All cases

SolarWinds (Sunburst)

March 2020 – December 2020

EspionagePeak: DisruptionAttribution: High ConfidenceGovernmentTechnologyDefense
Year
2020
Actor country
Russia
Target regions
United States, United Kingdom, NATO allies
Unpeace score
8

Executive Summary

Sophisticated supply chain compromise of SolarWinds Orion IT monitoring platform, enabling covert access to ~18,000 organizations including US federal agencies. Discovered in December 2020 after ~9 months of undetected access.

Why This Matters

SolarWinds exposed systemic supply chain risk in government IT and triggered the most sweeping US cybersecurity executive order in a decade, reshaping federal procurement and zero-trust policy.

Escalation Profile

7-Dimension Profile

Escalation Ladder

Probing
Intrusion
Disruption
Degradation
Destruction
Strategic

Phases

2020-03
Intrusion

Supply chain backdoor

Trojanized SolarWinds Orion update delivered SUNBURST backdoor to ~18,000 customers.

2020-05
Intrusion

Selective second-stage targeting

Operators deployed TEARDROP/Cobalt Strike only against ~100 high-value targets including Treasury, Commerce, DHS.

2020-12
Disruption

Discovery and response

FireEye discovered breach via stolen red-team tools; triggered government-wide incident response.

Threshold Crossings

  • Scale of supply chain access exceeded traditional espionage scope
  • Compromised core government IT monitoring infrastructure

Restraint Factors

  • Operated within traditional espionage norms — collection, not disruption
  • Selective targeting minimized footprint

Attribution Assessment

High ConfidenceSVR (Foreign Intelligence Service)
Russia
APT29Cozy BearNobeliumMidnight Blizzard
1. Technical

Threat actor mapped to Russia based on infrastructure analysis, malware attribution, and operational patterns.

Evidence: FireEye: Highly Evasive Attacker Leverages SolarWinds Supply Chain

2. Political / Legal
Public AttributionSanctions Imposed
  • Executive Order 14028: Improving the Nation's Cybersecurity (May 2021)
  • US sanctions against Russian entities and expulsion of diplomats (Apr 2021)
  • CISA Emergency Directive 21-01

Sources: CISA Emergency Directive 21-01; Executive Order 14028

3. Open Source

No dedicated journalistic sources in dataset. See sources section for full references.

High Confidence” reflects available public evidence. All assessments carry inherent uncertainty and should be read alongside source material.

Unpeace Position

8

Unpeace Score

Composite severity rating on the peace–conflict spectrum

Stable
Contested
Escalatory
03060100

Contributing Dimensions

Escalation peak3/6
Threshold crossings2/4
Governance flags4/8
Sectors affected3/6
Entanglement7/10
Country scope3/6

Coercive Function

Espionage

Intelligence collection — coercive value lies in the information advantage gained and the implicit signal that the adversary can access sensitive systems.

Observed coercive effects

  • Scale of supply chain access exceeded traditional espionage scope
  • Compromised core government IT monitoring infrastructure

Entanglement Risk

Entanglement score7

Sectors affected

GovernmentTechnologyDefense

Countries / regions

United StatesUnited KingdomNATO allies

Impact summary

Covert access to email and files at Treasury, Commerce, DHS, DOE, and ~100 private-sector organizations.

Infrastructure Meaning

Malware / tooling

SUNBURSTTEARDROPCobalt Strike

Capability profile

Covert access to email and files at Treasury, Commerce, DHS, DOE, and ~100 private-sector organizations.

4 ATT&CK techniques mapped — see ATT&CK mapping below.

Governance Analysis

Governance Flags

!Norm Violation
APublic Attribution
SSanctions Imposed
IIndictment
UUN Discussion
RRegulatory Change
CInternational Cooperation
DDeterrence Signal

Norms invoked

  • Debate over whether espionage violates UN GGE norms
  • Responsible state behavior in cyberspace (OEWG)

Policy responses

  • Executive Order 14028: Improving the Nation's Cybersecurity (May 2021)
  • US sanctions against Russian entities and expulsion of diplomats (Apr 2021)
  • CISA Emergency Directive 21-01

Regulatory changes

  • Federal zero-trust architecture mandate
  • SBOM requirements for federal software suppliers
  • Cyber Safety Review Board (CSRB) establishment

Governance impact assessment

Catalyzed the most significant US cybersecurity policy overhaul in a decade, establishing zero-trust mandates and supply chain security requirements across the federal government.

Sources

G

CISA Emergency Directive 21-01

Government2020-12-13
V

FireEye: Highly Evasive Attacker Leverages SolarWinds Supply Chain

Vendor Report2020-12-13
G

Executive Order 14028

Government2021-05-12

Sources listed reflect publicly available materials used to construct this case entry. Inclusion does not imply endorsement. Where no URL is provided, the source may be found via its title and date.