Operating at source-level allows same backdoor to work even as the Solarwinds Orion code is modified around it— attacker does not have to watch for every commit and race to update their backdoor for compatibility

2/N
Injecting it at build time keeps any trace out of source repositories (such as git) where its presence could be discovered in logs or manual review

3/N
And for good measure the malware verified that the target file used by the backdoor has not changed in the original code-base

(Otherwise it may result in compiler errors that alerted defenders eg if another file refers to a new function missing from back-doored version)

4/N
One edge-case that could have blown the cover: if Solarwinds changed compiler version/settings.
Backdoor could introduce spurious build errors not present in original (eg use of deprecated API, more aggressive warnings…)

Remarkable craftsmanship overall 🎩

5/5
You can follow @randomoracle.
Tip: mention @twtextapp on a Twitter thread with the keyword “unroll” to get a link to it.

Latest Threads Unrolled:

By continuing to use the site, you are consenting to the use of cookies as explained in our Cookie Policy to improve your experience.