IT Management Software Development Company, Red vs. Blue Scenario

Summary

Inspired by the SolarWinds incident, our team has decided to build an amazing IT Management Software Development Company environment. Will you penetrate the software development company to compromise their software and execute a global-scale software supply-chain compromise?

Can you turn fate around and defend your network from various threats? Only time will tell…

NOTE: This scenario's network map is not meant to represent any SolarWinds' locations. Any similarities to actual corporate network environments are purely coincidental.
IT Management Software Development Company selection panel from ThreatGEN® Red vs. Blue
TheatGEN® Red vs. Blue scenario selection panel

For more information on the SolarWinds cybersecurity incident, see our AutoTableTop™ SolarWinds scenario.

Potential Vulnerabilities Related to SolarWinds Incident

The SolarWinds cybersecurity incident involved attackers compromising the supply chain by injecting malicious code into legitimate software updates. This allowed them to infiltrate networks undetected. Similar vulnerabilities in this network could include:

Compromised Software Supply Chain

  • Vulnerable Points
    • Systems like CORPORATE-SIEM or CORPORATE-AD could be compromised if they rely on third-party software or updates.
    • Development servers (DEV01, DEV02) might be used to test or deploy software updates, making them targets for supply chain attacks.
  • Mitigation
    • Implement strict code-signing policies.
    • Regularly audit third-party software dependencies.

Insufficient Network Segmentation

  • Vulnerable Points
    • If firewalls between segments (e.g., MGMT-FW, DEVOPS-FW) are misconfigured or have weak rules, attackers could move laterally across the network.
    • Shared resources like STAFF-FILES might provide a pivot point for attackers.
  • Mitigation
    • Enforce strict access controls between segments.
    • Use micro-segmentation to limit lateral movement.

Privileged Account Abuse

  • Vulnerable Points
    • Active Directory (CORPORATE-AD) is a critical target for attackers seeking privileged access.
    • Remote users in the cloud environment might have elevated permissions that could be exploited.
  • Mitigation
    • Implement multi-factor authentication (MFA) for all privileged accounts.
    • Regularly review and minimize privileged access.

Remote Access Exploitation

  • Vulnerable Points
    • The internet gateway is a potential entry point for attackers targeting remote workers or outdated VPN configurations.
    • Devices in the cloud environment might lack endpoint protection.
  • Mitigation
    • Use secure VPNs with up-to-date encryption protocols.
    • Deploy endpoint detection and response (EDR) solutions.

Weak Monitoring and Detection

  • Vulnerable Points
    • If IDS systems (CORP-IDS, LAB-IDS, etc.) are not properly tuned, they may fail to detect anomalous activity.
    • SIEM systems might miss subtle indicators of compromise if logs are incomplete or poorly analyzed.
  • Mitigation
    • Regularly update IDS signatures and SIEM correlation rules.
    • Conduct periodic threat-hunting exercises.

By addressing these vulnerabilities, the organization can reduce its risk of falling victim to attacks similar to the SolarWinds incident.


Briefings

Capture the Flag (CTF)
Red vs. Blue Teams

Blue Team

The date is December 13, 2020. A large IT Management Software Development Company reports that a cybersecurity issue is affecting some of its software, promptly publishing an update to remove the backdoor. The alleged attack vector is password guessing, password spraying, and inappropriately secured administrative credentials accessible via external remote access services, which the attackers could use to install the malware, ultimately inserting the backdoor into its IT management platform and compromising thousands of companies via a software supply-chain compromise. Russian intelligence is suspected to be behind the attack, likely intending to enhance its espionage capabilities and to establish footholds within other governmental networks.

Your mission is to secure this large IT Management Software Company by improving your defenses, reducing risk by implementing policies, as well as managing staff and budget. Much like the Russian intelligence, the threat actors are always looking for a way in. Will you identify weak and default credentials in your environment and install a VPN to prevent an incident like this or use any of the other tools at your disposal?

You can win the game by doing any of the following:

  • eliminating all vulnerabilities within the assets on the network
  • increasing the threat intelligence score to 100%
  • outlasting the Red Team when the turns expire

Red Team

A large IT Management Software Development Company reports that on December 13, 2020, a cybersecurity issue is affecting some of its software, promptly publishing an update to remove the backdoor. The alleged attack vector has been password guessing, password spraying, and inappropriately securing administrative credentials accessible via external remote access services, which the attackers can use to install malware, ultimately inserting the backdoor into its IT management platform and compromising thousands of companies via a software supply-chain compromise. Russian intelligence is suspected to be behind the attack, likely intending to enhance its espionage capabilities and to establish footholds within other governmental networks.

As the Red Team, your mission is to execute the entirety of an attack kill chain in other to accomplish your objectives. Will you be able to gain initial access via password-based attacks, just like the Russian intelligence, and install malware in the environment to compromise the company’s software or will you choose to find some other critical process to destroy?

You can win the game by doing any of the following:

  • damaging the Blue Team’s critical process
  • reducing the Blue Team’s profit & loss meter so that it stays in the red zone (below 25%) for 5 consecutive turns

Network Overview

ThreatGEN® Red vs. Blue – large IT management software company network map

This network map represents a complex IT infrastructure for a large software company. The map illustrates multiple network segments (corporate, development, laboratory, and cloud environments) with firewalls and intrusion detection systems (IDS) separating them. Here’s a discussion on the different network segments:

  • Assets:
    • User workstations (e.g., R.JACKSONS6, AKIMB9)
    • Key servers like CORPORATE-AD (Active Directory) and CORPORATE-SIEM
    • Financial systems (FIN-PAYROLL) and shared resources (STAFF-FILES)
  • Segmented by:
    • Firewalls (MGMT-FW, CORP-FW) and IDS
  • Assets:
    • Hosts development servers (DEV01, DEV02)
    • Test environments (TEST-LAB)
  • Segmented by:
    • Firewalls (DEVOPS-FW) and IDS
  • Assets:
    • Lab routers
    • Switches
    • Test servers (LAB-TESTSRV1, LAB-TESTSRV2)
  • Segmented by:
    • Firewalls (LAB-FW)
  • Assets:
    • Remote users with individual devices (e.g., ASHLEY50, MICHAEL97)
  • Segmented by:
    • Connected to the corporate network via the internet gateway

Scenario released on Thursday, February 21, 2025, original map released September 21, 2024.
Copyright © 2025 by Derezzed Inc. D/B/A ThreatGEN, all rights reserved.

Categories