← Back to SOC feed Coverage →

possible-affected-software-orion[Nobelium]

kql MEDIUM Azure-Sentinel
aptbackdoorhuntingmicrosoftofficial
This rule was pulled from an open-source repository and enriched with AI. Validate in a test environment before deploying to production.
View original rule at Azure-Sentinel →
Retrieved: 2026-05-07T11:00:00Z · Confidence: medium

Hunt Hypothesis

Adversaries may be leveraging compromised software or infrastructure associated with the Nobelium campaign to establish persistent access within an Azure environment. SOC teams should proactively hunt for this behavior to identify and mitigate potential supply chain compromises before they lead to data exfiltration or lateral movement.

KQL Query

DeviceTvmSoftwareVulnerabilities
| where SoftwareVendor == 'solarwinds'
| where SoftwareName startswith 'orion'
| summarize dcount(DeviceName) by SoftwareName
| sort by dcount_DeviceName desc

Analytic Rule Definition

id: ee0f4b76-c9dc-4d54-96c2-78145d6a0fe0
name: possible-affected-software-orion[Nobelium]
description: |
  This query was originally published in the threat analytics report, Solorigate supply chain attack. Please note that these attacks are currently known as the Nobelium campaign.
  Microsoft detects the 2020 SolarWinds supply chain attack implant and its other components as part of a campaign by the Nobelium activity group. Nobelium is the threat actor behind the attack against SolarWinds, which was previously referred to as Solorigate.
  Nobelium silently added malicious code to legitimate software updates for Orion, which is IT monitoring software provided by SolarWinds. In this way, malicious dynamic link libraries (DLLs) were distributed to SolarWinds customers.
  The following query retrieves an inventory of SolarWinds Orion software use in your organization, organized by product name and ordered by how many devices the software is installed on.
  More Nobelium-related queries can be found listed under the See also section of this document.
  References:
  https://msrc-blog.microsoft.com/2020/12/13/customer-guidance-on-recent-nation-state-cyber-attacks/
  https://www.microsoft.com/security/blog/2020/12/18/analyzing-solorigate-the-compromised-dll-file-that-started-a-sophisticated-cyberattack-and-how-microsoft-defender-helps-protect/
requiredDataConnectors:
- connectorId: MicrosoftThreatProtection
  dataTypes:
  - DeviceTvmSoftwareVulnerabilities
tactics:
- Impact
tags:
- Nobelium
query: |
  DeviceTvmSoftwareVulnerabilities
  | where SoftwareVendor == 'solarwinds'
  | where SoftwareName startswith 'orion'
  | summarize dcount(DeviceName) by SoftwareName
  | sort by dcount_DeviceName desc

MITRE ATT&CK Context

References

False Positive Guidance

Original source: https://github.com/Azure/Azure-Sentinel/blob/main/Hunting Queries/Microsoft 365 Defender/Campaigns/possible-affected-software-orion[Nobelium].yaml