Cyberwarfare / Nation-State Attacks , Fraud Management & Cybercrime , Legislation & Litigation

SEC Moves to Get Foreign Testimony in SolarWinds Fraud Case

Testimony Request Targets Cybersecurity Concerns Raised by Ex-SolarWinds Engineer
SEC Moves to Get Foreign Testimony in SolarWinds Fraud Case

Federal regulators want to obtain oral testimony from a former SolarWinds engineer who documented concerns over a network vulnerability tied to VPN access and unmanaged devices.

See Also: VMware Carbon Black App Control

The U.S. Securities and Exchange Commission wants to get assistance from the Czech Republic's Ministry of Justice in securing testimony from Robert Krajcir, who used to work at SolarWinds and resides in the Czech Republic. The SEC said it offered to depose Krajcir voluntarily in Germany or at the U.S. Embassy in Prague, but Krajcir - who's represented by SolarWinds' legal counsel - has declined those options.

District Judge Paul Engelmayer has ordered SolarWinds and CISO Tim Brown to respond to the SEC's request for foreign judicial assistance by Friday, with any reply from the SEC due by Nov. 15. If Judge Engelmayer allows the SEC to proceed with its request, the agency will ask the Czech Ministry of Justice to respond within 60 days so that the SEC can gather testimony from Krajcir well in advance of an expected 2025 trial date (see: Why SEC, SolarWinds Eye Settlement Talks in Cyber Fraud Case).

The SEC said SolarWinds and Brown committed securities fraud by publicly mispresenting the company's cybersecurity practices between October 2018 and December 2020. Testimony from Krajcir is vital for offering insight into network access control and VPN vulnerabilities that undermine SolarWinds' security claims. SolarWinds declined to comment, while Brown and Krajcir didn't respond to inquiries from Information Security Media Group.

The SEC said SolarWinds publicly claimed only essential access rights were granted to employees and contractors. However, the SEC alleges SolarWinds allowed broad access privileges across its network, contradicting its public statements. Since Brown knew of systemic security vulnerabilities, the SEC said inconsistencies between SolarWinds' statements and its internal security posture misled investors (see: Judge Dismisses Most SEC Fraud Claims Against SolarWinds).

Why the SEC Wants Krajcir to Take the Stand

Regulators want Krajcir to testify about a particular vulnerability he found related to SolarWinds' VPN access, which enabled unmanaged devices to connect to the network. The SEC said Krajcir referred to this as a “security gap” that went unresolved despite multiple attempts to address it with SolarWinds’ management. Krajcir's recommendations were met with reluctance or resistance, the SEC alleges.

The SEC said Krajcir's perspective on network management and cybersecurity practices during his employment at SolarWinds are unique and unobtainable from other sources. The Czech Republic and U.S. are both signatories to a legal framework that allows U.S. courts to seek evidence from people living abroad, and the SEC said its request is routine and aligns with international cooperation agreements.

In emails from summer 2018, Krajcir noted that anyone with Active Directory credentials could access SolarWinds' corporate Wi-Fi and VPN from any device, including personal or unmanaged devices that were not part of the company's domain. Krajcir said devices connecting via VPN could bypass security checks, potentially downloading harmful content or spreading malware without detection.

To mitigate these vulnerabilities, Krajcir suggested using certificates to authenticate devices connecting to the VPN and reducing user privileges to prevent them from installing unauthorized software. Despite his efforts, Krajcir's emails from summer 2018 indicate that his recommendations were either delayed or not fully implemented, which the SEC said reflects a disregard for security risks at the managerial level.

A presentation Krajcir created in August 2018 noted an absence of restrictions on unmanaged devices, an inability to monitor what devices are connected to the network, and a lack of options to enforce user identity verification. Krajcir said unmanaged devices had the same level of access as corporate devices, allowing them to access critical systems and potentially introduce malware into the core network.

How SolarWinds Responded to Krajcir's Findings

Krajcir's email exchanges were met with limited action and skepticism, with one colleague questioning the need for such strict security controls, expressing concern over the practicality of Krajcir's proposed machine authentication measures. Other responses questioned the enforcement of certificate-based authentication, specifically around whether users would be able to export certificates from their machines.

The SEC argues that Krajcir's emails and presentation indicate that SolarWinds was aware of but failed to address substantial security vulnerabilities, even as it publicly assured investors of secure operations. Krajcir's perspective as a network engineer responsible for cybersecurity would provide critical insights into the discrepancy between SolarWinds' internal practices and public representations, the SEC argues (see: SEC Alleges SolarWinds, CISO Tim Brown Defrauded Investors).

Specifically, the SEC said SolarWinds' security statement emphasizes role-based access and network security controls, but Krajcir's emails reveal unmanaged devices with Active Directory credentials could access the network without sufficient restrictions. SolarWinds also said it engages in robust network monitoring, while Krajcir said the company was unable to track unmanaged devices on corporate Wi-Fi.

The SEC said its case is strengthened by evidence suggesting SolarWinds publicly overrepresented its cybersecurity capabilities while internally grappling with critical security controls that were either absent or inadequately enforced. The SEC said SolarWinds' security statement built trust with customers and investors by suggesting a well-protected environment, but internal documents reveal a different reality.


About the Author

Michael Novinson

Michael Novinson

Managing Editor, Business, ISMG

Novinson is responsible for covering the vendor and technology landscape. Prior to joining ISMG, he spent four and a half years covering all the major cybersecurity vendors at CRN, with a focus on their programs and offerings for IT service providers. He was recognized for his breaking news coverage of the August 2019 coordinated ransomware attack against local governments in Texas as well as for his continued reporting around the SolarWinds hack in late 2020 and early 2021.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.in, you agree to our use of cookies.