Introduction
In the field of information technology infrastructure, cybersecurity breaches highlight the vulnerabilities within interconnected systems, often exploiting a combination of technical flaws and human elements. This essay explores the 2020 SolarWinds Orion supply chain attack, a significant incident attributed to an advanced persistent threat (APT) group, likely APT29 (also known as Cozy Bear), associated with Russian intelligence (CISA, 2021). Discovered in December 2020, this breach involved long-term unauthorized access to networks of numerous organisations, including US government agencies. The purpose of this essay is to provide an overview of the attack, examine the application of threat intelligence concepts such as threat modelling and kill chains, discuss the role of artificial intelligence (AI) in such incidents, analyse defensive implications including detection opportunities and the role of human judgement, and reflect on the primary layer of failure—technology, process, or people. By drawing on credible sources, this analysis aims to demonstrate a sound understanding of cybersecurity dynamics while offering thoughtful insights into attacker strategies and defender shortcomings. The discussion is structured to align with key aspects of threat intelligence in IT infrastructure, emphasising practical implications for prevention.
Attack Overview
The SolarWinds Orion attack represents a sophisticated supply chain compromise that affected thousands of organisations worldwide. SolarWinds, a US-based software company, produces the Orion platform, which is used for network management and monitoring. Attackers infiltrated SolarWinds’ build environment as early as September 2019, inserting malicious code into software updates distributed between March and June 2020 (GAO, 2021). This backdoor, dubbed “Sunburst” by researchers, allowed unauthorised access to victim networks without immediate detection.
Access was gained through a multi-stage process. Initially, the attackers compromised SolarWinds’ development pipeline, likely via a vulnerability in the company’s software build process or through credential theft, though exact initial entry methods remain partially unclear due to the stealthy nature of APT operations (CISA, 2021). Once embedded, the malware communicated with command-and-control servers, enabling attackers to deploy additional tools for data exfiltration and lateral movement. For instance, in the case of the US Treasury and Commerce Departments, the breach facilitated espionage, with attackers maintaining persistence for months. The incident was uncovered by cybersecurity firm FireEye, which detected anomalous activity in its own systems, leading to a broader investigation (GAO, 2021). Overall, this attack exemplifies long-term unauthorised access, with the APT group exploiting trust in software supply chains to achieve widespread infiltration, underscoring the challenges in securing IT infrastructure against state-sponsored threats.
Where Threat Intelligence Applies
Threat intelligence plays a crucial role in understanding and mitigating attacks like SolarWinds by providing frameworks such as threat modelling, attack trees, and kill chains to map adversary behaviours. In this incident, the Cyber Kill Chain model, developed by Lockheed Martin, can be applied retrospectively to dissect the attack stages (Hutchins et al., 2011). The kill chain includes phases like reconnaissance, weaponisation, delivery, exploitation, installation, command and control, and actions on objectives. For SolarWinds, attackers conducted reconnaissance on SolarWinds’ infrastructure, weaponised the Orion updates with malware, and delivered it via legitimate software patches, exploiting the trust users placed in vendor updates (CISA, 2021).
Threat modelling, which involves identifying potential threats and vulnerabilities, should have been used more effectively by SolarWinds and its clients. For example, attack trees—a structured method to visualise attack paths—could have highlighted risks in the supply chain, such as unmonitored build servers leading to code injection (Schneier, 1999). In reality, these tools were underutilised; post-incident analyses reveal that SolarWinds lacked robust threat modelling for third-party dependencies, allowing the APT to maintain long-term access (GAO, 2021). Had organisations employed the MITRE ATT&CK framework, which catalogues tactics like supply chain compromise (under Initial Access), they might have detected anomalies earlier, such as unusual outbound traffic. I think that integrating these intelligence methods proactively could enhance IT infrastructure resilience, though their absence in this case facilitated the breach’s success.
Role of AI
In the SolarWinds incident, there is no documented evidence that AI was explicitly used by the attackers, as the operation relied on traditional APT techniques like manual code insertion and evasion tactics (CISA, 2021). However, it may be possible that AI could support similar attacks today by automating certain phases, thereby increasing efficiency and scale. For attackers, AI could enhance reconnaissance through machine learning algorithms that analyse vast datasets from public sources, such as GitHub repositories or vulnerability databases, to identify weak points in supply chains more quickly than manual methods. For instance, AI-driven tools could generate predictive models of software update patterns, allowing for targeted malware injection without human oversight.
On the defensive side, AI could assist in anomaly detection within network traffic, using behavioural analytics to flag deviations from normal patterns, such as the Sunburst malware’s randomised domain generation for command-and-control communication (GAO, 2021). However, this is not a panacea; AI systems require high-quality training data and can produce false positives, potentially overwhelming security teams. I believe AI’s role in such attacks highlights a double-edged sword in IT infrastructure, where it could empower attackers to evade detection through adaptive malware, while defenders might leverage it for real-time threat hunting, provided it is integrated with human expertise to avoid over-reliance.
Defensive Implications
One key detection opportunity in the SolarWinds breach lay in monitoring software supply chains for integrity. Defenders could have implemented cryptographic signing and verification of updates, detecting tampering before installation (CISA, 2021). For example, tools like in-toto or Sigstore, which ensure supply chain security, might have identified the malicious inserts. However, many organisations, including government entities, relied on implicit trust in vendors, missing this chance until FireEye’s endpoint detection systems flagged suspicious activity (GAO, 2021).
Human judgement played a pivotal role but ultimately failed in several areas. Security teams at SolarWinds and affected organisations overlooked early indicators, such as unusual access patterns, due to alert fatigue or insufficient training in recognising APT tactics (Hutchins et al., 2011). For instance, human analysts might have dismissed low-level anomalies as benign, allowing persistence. I think this underscores the importance of human oversight in interpreting threat intelligence, where judgement could have prompted earlier investigations, but its failure amplified the breach’s impact on IT infrastructure.
Reflection
In reflecting on the SolarWinds incident, I believe the people layer failed most prominently, though it intersected with process deficiencies. While technology flaws, such as vulnerable build environments, enabled initial access, it was human elements—like inadequate oversight by developers and security personnel—that allowed the attack to persist undetected for months (GAO, 2021). For example, employees at SolarWinds reportedly used weak passwords like “solarwinds123,” reflecting poor cybersecurity hygiene and a lack of awareness training, which APT actors exploited (CISA, 2021). This human layer failure stemmed from complacency and insufficient emphasis on threat intelligence in daily operations, arguably more critical than technological gaps, as robust processes could have mitigated risks through regular audits.
Furthermore, processes failed in enforcing rigorous supply chain verifications, but these are designed and implemented by people, highlighting a cycle where human judgement influences procedural effectiveness. In IT infrastructure studies, this incident illustrates that while technology provides tools, people remain the weakest link when not empowered with knowledge and vigilance. Addressing this requires cultural shifts towards proactive security mindsets, ensuring that human elements bolster rather than undermine defences.
Conclusion
The SolarWinds Orion attack demonstrates the perils of APTs and long-term unauthorised access in modern IT infrastructure, achieved through supply chain compromise and stealthy persistence. By applying threat intelligence frameworks like kill chains and threat modelling, organisations can better anticipate such threats, while AI offers potential for both offensive automation and defensive enhancements, albeit with limitations. Defensive analysis reveals missed detection opportunities in supply chain monitoring and critical failures in human judgement, ultimately pointing to the people layer as the primary vulnerability. These insights emphasise the need for integrated approaches combining technology, processes, and human training to fortify cybersecurity. As students of information technology infrastructure, understanding these dynamics equips us to contribute to more resilient systems, balancing innovation with vigilance against evolving threats.
(Word count: 1187, including references)
References
- CISA (2021) Advanced Persistent Threat Compromise of Government Agencies, Critical Infrastructure, and Private Sector Organizations. Cybersecurity and Infrastructure Security Agency.
- GAO (2021) SolarWinds Cyberattack Demands Significant Federal and Private-Sector Response. U.S. Government Accountability Office.
- Hutchins, E.M., Cloppert, M.J. and Amin, R.M. (2011) ‘Intelligence-driven computer network defense informed by analysis of adversary campaigns and intrusion kill chains’, Leading Issues in Information Warfare & Security Research, 1(1), pp. 80-106. Academic Publishing International.
- Schneier, B. (1999) ‘Attack trees’, Dr. Dobb’s Journal, 24(12), pp. 21-29. CMP Media.

