I've been seeing articles as of last night discussing SUPERNOVA, an additional supply chain attack likely originating from a different APT than SUNBURST. This one comes in the form of a .NET webshell implanted in the App_web_logoimagehandler.ashx.b6031896.dll file and programmed to hijack the Orion HTTP API and listen for specific API parameters, then compile and execute .NET code in memory using the runtime on the Orion host. Per the article,
"The attacker may send a request to the embedded webshell over the internet or through an internally compromised system. The code is crafted to accept the parameters as components of a valid .NET program, which is then compiled in-memory. No executable is dropped (and thus the webshell’s execution evades most defender endpoint detections), and the compiled assembly immediately invokes the specified class method."
I'm assuming SolarWinds is already aware of this additional supply chain breach -- but the only mitigations I'm finding in the article point to Palo Alto antivirus definitions that can detect the compromised DLL. Are other mitigations available? Are Orion customers who've installed the latest 2020.2.1 HF2 hotfix for SUNBURST protected from this compromise also?