cloud Architecture Defends Against the SolarWinds Supply Chain Compromise"},"content":{"rendered":"<p>In a <a href=\"https:\/\/www.fireeye.com\/blog\/threat-research\/2020\/12\/evasive-attacker-leverages-solarwinds-supply-chain-compromises-with-sunburst-backdoor.html),\" target=\"_blank\" rel=\"noopener noreferrer\">blog post<\/a> released 13 Dec 2020, FireEye disclosed that threat actors compromised SolarWinds\u2019s Orion IT monitoring and management software with a trojanized version of\u00a0SoalrWinds.Orion.Core.BusinessLayer.dll delivered as part of a digitally-signed Windows Installer Patch. The trojanized file delivers a backdoor, dubbed SUNBURST by FireEye (and Solorigate by Microsoft), that communicates to third-party servers for command and control and malicious file transfer giving the attacker a foothold on the affected system with elevated privileges. From there, additional actions on the objective, such as lateral movement and data exfiltration, are possible. <em>Since release of the initial blog from FireEye, subsequent <\/em><a href=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/additional-analysis-into-the-sunburst-backdoor\/\" target=\"_blank\" rel=\"noopener noreferrer\"><em>additional analysis by McAfee<\/em><\/a><em> and the industry as well as alerts by <\/em><a href=\"https:\/\/us-cert.cisa.gov\/ncas\/alerts\/aa20-352a\" target=\"_blank\" rel=\"noopener noreferrer\"><em>CISA<\/em><\/a><em>, we have seen the attack grow in size, breadth and complexity. We will continue to update defensive recommendation blogs like this as new details emerge. <\/em><\/p>\n<p>The use of a compromised software supply chain as an Initial Access technique (<a href=\"https:\/\/attack.mitre.org\/techniques\/T1195\/002\/\" target=\"_blank\" rel=\"noopener noreferrer\">T1195.002<\/a>) is particularly dangerous as the attack uses assumed trusted paths and as such can go undetected for a long period. This attack leveraged several techniques, such as trusted software, signed code and stealthy hiding-in-plain-sight communication, allowing the attacker to evade even strong defenses and enjoy a long dwell before detection. The sophisticated nature of the attack suggests that an Advanced Persistent Threat (APT) Group is likely responsible. In fact, FireEye is tracking the group as UNC2452 and has released <a href=\"https:\/\/github.com\/fireeye\/sunburst_countermeasures\" target=\"_blank\" rel=\"noopener noreferrer\">countermeasures<\/a> to identify the initial SUNBURST backdoor. McAfee has also provided an intelligence summary within <a href=\"https:\/\/www.mcafee.com\/enterprise\/en-us\/lp\/insights-preview.html\" target=\"_blank\" rel=\"noopener noreferrer\">MVISION Insights<\/a> and mitigation controls for the initial entry vectors are published in <a href=\"https:\/\/kc.mcafee.com\/corporate\/index?page=content&amp;id=KB93861\" target=\"_blank\" rel=\"noopener noreferrer\">KB93861<\/a>. For additional response actions, please view Part One of this blog series <a href=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/sunburst-malware-and-solarwinds-supply-chain-compromise\/\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>. If you are using SolarWinds software, please refer to the company guidance here to check for vulnerable versions and patch information.<\/p>\n<p>However, looking beyond the initial entry and containment actions, you should think about how you are prepared for this type of attack in the future. This is a sophisticated actor(s) who may use other techniques such as Spearphishing to gain access, then move around the corporate network and potentially steal intellectual property as was the case with FireEye. They will change techniques and tools, so you need to be ready. Our Advanced Threat Research team tracks over 700 APT and Cyber Crime campaigns so the potential for another threat actor to launch a similar attack is high. In this blog, we will take a specific look at the techniques used in the SolarWinds compromise and provide some guidance on how McAfee solutions could help you respond now and prepare for this type of threat in the future with an adaptable security capability for resilience.<\/p>\n<h2>Attack Chain Overview<\/h2>\n<p>In our <a href=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/sunburst-malware-and-solarwinds-supply-chain-compromise\/\">first blog<\/a> in this series, we provided some initial response guidance designed to disrupt the attack early in the Execution phase or look retrospectively on the endpoints or proxy logs for indicators of compromise. But as you can see in the attack timeline below, it started much earlier with purposeful and detailed preparation and includes multiple other steps. A couple of techniques speak volumes about the sophistication and planning involved in this campaign.<\/p>\n<p>First is the choice of entry vector. The attacker in this case compromised part of the software supply chain by weaponizing software by SolarWinds, a major brand of IT management software. While software supply chain compromises are not new, like the recent one affecting <a href=\"https:\/\/www.zdnet.com\/article\/malicious-npm-packages-caught-installing-remote-access-trojans\/\" target=\"_blank\" rel=\"noopener noreferrer\">JavaScript<\/a>, they are typically on a smaller scale or more quickly detected. More common initial access techniques involve Spearphishing or taking advantage of open remote services like <a href=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cybercriminals-actively-exploiting-rdp-to-target-remote-organizations\/\" target=\"_blank\" rel=\"noopener noreferrer\">RDP<\/a>. While both take planning and effort, weaponizing software from a major technology company and going undetected in that process is no easy feat. Secondly, the calculated wait time before external communication and the custom Domain Generation Algorithm (DGA) indicate the attacker has a lot of patience and stealth capability. For more detailed analysis of these advanced techniques, see McAfee Labs additional <a href=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/additional-analysis-into-the-sunburst-backdoor\/\" target=\"_blank\" rel=\"noopener noreferrer\">analysis blog on the SUNBURST backdoor<\/a>.<\/p>\n<p>The attack also involves numerous post-exploitation actions such as command and control communication masquerading (T1001.003) as normal update traffic, additional payload transfers (T1105), system discovery, credential harvesting and potentially then movement to other systems, even cloud-hosted infrastructure systems. The goal of course is to disrupt or detect any stage of attack before the breakout point and hopefully before any real impact to the business. The breakout point is when an attacker has gained privileges and starts to move laterally within the business. At that point, it becomes very difficult but not impossible to disrupt or detect the activity. But you must act fast. The impact of the attack can vary. In one case, it could be loss of intellectual property, but in another case, destruction of critical systems or data could be the goal. Also, what if the attacker used other initial access techniques, such as Spearphishing (<a href=\"https:\/\/attack.mitre.org\/techniques\/T1566\/\">T1566<\/a>), to deliver a similar backdoor? Would you be able to detect that activity or any of the follow actions? Our point is don\u2019t just update the endpoint with the latest DAT and consider yourself secure. Look for other ways to disrupt or detect an attack throughout the whole attack chain, leveraging both prevention and detection capability and keeping the end goal in mind to reduce impact to the business. Also think about how you prepare. The attackers in this case spent a lot of time in preparation creating custom malware and infrastructure. How about your organization? Do you know what attackers might be targeting your organization? Do you know their tactics and techniques?<\/p>\n<h2>Staying Ahead with MVISION Insights<\/h2>\n<p>In the first hours of a new threat campaign, if the CIO or CISO asked you, \u201care we exposed to SUNBURST\u201d, how long would it take you to answer that question? One place to turn is <a href=\"https:\/\/www.mcafee.com\/enterprise\/en-us\/solutions\/lp\/mvision-insights.html\" target=\"_blank\" rel=\"noopener noreferrer\">MVISION Insights<\/a>. MVISION Insights combines McAfee\u2019s Threat Intelligence research with telemetry from your endpoint controls to reduce your attack surface against emerging threats. MVISION Insights tracks over 700 APT and Cyber Crime campaigns as researched by <a href=\"https:\/\/www.mcafee.com\/enterprise\/en-us\/threat-center\/advanced-threat-research.html\" target=\"_blank\" rel=\"noopener noreferrer\">McAfee\u2019s ATR team<\/a>, including the most recent, FireEye Red Team tool release and SolarWinds Supply Chain Compromise campaigns.<\/p>\n<p>In the beginning hours of a new threat response, you can use MVISION Insights to get a quick summary of the threat, view external resources, and a list of known indicators such as files, URLs, or IP addresses. The campaign summary saves you from some of the time-consuming task of combing multiple sites, downloading reports, and building out the broader picture. MVISION Insights provides critical pieces in one place allowing you to move quicker through the response process. The next question to answer, is this new attack a risk to my business? Insights can help you answer that question as well when you click on \u201cYour Environment\u201d.<\/p>\n<p>Insights automatically correlates the indicators of compromise with Threat Events from McAfee ENS, allowing you to quickly asses if there is an immediate problem now. If you had a detection, you should immediately go to incident response. Insights reviews your endpoint control configuration to asses if you have the right content update deployed to potentially disrupt the threat. At this point, you are closer to answer the CIO question of \u201care we exposed\u201d. I say closer because Insights provides only the endpoint protection view currently so you will need to review other controls you have in place to fully assess risk.<\/p>\n<p>However, Insights also assesses your endpoint security posture against other advanced threat techniques, looking to see if you are getting the best value from ENS by leveraging signature, intelligence and behavior anomaly detection capability in the solution. This is important because the attackers will change tactics, using new entry techniques and tools, so your security posture must continuously adapt. And this is just one campaign. Insights is summarizing intelligence, surfacing detections and reducing your attack surface continuously, against 700 campaigns!<\/p>\n<h2>Review your Defensive Architecture<\/h2>\n<p>Mitigating risk from SUNBURST and similar sophisticated APT campaigns requires a security architecture that provides defense in depth and visibility throughout the entire attack chain. You should review your architecture and assess gaps either in technique visibility or protection capability. Below we have outlined where McAfee and partner solutions could be used to either disrupt or detect some of the attack techniques used in SUNBURST based on what we know today.<\/p>\n<p>While the attacker is no doubt sophisticated and stealthy, the multi-stage aspect of the attack presents opportunities to detect or stop at multiple points and perhaps even before the attack gains a foothold. We cover more about how to use McAfee EDR to search for or detect some of the techniques used in SUNBURST in next section. However, there are some other key cyber defense capabilities that may be overlooked in your organizations but are critical to having a chance at detection and mitigation. We highlight those in this section below.<\/p>\n<h3>Getting inside the attacker\u2019s preparation<\/h3>\n<p>Normally this is beyond what most organizations have time to do. However, in this case, you need to gain any advantage. We discussed MVISION Insights above so here we will cover additional guidance. During the preparation phase of this attack, the attacker obtains infrastructure within the target geo to host their command and control server. During this phase, they also set the hostnames of their C2 servers to mimic target organization hostnames. A scan for your domain names on external IP blocks can reveal the attack formation. Open source tools such as <a href=\"https:\/\/github.com\/smicallef\/spiderfoot\" target=\"_blank\" rel=\"noopener noreferrer\">Spiderfoot<\/a> offer a number of plugins to gather and analyze such types of data. Passive DNS with combination of hosts communicating with unusual domain names also represent a window of detection whereby Advanced DNS Protection solutions such as from our SIA partner <a href=\"https:\/\/blogs.infoblox.com\/security\/how-behavioral-analytics-can-help-detect-0-day-threats\/\" target=\"_blank\" rel=\"noopener noreferrer\">Infoblox<\/a> can detect behavior-based DGA usage by malware and automatically block such DNS resolution requests.<\/p>\n<h3>Visibility on DNS<\/h3>\n<p>DNS queries often provide the first layers of insights into any type of C2 communication and data exfiltration. You should enable logging ideally at an upstream resolver(s) where you can see traffic from your entire infrastructure. More information can be found here for <a href=\"https:\/\/docs.microsoft.com\/en-us\/previous-versions\/windows\/it-pro\/windows-server-2012-r2-and-2012\/dn800669(v=ws.11)#:~:text=To%20enable%20DNS%20diagnostic%20logging,-Type%20eventvwr.&amp;text=In%20Event%20Viewer%2C%20navigate%20to,Analytical%20log%20will%20be%20displayed.\">Windows DNS Servers<\/a> and <a href=\"https:\/\/kb.isc.org\/docs\/aa-01526\" target=\"_blank\" rel=\"noopener noreferrer\">Linux Bind DNS Servers.\u00a0 <\/a>This could be forwarded to McAfee ESM\/other SIEMs for analysis and correlation for detection of DGA-type activities.<\/p>\n<h3>NetFlow Logging<\/h3>\n<p>Being able to detect unusual flows should also be a priority for incident responders. Along with DNS queries, NetFlow data when combined with UBA provides a great source of detection, as the attackers\u2019 use of VPS providers can be combined with user login data to detect an \u201cimpossible rate of travel event.\u201d<\/p>\n<h2>Hunting for Indicators with MVISION EDR<\/h2>\n<p>As described in the defensive architecture, <a href=\"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/mvision-edr.html\" target=\"_blank\" rel=\"noopener noreferrer\">MVISION EDR<\/a> plays a vital role in hunting for prevalence of indicators related to the SUNBURST backdoor and ensuing post compromise activity. The role of MVISION EDR becomes even more important due to the usage of manual OPSEC by the threat actor where what follows the initial breach is driven by how the threat actor is targeting the organisation.<\/p>\n<h3>Hunting for Presence of Malicious Files<\/h3>\n<p>You can use MVISION EDR or MAR to search endpoints for SUNBURST indicators as provided by Microsoft and FireEye. If you are licensed for MVISION Insights, you can pivot directly to MVISION EDR to search for indicators. MVISION EDR supports real-time searches to hunt for presence of files on the endpoints and allows for sweeps across the estate. The following query can be used with the pre-populated malicious file hash list. The presence of the file on the system is itself does not mean it was successful and further hunting to check for execution of the actual malicious code on the system.is needed. See the search syntax below.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Begin MVEDR Query Syntax\u2026<\/strong><\/p>\n<p>Files name, full_name, md5, sha256, created_at, create_user_name, create_user_domain and HostInfo hostname, ip_address, os and LoggedInUsers username, userdomain where Files sha256 equals &#8220;ac1b2b89e60707a20e9eb1ca480bc3410ead40643b386d624c5d21b47c02917c&#8221; or Files sha256 equals &#8220;c09040d35630d75dfef0f804f320f8b3d16a481071076918e9b236a321c1ea77&#8221; or Files sha256 equals &#8220;eb6fab5a2964c5817fb239a7a5079cabca0a00464fb3e07155f28b0a57a2c0ed&#8221; or Files sha256 equals &#8220;dab758bf98d9b36fa057a66cd0284737abf89857b73ca89280267ee7caf62f3b&#8221; or Files sha256 equals &#8220;32519685c0b422e4656de6e6c41878e95fd95026267daab4215ee59c107d6c77&#8221; or Files sha256 equals &#8220;d0d626deb3f9484e649294a8dfa814c5568f846d5aa02d4cdad5d041a29d5600&#8221; or Files sha256 equals &#8220;53f8dfc65169ccda021b72a62e0c22a4db7c4077f002fa742717d41b3c40f2c7&#8221; or Files sha256 equals &#8220;019085a76ba7126fff22770d71bd901c325fc68ac55aa743327984e89f4b0134&#8221; or Files sha256 equals &#8220;ce77d116a074dab7a22a0fd4f2c1ab475f16eec42e1ded3c0b0aa8211fe858d6&#8221; or Files sha256 equals &#8220;32519b85c0b422e4656de6e6c41878e95fd95026267daab4215ee59c107d6c77&#8221; or Files sha256 equals &#8220;292327e5c94afa352cc5a02ca273df543f2020d0e76368ff96c84f4e90778712&#8221; or Files sha256 equals &#8220;c15abaf51e78ca56c0376522d699c978217bf041a3bd3c71d09193efa5717c71&#8221;<\/p>\n<p>&nbsp;<\/p>\n<p><strong>&#8230;End MVEDR Query Syntax<\/strong><\/p>\n<p>Additionally, you can do a historical search creation and deletion of files going back up to 90 days in cloud storage.<\/p>\n<p>The threat actor is known to rename system utilities\/files and clean up their tracks. MVISION EDR can review historical changes to the file system, this is crucial in determining if an endpoint was a victim of this attack. The flexible search interface can be used to filter down and track the progress of the completion of the attacker\u2019s objectives for e.g. look at changes triggered from the infected dll\u2019s such as netsetupsvc.dll.<\/p>\n<h3>Hunting for Malicious Network Connections<\/h3>\n<p>MVISION EDR allows for tracing of active network connections leveraging the real time search functionalities<\/p>\n<p>You can also leverage the historical search function to look for historical connections related to the command and control activity for this threat actor. The filtering by process ID and source\/destination IP allows analysts to track down the malicious communications.<\/p>\n<p>MVISION EDR also allows analysts to review historical DNS lookups thus allowing for the ability to hunt for malicious DNS lookups. This is a very important capability in the product as many organizations do not log DNS or have a DNS hierarchy that makes it harder to log the end device making the actual request.<\/p>\n<h3>Hunting for Malicious Named Pipes Across the Estate<\/h3>\n<p>MVISION EDR includes custom collector creation ability that allows for execution of custom commands across the estate. In this case, it\u2019s possible to look for the existence of the Named Pipes by executing the following Powershell command:<\/p>\n<p>Powershell Command for Pipe detection [System.IO.Directory]::GetFiles(&#8220;\\\\.\\\\pipe\\\\&#8221;) | %{($_ -split &#8220;\\\\&#8221;)[6]}<\/p>\n<p>HostInfo hostname, ip_address, os where _NamedPipe pipename contains &#8220;583da945-62af-10e8-4902-a8f2 05c72b2e&#8221;<\/p>\n<h3>Hunting for Malicious Processes<\/h3>\n<p>It is known the attacker in its final stages leverages legitimate SolarWinds processes to complete their objectives:<\/p>\n<p>&nbsp;<\/p>\n<p>\\Windows\\SysWOW64\\WerFault.exe<\/p>\n<p>\\SolarWinds\\Orion\\ExportToPDFCmd.Exe<\/p>\n<p>\\SolarWinds\\Orion\\APM\\APMServiceControl.exe<\/p>\n<p>\\SolarWinds.Credentials\\SolarWinds.Credentials.Orion.WebApi.exe<\/p>\n<p>\\SolarWinds\\Orion\\Topology\\SolarWinds.Orion.Topology.Calculator.exe<\/p>\n<p>\\SolarWinds\\Orion\\Database-Maint.exe<\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p>ProcessHistory parentname, name, id, cmdline WHERE ProcessHistory parentname equals &#8220;WerFault.exe&#8221; or ProcessHistory parentname equals &#8220;ExportToPDFCmd.Exe&#8221; or ProcessHistory parentname equals &#8220;APMServiceControl.exe&#8221; or ProcessHistory parentname equals &#8220;SolarWinds.Credentials.Orion.WebApi.exe&#8221; or ProcessHistory parentname equals &#8220;SolarWinds.Orion.Topology.Calculator.exe&#8221; or ProcessHistory parentname equals &#8220;\\SolarWinds\\Orion\\Database-Maint.exe&#8221;<\/p>\n<h3>Hunting back longer than 90 days with EDR Trace Data<\/h3>\n<p>MVISION EDR\u2019s architecture leverages the Data Exchange Layer to stream trace data to our cloud service where we apply analytics to identify or investigate a threat. Trace data are artifacts from the endpoint, such as file hashes, processes, communications, typically needed for endpoint detection and searches. The DXL architecture allows that data to be streamed to the cloud as well to a local data store such as a SIEM or other log storage like Elastic simultaneously.<\/p>\n<p>You can store the data longer than the 90-day maximum McAfee stores in our cloud. Why is this important? Recent analysis of SUNBURST suggests that the attack goes as far back as March 2020, and perhaps earlier. This local storage would provide capability to hunt for indicators further back as needed, if so configured.<\/p>\n<h3>Assessing Visibility<\/h3>\n<p>How do you know what data sources are needed to detect Mitre Att&amp;ck tactics and techniques? Carlos Diaz from MVISION EDR engineering wrote a great tool called Mitre-Assistant to simplify that process. You can download that tool <a href=\"https:\/\/github.com\/topics\/mitre-assistant\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/p>\n<h2>Detecting Actions on Objective<\/h2>\n<h3>Post Initial Exploit Threat Detection and Analysis in EDR<\/h3>\n<p>One of the key challenges threat hunters and security analysts face is where the attack progresses through to the second phase of the attack, where it is understood the attacker has dropped malware to execute and complete their objectives. This usage of sophisticated execution of malware from a trusted process is detected by MVISION EDR and automatically mapped to the MITRE ATT&amp;CK Framework. As part of the detection and process tracing, EDR also captures the command executed on the endpoint. This becomes invaluable in case of tracking the manual OPSEC aspect of the second phase of the attack.<\/p>\n<p>MVISION EDR provides extensive capabilities to respond to threats once they have been assessed, e.g. real-time searches once executed allows analysts to scope the affected endpoints rapidly at which point the solution offers multiple options as a method for containment and remediation of the threat across the estate through bulk operations.<\/p>\n<h3>Detecting Data Exfiltration, Lateral Movement and Prevention<\/h3>\n<p>MVISION EDR provides a way to easily visualize data egress by looking at topology view of the endpoints where malicious activity has been detected, by observing the network-flow map the outlier connections can be easily identified and then correlated with WHOIS, IP reputation and Passive DNS data from providers like McAfee GTI and Virustotal. Once established, the external connections can be blocked and the endpoint can be quarantined from the EDR console. EDR also shows common processes spawning across multiple endpoints to showcase lateral movement and is also tagged as part of the MITRE techniques being identified and detected.<\/p>\n<p>Combining EDR with Deception technology such as that from <a href=\"https:\/\/attivonetworks.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Attivo Networks<\/a> brings together a combination of offensive detection where the attacker can be effectively trapped as result of not getting hold of the real credentials required to make the lateral movement\/ privilege escalation a success thus failing in their objective completion.<\/p>\n<p>An integrated approach to DLP can also provide effective protection against the completion of the objectives for e.g. unified DLP policy across the endpoint and web-gateway looking for exfiltration of sensitive organizational data can also provide valuable defenses. <a href=\"https:\/\/www.mcafee.com\/enterprise\/en-us\/solutions\/unified-cloud-edge.html\" target=\"_blank\" rel=\"noopener noreferrer\">McAfee\u2019s UCE<\/a> platform provides such unified data protection capabilities.<\/p>\n<h3>Cloud account compromise detection<\/h3>\n<p>Our latest research indicates attacker is actively looking to establish additional footholds into customer cloud environments such as Azure AD or bypass multi-factor authentication by hijacking SAML sessions, McAfee\u2019s MVISION Cloud Access Control and User Anomaly Detection can identify suspicious access attempts to cloud services and infrastructure.<\/p>\n<p>It is recommended to increase monitoring and investigations into such activity especially with privileged accounts on sensitive infrastructure<\/p>\n<h2>Supply Chain and Intellectual Property Protection<\/h2>\n<p>In addition to architecture review and continuous hunting for indicators, it is recommended that customers work with their suppliers \u2013 IT, Cloud Services, Infrastructure, Hardware, etc. \u2013 to validate integrity. Secondly, review controls, detection use cases in the SOC and logs, specifically related to your intellectual property. A tabletop exercise to rehearse crisis management and breach notification procedures is also recommended.<\/p>\n<h2>Summary and Next Steps<\/h2>\n<p>It\u2019s important to note that analysis of this attack is ongoing across the globe and events are still unfolding. The presence\/detection of the backdoor and affected software is just the beginning for many customers. MVISION EDR or other tool detections of malicious named-pipe presence and domains help indicate to a customer if the backdoor was running, but with the gathered system information, the adversary may have valid accounts and access to AD or Cloud systems in some cases. The adversary has been wiping information\/log files to erase traces. Incident Response is a critical piece of your overall business resilience and if you are affected, you will no doubt be asking yourself these types of questions.<\/p>\n<ul>\n<li>When did we install the vulnerable software?<\/li>\n<li>Did they compromise user-accounts and have AD access?<\/li>\n<li>Did they install additional backdoors?<\/li>\n<li>How many systems and accounts are affected?<\/li>\n<li>Were cloud or enterprise resources accessed?<\/li>\n<li>Was information stolen? If so, do we have notification procedures?<\/li>\n<li>Are there other supply chain compromises yet undiscovered?<\/li>\n<\/ul>\n<p>McAfee will continue to post analysis results and defensive guidance as we learn more about the attack. Customers should follow <a href=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/\" target=\"_blank\" rel=\"noopener noreferrer\">McAfee Labs<\/a> posts, check the <a href=\"https:\/\/www.mcafee.com\/enterprise\/en-us\/lp\/insights-preview.html\" target=\"_blank\" rel=\"noopener noreferrer\">Insights Preview<\/a> Dashboard for latest threat intelligence, and continually check the <a href=\"https:\/\/support.mcafee.com\/webcenter\/portal\/supportportal\/pages_knowledgecenter?startover=true&amp;pageTemplate=null\">Knowledge Center<\/a> for latest product guidance.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In a blog post released 13 Dec 2020, FireEye disclosed that threat actors compromised SolarWinds\u2019s Orion IT monitoring and management&#8230;<\/p>\n","protected":false},"author":787,"featured_media":96044,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[442],"tags":[],"coauthors":[4601,6130],"class_list":["post-115543","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-mcafee-labs"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How A Device to Cloud Architecture Defends Against the SolarWinds Supply Chain Compromise | McAfee Blog<\/title>\n<meta name=\"description\" content=\"In a blog post released 13 Dec 2020, FireEye disclosed that threat actors compromised SolarWinds\u2019s Orion IT monitoring and management software with a\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How A Device to Cloud Architecture Defends Against the SolarWinds Supply Chain Compromise | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"In a blog post released 13 Dec 2020, FireEye disclosed that threat actors compromised SolarWinds\u2019s Orion IT monitoring and management software with a\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/how-a-device-to-cloud-architecture-defends-against-the-solarwinds-supply-chain-compromise\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2020-12-21T21:32:24+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-01T02:40:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/Dark-network-with-glowing-red-node-targeting-a-bug-information-security-3D-illustration.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2048\" \/>\n\t<meta property=\"og:image:height\" content=\"1152\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Mo Cashman, Arnab Roy\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Mo Cashman, Arnab Roy\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"17 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/how-a-device-to-cloud-architecture-defends-against-the-solarwinds-supply-chain-compromise\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/how-a-device-to-cloud-architecture-defends-against-the-solarwinds-supply-chain-compromise\/\"},\"author\":{\"name\":\"Mo Cashman\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/c9878f38cb73f700507b2718693e0816\"},\"headline\":\"How A Device to Cloud Architecture Defends Against the SolarWinds Supply Chain Compromise\",\"datePublished\":\"2020-12-21T21:32:24+00:00\",\"dateModified\":\"2025-04-01T02:40:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/how-a-device-to-cloud-architecture-defends-against-the-solarwinds-supply-chain-compromise\/\"},\"wordCount\":3508,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/how-a-device-to-cloud-architecture-defends-against-the-solarwinds-supply-chain-compromise\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/Dark-network-with-glowing-red-node-targeting-a-bug-information-security-3D-illustration.jpg\",\"articleSection\":[\"McAfee Labs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/how-a-device-to-cloud-architecture-defends-against-the-solarwinds-supply-chain-compromise\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/how-a-device-to-cloud-architecture-defends-against-the-solarwinds-supply-chain-compromise\/\",\"name\":\"How A Device to Cloud Architecture Defends Against the SolarWinds Supply Chain Compromise | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/how-a-device-to-cloud-architecture-defends-against-the-solarwinds-supply-chain-compromise\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/how-a-device-to-cloud-architecture-defends-against-the-solarwinds-supply-chain-compromise\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/Dark-network-with-glowing-red-node-targeting-a-bug-information-security-3D-illustration.jpg\",\"datePublished\":\"2020-12-21T21:32:24+00:00\",\"dateModified\":\"2025-04-01T02:40:10+00:00\",\"description\":\"In a blog post released 13 Dec 2020, FireEye disclosed that threat actors compromised SolarWinds\u2019s Orion IT monitoring and management software with a\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/how-a-device-to-cloud-architecture-defends-against-the-solarwinds-supply-chain-compromise\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/how-a-device-to-cloud-architecture-defends-against-the-solarwinds-supply-chain-compromise\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/how-a-device-to-cloud-architecture-defends-against-the-solarwinds-supply-chain-compromise\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/Dark-network-with-glowing-red-node-targeting-a-bug-information-security-3D-illustration.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/Dark-network-with-glowing-red-node-targeting-a-bug-information-security-3D-illustration.jpg\",\"width\":2048,\"height\":1152},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/how-a-device-to-cloud-architecture-defends-against-the-solarwinds-supply-chain-compromise\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Other Blogs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"McAfee Labs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"How A Device to Cloud Architecture Defends Against the SolarWinds Supply Chain Compromise\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/c9878f38cb73f700507b2718693e0816\",\"name\":\"Mo Cashman\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/e9035a01a4599145df1d1d64135a5bd9\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/08\/4-96x96.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/08\/4-96x96.png\",\"caption\":\"Mo Cashman\"},\"description\":\"Mo Cashman is one of the company\u2019s passionate leaders in cyber security. As an Enterprise Security Architect and Principal Engineer at McAfee, Mo advises our largest global customers and partners on their cyber threat management and data protection strategies for the digital enterprise. Mo\u2019s passion is to inspire our next generation security professionals as well as help customers architect for future resilience. With that passion and over 20 years of experience, Mo leads our Security Architect and Executive Briefing Center programs in EMEA, where we host hundreds of customers each year. In previous roles at the company, Mo was the Chief Technical Strategist for the Global Public Sector and just prior to joining the company, lead Computer Security Incident Response and Threat Intelligence Teams investigating and responding to sophisticated cyber threats across the world.\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mo-cashman\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How A Device to Cloud Architecture Defends Against the SolarWinds Supply Chain Compromise | McAfee Blog","description":"In a blog post released 13 Dec 2020, FireEye disclosed that threat actors compromised SolarWinds\u2019s Orion IT monitoring and management software with a","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"How A Device to Cloud Architecture Defends Against the SolarWinds Supply Chain Compromise | McAfee Blog","og_description":"In a blog post released 13 Dec 2020, FireEye disclosed that threat actors compromised SolarWinds\u2019s Orion IT monitoring and management software with a","og_url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/how-a-device-to-cloud-architecture-defends-against-the-solarwinds-supply-chain-compromise\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2020-12-21T21:32:24+00:00","article_modified_time":"2025-04-01T02:40:10+00:00","og_image":[{"width":2048,"height":1152,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/Dark-network-with-glowing-red-node-targeting-a-bug-information-security-3D-illustration.jpg","type":"image\/jpeg"}],"author":"Mo Cashman, Arnab Roy","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"Mo Cashman, Arnab Roy","Est. reading time":"17 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/how-a-device-to-cloud-architecture-defends-against-the-solarwinds-supply-chain-compromise\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/how-a-device-to-cloud-architecture-defends-against-the-solarwinds-supply-chain-compromise\/"},"author":{"name":"Mo Cashman","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/c9878f38cb73f700507b2718693e0816"},"headline":"How A Device to Cloud Architecture Defends Against the SolarWinds Supply Chain Compromise","datePublished":"2020-12-21T21:32:24+00:00","dateModified":"2025-04-01T02:40:10+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/how-a-device-to-cloud-architecture-defends-against-the-solarwinds-supply-chain-compromise\/"},"wordCount":3508,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/how-a-device-to-cloud-architecture-defends-against-the-solarwinds-supply-chain-compromise\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/Dark-network-with-glowing-red-node-targeting-a-bug-information-security-3D-illustration.jpg","articleSection":["McAfee Labs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/how-a-device-to-cloud-architecture-defends-against-the-solarwinds-supply-chain-compromise\/","url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/how-a-device-to-cloud-architecture-defends-against-the-solarwinds-supply-chain-compromise\/","name":"How A Device to Cloud Architecture Defends Against the SolarWinds Supply Chain Compromise | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/how-a-device-to-cloud-architecture-defends-against-the-solarwinds-supply-chain-compromise\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/how-a-device-to-cloud-architecture-defends-against-the-solarwinds-supply-chain-compromise\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/Dark-network-with-glowing-red-node-targeting-a-bug-information-security-3D-illustration.jpg","datePublished":"2020-12-21T21:32:24+00:00","dateModified":"2025-04-01T02:40:10+00:00","description":"In a blog post released 13 Dec 2020, FireEye disclosed that threat actors compromised SolarWinds\u2019s Orion IT monitoring and management software with a","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/how-a-device-to-cloud-architecture-defends-against-the-solarwinds-supply-chain-compromise\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/how-a-device-to-cloud-architecture-defends-against-the-solarwinds-supply-chain-compromise\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/how-a-device-to-cloud-architecture-defends-against-the-solarwinds-supply-chain-compromise\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/Dark-network-with-glowing-red-node-targeting-a-bug-information-security-3D-illustration.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/07\/Dark-network-with-glowing-red-node-targeting-a-bug-information-security-3D-illustration.jpg","width":2048,"height":1152},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/how-a-device-to-cloud-architecture-defends-against-the-solarwinds-supply-chain-compromise\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Other Blogs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/"},{"@type":"ListItem","position":3,"name":"McAfee Labs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/"},{"@type":"ListItem","position":4,"name":"How A Device to Cloud Architecture Defends Against the SolarWinds Supply Chain Compromise"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/c9878f38cb73f700507b2718693e0816","name":"Mo Cashman","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/e9035a01a4599145df1d1d64135a5bd9","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/08\/4-96x96.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/08\/4-96x96.png","caption":"Mo Cashman"},"description":"Mo Cashman is one of the company\u2019s passionate leaders in cyber security. As an Enterprise Security Architect and Principal Engineer at McAfee, Mo advises our largest global customers and partners on their cyber threat management and data protection strategies for the digital enterprise. Mo\u2019s passion is to inspire our next generation security professionals as well as help customers architect for future resilience. With that passion and over 20 years of experience, Mo leads our Security Architect and Executive Briefing Center programs in EMEA, where we host hundreds of customers each year. In previous roles at the company, Mo was the Chief Technical Strategist for the Global Public Sector and just prior to joining the company, lead Computer Security Incident Response and Threat Intelligence Teams investigating and responding to sophisticated cyber threats across the world.","url":"https:\/\/www.mcafee.com\/blogs\/author\/mo-cashman\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/115543","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/787"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=115543"}],"version-history":[{"count":6,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/115543\/revisions"}],"predecessor-version":[{"id":211757,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/115543\/revisions\/211757"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/96044"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=115543"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=115543"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=115543"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=115543"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}