BROADCAST: Our Agency Services Are By Invitation Only. Apply Now To Get Invited!
ApplyRequestStart
Header Roadblock Ad

Investigative Review of SolarWinds Corporation

By allowing the "Security Statement" to remain public while knowing that the company's systems permitted credentials like "solarwinds123," Brown and SolarWinds engaged in a course of conduct that misled investors about the true risk profile of the company.

Verified Against Public And Audited Records Long-Form Investigative Review
Reading time: ~35 min
File ID: EHGN-REVIEW-37977

SEC fraud charges against CISO regarding concealment of cybersecurity risks prior to Sunburst attack

The SEC complaint alleges that this "hypothetical" language, warning that attacks "may" occur or "could" result in damage, was materially.

Primary Risk Legal / Regulatory Exposure
Jurisdiction EPA
Public Monitoring The SEC's complaint, filed in the Southern District of New York (Case 1: 23-cv-09518).
Report Summary
The SEC's complaint, filed in the Southern District of New York (Case 1: 23-cv-09518), leveraged the "solarwinds123" incident to the company's "Security Statement." This document, published on the SolarWinds website and referenced in filings, asserted that the company enforced a rigorous password policy requiring complexity, rotation, and obfuscation. In October 2018, coinciding with the company's Initial Public Offering, Brown's internal presentation warned that the "current state of security leaves us in a very state for our serious assets." Rather than triggering an immediate, all-hands-on-deck remediation effort, this warning appears to have been absorbed into the company's operational.
Key Data Points
In the annals of cybersecurity failures, few incidents rival the sheer absurdity of the "solarwinds123" credential. In November 2019, Kumar identified a misconfigured GitHub repository belonging to SolarWinds. Inside, he found the hardcoded password "solarwinds123" associated with a serious update server, `downloads. solarwinds. com`. Forensic analysis later determined that this credential had been exposed and accessible to the public since at least June 2018. The "solarwinds123" password served as irrefutable proof that the written policies were, in practice, ignored. The "solarwinds123" incident also exposed the hollowness of SolarWinds' internal enforcement method. The theoretical risk of unmanaged access materialized in January.
Investigative Review of SolarWinds Corporation

Why it matters:

  • The "Security Statement" presented by SolarWinds Corporation to investors and customers contained misleading information about the company's cybersecurity practices.
  • Internal investigations by the Securities and Exchange Commission revealed discrepancies between the public claims made in the statement and the actual security measures implemented by SolarWinds.

The 'Security Statement' Discrepancies: Public Claims vs. Internal Reality

The “Security Statement” served as the primary artifact of deception in the Securities and Exchange Commission’s case against SolarWinds Corporation. For years prior to the massive Sunburst cyberattack discovered in December 2020, this document resided on the company’s website, presenting an image of a digital. It assured investors and customers that SolarWinds adhered to rigorous standards, specifically the National Institute of Standards and Technology (NIST) Cybersecurity Framework. It claimed the company followed a Secure Development Lifecycle (SDL) and maintained strict password protections. The SEC’s investigation, yet, exposed these claims as fiction. Internal communications revealed a security environment in disarray, characterized by known weaknesses that stood in direct opposition to the company’s public assurances. The between the “Security Statement” and the internal reality formed the core of the fraud charges against the company and its Chief Information Security Officer, Timothy G. Brown.

The NIST Framework Fabrication

SolarWinds publicly touted its with the NIST Cybersecurity Framework, a gold standard for evaluating security practices. This claim suggested a detailed, top-down method to managing cyber risk. The SEC complaint detailed a different reality. Investigators found that SolarWinds had not implemented the NIST framework across its enterprise. Evidence showed the company relied on a preliminary self-assessment from 2019 that did not even evaluate the NIST Cybersecurity Framework. Instead, it looked at a different set of standards, NIST SP 800-53 and FedRAMP, and only for a small subset of products. The flagship Orion platform, which would later become the vector for the Sunburst attack, was not part of this assessment. By projecting adherence to a framework it had not actually adopted, SolarWinds created a false sense of maturity regarding its defensive posture.

The Secure Development Lifecycle Myth

The “Security Statement” also asserted that SolarWinds used a Secure Development Lifecycle (SDL) to create its software. An SDL integrates security checks at every phase of the creation process, from design to coding to testing. This practice aims to catch defects early, preventing vulnerabilities from reaching the final product. Internal emails painted a picture of an SDL that existed in name only. In January 2018, an engineering manager explicitly questioned this claim in an email to senior leadership. The manager noted, “I’ve gotten feedback that we don’t do of the things that are indicated in the [Security Statement SDL Section].” The manager then asked for guidance on how to answer questions about this gap, suggesting a vague response about “improvement.” This admission demonstrated that key technical staff knew the public claims were untrue. They understood that the rigorous checks promised to customers were not happening on the ground. Yet, the “Security Statement” remained unchanged, continuing to mislead anyone who read it.

Password Policies and Access Control Failures

Perhaps the most tangible gap involved basic hygiene: passwords and access controls. The “Security Statement” claimed SolarWinds maintained strong password protections and that passwords were individually stored in an encrypted state or “salted and hashed.” It also boasted of strict access controls, implying that administrative rights were tightly restricted. The SEC’s findings shattered this facade. Internal documents showed that the company stored passwords in simple, unencrypted formats. The investigation famously referenced the “solarwinds123” password incident, which became a symbol of the company’s lax attitude. the problem went deeper than one weak credential. Brown and other insiders knew that access controls were porous. A 2018 presentation prepared by a company engineer and shared with Brown described the remote access setup as “not very secure.” The engineer warned that an attacker exploiting this weakness could “basically do whatever without us detecting it until it’s too late,” leading to “major reputation and financial loss.” even with these clear internal warnings, the public statement continued to pledge strong access management. The company sold a narrative of strict discipline while operating with loose permissions that left the door open for intruders.

Timothy Brown’s Knowledge and Inaction

The SEC’s case against CISO Timothy Brown hinged on his specific knowledge of these failures. As the executive responsible for information security, Brown had the duty to ensure the accuracy of the “Security Statement.” The court found that the SEC adequately pled that Brown acted with scienter, intent or severe recklessness, in allowing the false statement to remain public. Brown’s own words served as the most damaging evidence. In presentations from 2018 and 2019, he admitted to colleagues that the “current state of security leaves us in a very exposed state for our core assets.” He also noted that “access and privilege to core systems/data is inappropriate.” In June 2020, months before the attack news broke, Brown wrote in an email that it was “very concerning” that an attacker might target Orion because “our backends are not that resilient.” In September 2020, an internal document shared with him stated that the volume of security defects identified had “outstripped the capacity of Engineering teams to resolve.” These communications prove that the CISO did not overlook minor errors. He fully grasped the severity of the situation. He knew the company’s defenses were weak, its development process flawed, and its access controls insufficient. Yet, he allowed the “Security Statement” to, validating a false narrative to the market.

The Legal Aftermath

In July 2024, a federal judge dismissed several parts of the SEC’s complaint sustained the fraud charges related to the “Security Statement.” The court ruled that a jury could find this document materially false and misleading. The judge noted that Brown knew of the “substantial body of data” that impeached the statement’s content. His conduct in allowing it to remain public for years, even with contradictory internal practices, was plausible evidence of “extreme misconduct.” This ruling marked a significant moment in cybersecurity enforcement. It established that a CISO could be held personally liable for fraud if they knowingly permit false security claims to circulate. The “Security Statement” was not just marketing fluff; it was a material representation of risk. By falsifying it, SolarWinds and Brown deprived investors of the truth, hiding the ticking bomb that was their security infrastructure.

Table 1: The ‘Security Statement’ vs. Internal Reality
Claim in Public ‘Security Statement’Internal Reality (per SEC Complaint)Evidence/Source
NIST Framework AdherenceNo enterprise-wide adoption; relied on partial, unrelated self-assessment.SEC Complaint; 2019 Self-Assessment
Secure Development Lifecycle (SDL)SDL practices not followed; engineering manager admitted gaps.Jan 2018 Email from Engineering Manager
Strong Password ProtectionPasswords stored in unencrypted/unsalted formats; weak credentials used.Internal Audit Findings; “solarwinds123” incident
Strict Access ControlsWidespread admin rights; remote access “not very secure.”2018 Engineer Presentation; Brown’s 2019 Presentation
in total Security Posture“Digital ” image; strong defenses.“Current state of security leaves us in a very exposed state.”
The 'Security Statement' Discrepancies: Public Claims vs. Internal Reality
The 'Security Statement' Discrepancies: Public Claims vs. Internal Reality

False Claims of NIST Cybersecurity Framework Compliance

The SolarWinds “Security Statement” served as the company’s primary shield against customer scrutiny. This document was not marketing collateral. It functioned as a formal attestation of the company’s defensive posture. At the center of this attestation stood a definitive claim: SolarWinds “follows” the National Institute of Standards and Technology (NIST) Cybersecurity Framework. For government clients and Fortune 500 buyers, this assertion carried specific weight. The NIST framework is the gold standard for measuring a security program’s maturity. It divides cybersecurity into five pillars: Identify, Protect, Detect, Respond, and Recover. By claiming adherence, SolarWinds assured the market that it maintained a structured, rigorous defense capable of repelling nation-state actors. The Securities and Exchange Commission exposed this claim as a fabrication. Filings from the SEC reveal a chasm between SolarWinds’ public assertions and its internal reality. While the website projected an image of military-grade compliance, internal assessments painted a picture of negligence. The SEC complaint details a specific internal evaluation from 2019. This assessment measured SolarWinds’ adherence to NIST SP 800-53, the catalog of controls that underpins the framework. The results were catastrophic. Out of 325 applicable security controls, SolarWinds had a documented process for only 21. This metric alone the company’s public narrative. A compliance rate of roughly 6% does not constitute “following” a framework. It indicates the absence of a functional security program. The deception went deeper than aggregate numbers. The SEC investigation uncovered that SolarWinds’ internal auditors rated the company’s performance in serious NIST sub-categories as “0.” In the language of compliance auditing, a zero does not mean “needs improvement.” It means the control is non-existent or unassessed. These failing grades applied to the most important areas of cyber defense: Identify, Detect, and Protect. The company had no verified method to identify assets on its network. It absence the capability to detect intrusions in real-time. It failed to protect its most sensitive data repositories. Yet the Security Statement remained unchanged on the public web, assuring investors of a ” security” method that did not exist. Tim Brown, the Chief Information Security Officer, stood at the nexus of this information asymmetry. The SEC charges allege that Brown knew the “Security Statement” was false. He received the internal reports. He saw the “0” scores. In 2018, a company engineer presented data to Brown showing that the firm’s remote access setup was “not very secure.” The engineer warned that an attacker exploiting this gap could “basically do whatever without us detecting it until it’s too late.” This warning described the exact scenario that would later unfold during the Sunburst attack. Brown himself wrote in internal presentations that the “current state of security leaves us in a very state for our serious assets.” even with these explicit warnings, Brown signed off on the misleading public disclosures. He allowed the Security Statement to tout a “secure development lifecycle” (SDL) that the company did not follow. The SDL is a serious component of NIST compliance for software manufacturers. It mandates that security checks occur at every stage of code creation. SolarWinds claimed to adhere to this practice. The reality was far different. The SEC found that for the Orion product—the very software compromised by Russian hackers—SolarWinds engineers routinely bypassed SDL requirements. They skipped threat modeling. They ignored pre-release security testing. The “secure” lifecycle was a fiction. The failure of access controls provides another clear example of the NIST fraud. The “Protect” function of the NIST framework requires organizations to limit access to authorized users, processes, and devices. SolarWinds publicly claimed to enforce strict access privileges. The Security Statement assured customers that access was limited to those with a business need. Internally, the situation was chaotic. The SEC complaint alleges that SolarWinds granted administrative rights on a “largely indiscriminate basis.” Employees across the organization held keys to the kingdom. This violation of the “Principle of Least Privilege” left the network wide open. Once an attacker compromised a single credential, they could move laterally with ease. Password hygiene at SolarWinds also failed to meet the standards claimed in the Security Statement. NIST guidelines prescribe rigorous password complexity and management policies. SolarWinds claimed to enforce these “strong password policies” across its enterprise. Internal audits told a different story. A 2018 audit identified multiple serious systems that breached the company’s own password rules. The audit found systems using shared “legacy account login credentials.” It discovered passwords stored in clear text. This negligence directly contradicted the public pledge of strong identity management. The gap between the “strong password” claim and the “shared legacy credential” reality highlights the materiality of the fraud. Investors priced the stock based on the belief that SolarWinds protected its intellectual property. The truth was that the front door was unlocked. The timeline of these is damning. The false claims from the company’s IPO in October 2018 through the disclosure of the Sunburst attack in December 2020. For over two years, SolarWinds sold its software under false pretenses. The SEC alleges that Brown and other executives engaged in a scheme to conceal these risks. They did not omit information. They actively propagated a false narrative. When internal engineers raised red flags, the executives silenced them or ignored the data. A September 2020 document shared with Brown stated that the “volume of security problem being identified” had “outstripped the capacity of Engineering teams to resolve.” This admission of widespread failure never reached the public. The Security Statement continued to project confidence and control. The of this fraud extend beyond financial loss. Government agencies rely on NIST compliance to vet their vendors. By falsifying its adherence to the framework, SolarWinds infiltrated the supply chains of the Department of Defense, the Department of Homeland Security, and the Treasury. These agencies operated under the assumption that SolarWinds met the baseline security requirements defined by federal standards. They trusted the Security Statement. That trust allowed the Sunburst malware to bypass the perimeter defenses of the most sensitive networks in the United States. The SEC’s focus on the NIST claims marks a shift in regulatory enforcement. It signals that vague assurances of “best practices” are no longer sufficient. Companies must prove that their technical reality matches their marketing rhetoric. SolarWinds treated the NIST framework as a checklist for sales enablement rather than a blueprint for survival. They viewed compliance as a bureaucratic hurdle to clear, not a functional need. This mindset created the blind spots that the Russian intelligence service exploited. Internal emails by the SEC reveal a culture that prioritized revenue over security. Employees mocked the company’s security posture in private chats while the sales team sent the fraudulent Security Statement to prospects. This duplicity is the core of the fraud charge. It was not a case of a good-faith effort falling short. It was a calculated decision to present a facade of maturity while running a ” ” and “porous” network. The between the 2019 assessment scores and the public claims is irrefutable. A company cannot “follow” NIST while failing 94% of the controls. It cannot claim “strong access controls” while handing out admin privileges like candy. It cannot boast of a “secure development lifecycle” while skipping security tests for its flagship product. These were not minor discrepancies. They were fundamental lies about the nature of the product and the company’s ability to protect it. The court’s decision to uphold the fraud charges related to the Security Statement validates the SEC’s theory. The judge recognized that these specific claims—NIST compliance, access controls, password policies—were material to investors. A reasonable investor would consider it significant that a cybersecurity company failed its own internal security audits. By concealing this information, SolarWinds distorted the market’s understanding of the risk. They sold a lemon at the price of a tank. The legacy of the SolarWinds NIST fraud is a permanent scar on the industry’s credibility. It demonstrated that self-attestation is worthless without verification. The “Security Statement” is a document of suspicion. Auditors and customers must demand the raw data, the internal scores, and the unvarnished truth. SolarWinds proved that a company can wear the uniform of a secure enterprise while leaving its weapon systems unmanned and its gates wide open. The SEC’s of Tim Brown and SolarWinds serves as a warning: the gap between your marketing and your metrics is where the fraud lies.

The 'Solarwinds123' Password Leak and Policy Enforcement Failures

The ‘Solarwinds123’ Credential: A Monument to Negligence

In the annals of cybersecurity failures, few incidents rival the sheer absurdity of the “solarwinds123” credential. This alphanumeric string, discovered in plain text on a public repository, stands as the definitive symbol of the internal negligence that plagued SolarWinds Corporation prior to the Sunburst attack. While the company projected an image of military-grade security to investors and clients, the reality within its engineering trenches involved credentials so weak they violated the most elementary principles of digital hygiene. The existence of this password was not a technical oversight; the Securities and Exchange Commission (SEC) identified it as a central component of their fraud charges against the company and its Chief Information Security Officer, Timothy G. Brown. The agency argued that the persistence of such a credential demonstrated a “complete failure” to enforce the administrative controls SolarWinds claimed to possess.

The discovery of the credential belongs to security researcher Vinoth Kumar. In November 2019, Kumar identified a misconfigured GitHub repository belonging to SolarWinds. Inside, he found the hardcoded password “solarwinds123” associated with a serious update server, `downloads. solarwinds. com`. This server acted as a distribution point for the company’s software, a pathway theoretically capable of allowing an attacker to upload malicious files to customers. Forensic analysis later determined that this credential had been exposed and accessible to the public since at least June 2018. For nearly eighteen months, the keys to a important component of the SolarWinds supply chain remained available to anyone with an internet connection and the curiosity to look.

The SEC Complaint: Fraud Through Misrepresentation

The SEC’s complaint, filed in the Southern District of New York (Case 1: 23-cv-09518), leveraged the “solarwinds123” incident to the company’s “Security Statement.” This document, published on the SolarWinds website and referenced in filings, asserted that the company enforced a rigorous password policy requiring complexity, rotation, and obfuscation. The Commission alleged that these claims were materially false. The complaint detailed that SolarWinds and Brown knew of specific deficiencies in access controls yet continued to certify the company’s strong security posture to the public. The “solarwinds123” password served as irrefutable proof that the written policies were, in practice, ignored.

Federal regulators emphasized that the fraud lay not in the existence of a bad password, in the deception regarding the company’s ability to detect and prevent it. The Security Statement claimed compliance with the NIST Cybersecurity Framework, which mandates strict access control measures. yet, the SEC’s investigation revealed that internal audits and employee communications frequently mocked the company’s actual security status. Engineers were aware that the Secure Development Lifecycle (SDL) was applied inconsistently, yet the CISO signed off on attestations that portrayed a unified, secure environment. Judge Paul A. Engelmayer, in his July 2024 ruling on the motion to dismiss, specifically upheld the fraud claims related to these access control misrepresentations, noting that the gap between the public “Security Statement” and the internal reality of “solarwinds123” was sufficient to allege securities fraud.

The ‘Intern’ Defense and Executive Deflection

When the password leak garnered global attention following the Sunburst disclosure, SolarWinds executives attempted to minimize the catastrophe by shifting blame to a junior employee. During a joint hearing before the House Committees on Oversight and Reform and Homeland Security in February 2021, former CEO Kevin Thompson testified that the password was “a mistake that an intern made.” Thompson claimed the intern violated password policies by posting the credential on a private GitHub account. Current CEO Sudhakar Ramakrishna echoed this sentiment, stating the problem was “reported to our security team and it was immediately removed” once discovered in 2019.

This defense crumbled under scrutiny. Security experts and the SEC rejected the “intern theory” as a deflection of executive responsibility. A strong security architecture does not rely on the perfect behavior of interns; it relies on technical controls that prevent weak passwords from being set in the place. If an intern could set “solarwinds123” as a password for a serious production server, the failure lay with the system administrators who configured the server to accept it, and the security leadership who failed to implement automated scanning or complexity requirements. The fact that the password for over a year indicates a widespread absence of credential auditing, a responsibility that falls squarely on the CISO and the IT leadership, not a transient intern.

widespread Failure of Internal Controls

The “solarwinds123” incident also exposed the hollowness of SolarWinds’ internal enforcement method. The SEC complaint highlighted that while the company had written policies on paper, they absence the technical “teeth” to ensure compliance. Internal emails in the litigation showed that employees routinely bypassed security to prioritize speed and product development. The culture, as described by the SEC, was one where security was viewed as an impediment to operations rather than a mandatory gatekeeper.

Tim Brown, as the Vice President of Security and Architecture (and later CISO), was the executive responsible for this domain. The SEC alleged that Brown was aware of the gap between the company’s stated policies and its operational reality. By allowing the “Security Statement” to remain public while knowing that the company’s systems permitted credentials like “solarwinds123,” Brown and SolarWinds engaged in a course of conduct that misled investors about the true risk profile of the company. The password was not an anomaly; it was a symptom of a corporate environment that prioritized sales and engineering velocity over the basic blocking and tackling of cybersecurity.

Although the SEC eventually moved to dismiss the remaining claims in November 2025, the legal battles cemented the “solarwinds123” leak as a case study in corporate negligence. The incident demonstrated that high-level attestations of security are meaningless without the technical rigor to back them up. For SolarWinds, the cost of this lesson was not just the reputational damage of a leaked password, the exposure of a fraudulent between their marketing materials and their engineering practices.

Concealment of VPN and Access Control Vulnerabilities

The ‘Unmanaged’ Device Loophole: A Gateway for Intrusion

The Securities and Exchange Commission’s complaint against SolarWinds and CISO Timothy Brown centered on a specific, vulnerability in the company’s remote access architecture: the permission of “unmanaged” devices on the corporate Virtual Private Network (VPN). While the company’s public-facing Security Statement assured clients and investors of rigorous access controls, internal painted a dangerously different picture. “Unmanaged” devices, personal laptops, phones, and tablets not owned, monitored, or secured by SolarWinds IT, were granted access to the network. This policy bypassed the perimeter defenses the company claimed to uphold, creating a blind spot that threat actors exploited with precision.

The SEC alleged that this vulnerability was not an oversight a known risk that for years. As early as June 2018, internal assessments identified that the VPN configuration allowed unmonitored hardware to connect to the corporate environment. This configuration meant that if a threat actor compromised a personal device belonging to an employee, they could pivot directly into the SolarWinds network without encountering the endpoint detection and response (EDR) agents installed on corporate-owned machines. The absence of visibility into these devices rendered the company’s security team blind to chance intrusions originating from this vector.

Internal Warnings: “Not Very Secure”

The between internal knowledge and external representation was documented in explicit warnings delivered to Brown and other executives. The SEC complaint a 2018 presentation prepared by a SolarWinds engineer, which was shared with Brown. The engineer’s assessment of the remote access setup was blunt: the configuration was “not very secure.” The presentation warned that an attacker exploiting this vulnerability could “basically do whatever without us detecting it until it’s too late.” This prescient warning outlined a scenario of “major reputation and financial loss,” nearly two years before the Sunburst attack became public knowledge.

Brown’s own internal communications corroborated this awareness. In presentations from 2018 and 2019, the CISO admitted that the “current state of security leaves us in a very state for our serious assets.” Another internal document noted that “access and privilege to serious systems/data is inappropriate.” even with these admissions within the firewall, the company continued to project an image of cyber resilience to the market. The SEC charged that by failing to disclose these specific, known deficiencies while publishing generic risk factors, SolarWinds engaged in a fraudulent concealment of material information. The risks were not hypothetical; they were operational realities that the security leadership had already identified and documented.

The January 2019 Intrusion

The theoretical risk of unmanaged access materialized in January 2019. According to the SEC, threat actors successfully accessed the SolarWinds VPN using an unmanaged third-party device. This intrusion allowed the attackers to conduct reconnaissance, harvest credentials, and map the network architecture without triggering the alarms that might have sounded had the device been subject to corporate security policies. This initial foothold was a precursor to the broader Sunburst campaign. The attackers exploited the very gap that engineers had flagged, a gap that remained unclosed even with the warnings.

This incident underscored the severity of the “unmanaged” policy. By allowing non-corporate devices to tunnel into the network, SolarWinds extended its trusted zone to the untrusted personal environments of its staff. The attackers did not need to break down the front door; they simply walked through a side entrance that had been left unlocked for convenience. The SEC’s litigation highlighted that this specific access vector was incompatible with the “strong access controls” touted in the company’s marketing materials and legal filings.

MFA Failures and Password Hygiene

the VPN vulnerability was a widespread failure to enforce Multi-Factor Authentication (MFA) and strong password policies. The SEC alleged that SolarWinds failed to enforce MFA across all systems, leaving serious access points protected only by static credentials. In instances where MFA was technically available, it was not universally mandated or was implemented in a way that allowed for bypass. This lapse was serious. Without a second of authentication, a stolen password, harvested from an unmanaged device, became a master key.

Internal communications revealed a culture of poor password hygiene that went uncorrected. The complaint detailed how employees, including those with administrative privileges, used weak or reused passwords. The combination of unmanaged device access and weak authentication created a fragile security posture. Brown was allegedly aware of these deficiencies yet signed sub-certifications confirming the adequacy of the company’s internal controls. The SEC argued that these certifications were materially false, as the known inability to enforce MFA and secure remote access constituted a significant internal control failure.

Legal Ramifications and the Fraud Charge

The SEC’s of SolarWinds and Brown marked a shift in regulatory enforcement, targeting a CISO individually for the time in such a context. The core of the fraud charge was not that SolarWinds was hacked, that it deceived investors about its vulnerability to such a hack. The agency argued that investors have a right to know if a company’s “crown jewel” assets are protected by a security program that its own engineers describe as “not very secure.”

While a federal judge dismissed several of the SEC’s claims in July 2024, specifically those relating to internal accounting controls and disclosure controls, the court sustained the fraud charges related to the misrepresentations in the “Security Statement.” The judge found that the SEC had plausibly alleged that SolarWinds and Brown acted with intent or severe recklessness in maintaining a public facade of security that contradicted the internal reality of unmanaged VPN access and poor access controls. Although the SEC eventually moved to dismiss the remaining claims in November 2025, the litigation permanently altered the expectations for corporate officers regarding the transparency of cybersecurity risks.

Violations of the Secure Development Lifecycle (SDL) in Orion Platform

The Fabrication of Security: The Secure Development Lifecycle Lie

The SolarWinds “Security Statement” served as the primary document for assuring customers of the company’s digital integrity. This public declaration explicitly claimed that the company followed a rigorous Secure Development Lifecycle (SDL) to ensure the safety of its software products. The SEC investigation revealed this assertion to be a complete fabrication. SolarWinds did not maintain a functional SDL for its flagship Orion Platform. The absence of this standard engineering discipline created the precise conditions required for the Sunburst attack to succeed. A Secure Development Lifecycle is not a bureaucratic checklist. It is a fundamental engineering methodology designed to integrate security at every phase of software creation. A proper SDL mandates code reviews, automated security testing, threat modeling, and strict access controls over the build environment. SolarWinds presented itself as a mature software vendor adhering to these industry norms. The reality inside the engineering department was chaotic and insecure. The company developed its most sensitive product, the Orion Platform, in an environment where security was an afterthought rather than a foundational constraint. The SEC complaint detailed how the company’s internal practices bore no resemblance to its public claims. While the marketing materials touted adherence to the NIST Cybersecurity Framework, internal assessments painted a grim picture. In multiple sub-categories of the NIST framework, SolarWinds scored itself a “0.” This score indicates a total absence of the control or process in question. The company did not just fail to meet a high bar; it failed to even attempt the jump. The claim of following an SDL was not an exaggeration. It was a falsehood designed to placate customers and investors while the engineering teams churned out code with minimal security oversight.

The Orion Build Server: A Playground for Attackers

The most damning evidence of the SDL failure lies in the compromise of the Orion build server. In a secure environment, the build system is the most guarded asset. It is where human-readable source code is converted into the executable files distributed to customers. A functional SDL requires that this process be hermetically sealed. Access should be restricted to a tiny group of authorized personnel. Changes to the build pipeline must undergo rigorous approval. Code integrity checks should verify that the output matches the approved source. SolarWinds failed on every count. The investigation showed that the build server was accessible to unauthorized accounts. The attackers, known as APT29 or Nobelium, gained access to the SolarWinds network as early as September 2019. Because the company absence the monitoring and access controls promised in its SDL, the intruders moved laterally through the network. They eventually reached the build server, where they implanted the Sunburst malicious code. This injection was possible only because the build process absence integrity verification. In a secure lifecycle, the system would cryptographically sign the code at various stages and verify those signatures before the final packaging. If an unauthorized modification occurred, the build would fail. SolarWinds had no such method. The attackers inserted their malware, and the build system dutifully compiled it into the legitimate Orion software updates. The company then digitally signed these compromised updates and distributed them to thousands of customers, including the US government. The SDL, which was supposed to prevent exactly this scenario, existed only on the company’s website, not in its engineering infrastructure.

Internal Warnings Ignored by Leadership

The absence of an SDL was not a secret to the company’s technical staff. Internal communications obtained by the SEC show a workforce deeply aware of the security vacuum. Engineers and security personnel frequently raised alarms about the vulnerability of the development environment. In January 2018, an internal email explicitly admitted that the Security Statement’s claim of an SDL was “belied by numerous internal statements.” This admission demonstrates that the deception was conscious and acknowledged years before the Sunburst attack occurred. Tim Brown, the CISO, was a recipient of such warnings. In a 2018 presentation, a company engineer stated that the remote access setup was “not very secure” and that an attacker could “basically do whatever without us detecting it until it’s too late.” This prophetic warning described the exact methodology later used in the Sunburst attack. Brown himself noted in a 2019 presentation that the “current state of security leaves us in a very state for our serious assets.” Even with these clear warnings, the company did not implement the necessary changes to establish a real SDL. Instead, the leadership continued to publish the false Security Statement. The disconnect between the internal panic and the external confidence was absolute. One subordinate of Brown summed up the culture in a message, stating, “We’re so far from being a security minded company.” This sentiment reflects the operational reality that the SDL claims concealed. The focus was on feature velocity and sales, with security processes viewed as impediments to be bypassed rather than essential safeguards.

The NIST Compliance Charade

The company’s reliance on the NIST Cybersecurity Framework as a proof point of its maturity was equally fraudulent. The NIST framework provides a structure for organizations to manage and reduce cybersecurity risk. It consists of five concurrent functions: Identify, Protect, Detect, Respond, and Recover. SolarWinds claimed to align its operations with this gold standard. The SEC investigation exposed this as a fiction. Internal assessments conducted by the company showed massive gaps in compliance. For the “Identify” and “Protect” functions, the very areas that would cover the Secure Development Lifecycle, SolarWinds rated itself poorly. The “0” scores in specific sub-areas meant the company had no evidence of meeting those control objectives. By invoking NIST, SolarWinds borrowed the credibility of the US government’s standards body to mask its negligence. Customers reading the Security Statement would assume that “following the NIST framework” implied a baseline level of competence and rigor. They would expect that the software they installed on their networks had been developed with standard protections against tampering. The that the company scored itself a zero in key areas while publicly claiming compliance constitutes a serious breach of trust. It suggests that the company viewed security frameworks as marketing terminology rather than operational mandates.

Direct Facilitation of the Sunburst Attack

The failure to implement an SDL was the direct cause of the Sunburst catastrophe. Had SolarWinds enforced the practices it claimed to follow, the attack would have been significantly harder, if not impossible, to execute. A proper SDL would have enforced “least privilege” access to the build environment, preventing the attackers from easily reaching the compilation servers. It would have required multi-factor authentication for all access to the engineering network, a control that was notably absent or easily bypassed. Most importantly, a functioning SDL would have included automated code analysis and integrity monitoring. The Sunburst malware was not a subtle, single-line change. It was a substantial injection of code designed to create a backdoor. Automated static analysis tools, a standard part of any secure lifecycle, could have flagged this anomalous code block. Integrity checks would have noticed that the source code in the repository did not match the code being compiled. The attackers relied on SolarWinds’ negligence. They did not need to break strong encryption or bypass sophisticated intrusion detection systems within the build environment. They simply walked through the open doors left by a company that refused to invest in the security processes it promised its customers. The “supply chain” attack was because the supplier, SolarWinds, had broken the chain of custody for its own software.

The CISO’s Knowledge and Inaction

Tim Brown’s position as CISO placed him at the center of this deception. The SEC charges highlighted that Brown was not a passive observer an active participant in the dissemination of the false Security Statement. He knew the SDL was a myth. He knew the internal assessments showed failing grades. He knew his engineers were terrified of the vulnerabilities in the build process. Yet, Brown continued to sign off on the Security Statement and authorize its distribution to customers. He allowed the sales team to use this fraudulent document to close deals. When customers asked specific questions about security practices, the company pointed them to the Security Statement, silencing inquiries with a lie. This behavior goes beyond negligence; it demonstrates a willful disregard for the truth and for the safety of the global IT infrastructure. The SEC’s focus on the CISO marks a shift in accountability. It signals that security executives cannot hide behind corporate bureaucracy when they knowingly mislead the public. Brown’s failure to align the company’s actual practices with its public claims created a false sense of security that blinded thousands of organizations to the risk they were importing into their networks.

Conclusion of Section 5

The violation of the Secure Development Lifecycle was not a technical oversight. It was a strategic deception. SolarWinds chose to prioritize speed and cost over the security of its products, all while telling the world the opposite. This duplicity turned the Orion Platform into a Trojan horse, carried into the most sensitive networks on Earth by the misplaced trust of its users. The Sunburst attack was the inevitable result of a culture that treated security as a marketing bullet point rather than an engineering discipline.

2018 Internal Assessment: 'Not Very Secure' Remote Access Warnings

The 2018 Internal Assessment: A Verdict of ‘Not Very Secure’

In the months leading up to SolarWinds’ initial public offering (IPO) in October 2018, the company’s internal cybersecurity reality stood in clear contrast to the strong image it projected to investors. While external marketing materials and security statements touted a -like posture, internal engineers were sounding alarms about fundamental weaknesses in the company’s remote access infrastructure. The most damning of these warnings came in the form of a 2018 internal assessment, which delivered a blunt verdict on the company’s Virtual Private Network (VPN) configuration: it was “not very secure.”

The Engineer’s Warning

According to the SEC complaint filed against SolarWinds and its Chief Information Security Officer (CISO), Timothy Brown, a company engineer prepared a presentation in 2018 that explicitly identified serious flaws in how employees accessed the corporate network remotely. The presentation, which was shared with Brown and other senior executives, did not mince words. It warned that the remote access setup was “not very secure” and that a threat actor exploiting this vulnerability could “basically do whatever without us detecting it until it’s too late.” This warning was not a vague theoretical concern; it was a specific indictment of the company’s failure to enforce basic access controls. The assessment highlighted that the VPN allowed connections from “unmanaged devices”, personal laptops, cell phones, and other hardware not owned or secured by SolarWinds. This practice violated standard cybersecurity hygiene, as unmanaged devices absence the security patches, antivirus software, and monitoring agents required to prevent malware from hitching a ride into the corporate network.

CISO Awareness and Inaction

The SEC’s investigation revealed that Timothy Brown was fully aware of these deficiencies. The “not very secure” presentation was not the only red flag he received. In March 2018, months before the IPO, Brown admitted in an internal presentation that the “concept of least privilege [is] not followed as a best practice” and that “shared accounts” were used “throughout internal and external applications.” also, in September 2018, just one month before SolarWinds went public, Brown sent a presentation to the company’s Chief Technology Officer describing “Identity Management-Role and Privilege Management” as “limited or non-existent.” even with these private admissions, Brown and SolarWinds continued to authorize public statements claiming the company adhered to high security standards, including the National Institute of Standards and Technology (NIST) Cybersecurity Framework. The between Brown’s internal knowledge and the company’s external disclosures forms the core of the SEC’s fraud charges.

The Unmanaged Device Vulnerability

The specific technical failure identified in the 2018 assessment, the ability for unmanaged devices to access the VPN, created a gaping hole in SolarWinds’ perimeter. By allowing employees to log in from personal devices, SolarWinds bypassed its own security controls. If an employee’s personal laptop was compromised, a hacker could use that device to authenticate to the VPN and move laterally across the SolarWinds network, appearing as a legitimate user. This vulnerability was not hypothetical. The SEC complaint alleges that in January 2019, threat actors successfully exploited this exact weakness. Attackers accessed SolarWinds’ systems “through the VPN using an unmanaged device,” confirming the engineer’s 2018 warning that such a breach would be undetectable until significant damage was done. This access point allowed the perpetrators to insert malicious code into the Orion software, initiating the catastrophic Sunburst supply chain attack.

widespread Negligence

The 2018 assessment also shed light on broader widespread failures beyond the VPN. The engineer’s report and subsequent internal communications painted a picture of a security organization struggling with basic maturity. A December 2018 presentation, created shortly after the IPO, listed “Define standards and best practices for Role Based Access Controls and Least Privilege” as an outstanding gap. This indicates that even after the company solicited public investment based on its stability and reliability, it had not yet defined fundamental rules for who could access what data. The persistence of these problem demonstrates a pattern of negligence. The warnings were not incidents part of a continuous stream of internal alarms that were systematically ignored or concealed. Brown’s failure to remediate the “not very secure” remote access configuration, while simultaneously certifying the company’s security posture in public filings, suggests a deliberate effort to prioritize business velocity and stock performance over the integrity of the company’s products.

SEC Fraud

The “not very secure” assessment is a smoking gun in the SEC’s case. It provides documentary evidence that the risks leading to the Sunburst attack were known, documented, and presented to the CISO years before the breach became public. The fraud charges hinge on the assertion that SolarWinds deprived investors of material information by concealing these assessments. Had investors known that the company’s own engineers considered the remote access setup “not very secure,” the valuation and perceived risk profile of SolarWinds would likely have been radically different. By suppressing this 2018 assessment, SolarWinds maintained a facade of competence that protected its stock price left its customers, including federal agencies and Fortune 500 companies, exposed to a vulnerability that had already been identified, reported, and ignored.

Timeline of Internal Warnings vs. Public Disclosures (2018)
DateInternal Event/WarningPublic Statement/Action
March 2018CISO Brown admits “Concept of least privilege not followed” and shared accounts are used widely.SolarWinds prepares for IPO, drafting security statements.
June 2018Engineer identifies VPN gap allowing unmanaged devices to connect.No disclosure of specific cybersecurity risks.
Mid-2018Internal presentation warns remote access is “not very secure” and detection is unlikely.Security Statement claims strong access controls and NIST compliance.
Sept 2018Brown presentation describes Identity Management as “limited or non-existent.”SolarWinds files Form S-1 for IPO, listing only generic risks.
Oct 2018SolarWinds IPO.Public trading begins based on prospectus omitting known flaws.
Dec 2018Internal report lists “Define standards for Role Based Access Controls” as a gap.Post-IPO filings continue to use boilerplate risk language.

2019 CISO Presentations on 'Vulnerable State' of Critical Assets

SECTION 7 of 14: 2019 CISO Presentations on ‘ State’ of serious Assets

The ” State” Warning: A Persistent Reality

By 2019, the internal cybersecurity posture at SolarWinds had to a level that compelled Chief Information Security Officer Timothy Brown to problem clear warnings to the company’s executive leadership. While the company publicly projected an image of a secured by “military-grade” defenses and adherence to the NIST Cybersecurity Framework, internal presentations painted a picture of a fragile infrastructure with widespread weaknesses. The most damning of these assessments appeared in a series of presentations delivered throughout 2018 and 2019, where Brown explicitly characterized the company’s security posture as leaving “serious assets” in a “very state.” This phrase was not a casual observation a formal declaration of risk, documented in slides and reports that were circulated to the highest levels of the organization, including the Chief Information Officer and the Chief Executive Officer.

The ” state” assessment was not an incident a recurring theme in the CISO’s internal communications. In October 2018, coinciding with the company’s Initial Public Offering, Brown’s internal presentation warned that the “current state of security leaves us in a very state for our serious assets.” Rather than triggering an immediate, all-hands-on-deck remediation effort, this warning appears to have been absorbed into the company’s operational. By 2019, the situation had not improved; it had arguably worsened as the company’s infrastructure expanded without a commensurate increase in security controls. The SEC’s subsequent fraud charges against Brown and SolarWinds highlighted these presentations as primary evidence that the defendants possessed “scienter”, intent or knowledge of wrongdoing, when they continued to solicit investor capital while concealing the rot at the core of their network.

August 2019: The Quarterly Review and the “NIST Score of 1”

The between internal reality and public claims reached a nadir during the “Security & Compliance Program Quarterly Review” in August 2019. Prepared by Brown and reviewed by the Global CIO, this document was also received by the CEO, placing the knowledge of these vulnerabilities squarely in the boardroom. The presentation contained a devastating metric: a self-assessed NIST score of 1 (on a of 0 to 5) for the control objective regarding “Authentication, Authorization, and Identity Management.” In the context of the Capability Maturity Model (CMM) frequently used in such assessments, a score of 1 indicates an “Initial” or “Ad Hoc” state, chaotic, unstable, and reactive. It signifies that processes are disorganized and that success depends on individual heroics rather than established processes.

This internal score of 1 stood in direct violation of the company’s external “Security Statement,” which assured customers and investors that SolarWinds followed the NIST Cybersecurity Framework. For a company selling software to the U. S. military and Fortune 500 corporations, admitting to an “ad hoc” identity management system is tantamount to admitting negligence. The presentation explicitly noted that “[a]ccess and privilege to serious systems/data is inappropriate,” a bureaucratic euphemism for a catastrophic absence of access control. This meant that the CISO and his team knew that too users had administrative access, that permissions were not revoked upon termination, and that the principle of least privilege was a myth within the SolarWinds environment.

Defining “Inappropriate” Access to Crown Jewels

When Brown’s presentation stated that access to serious systems was “inappropriate,” it referred to specific, dangerous practices that made the Sunburst attack possible. The “serious assets” mentioned were not office printers or email servers; they included the build environment for the Orion platform, the “crown jewels” of the company. Internal engineering reports from this period corroborated Brown’s high-level warnings, noting that the remote access setup was “not very secure” and that an attacker exploiting it could “basically do whatever without us detecting it until it’s too late.”

The “inappropriate” access involved the widespread use of shared administrative passwords and the failure to enforce multi-factor authentication (MFA) on serious entry points. The SEC complaint detailed that passwords were frequently stored in unencrypted text files or shared via insecure channels. By allowing “inappropriate” access to, SolarWinds created a flat network topology where a compromise of a single low-level account could, and eventually did, allow lateral movement to the most sensitive servers in the company. The CISO’s use of the word “inappropriate” in a formal presentation to the CEO suggests a level of resignation; the risk was identified, documented, and then accepted by leadership as the cost of doing business, prioritizing development speed over security hygiene.

The September 2019 FedRAMP Assessment

One month after the damning Quarterly Review, a September 2019 internal assessment related to FedRAMP (Federal Risk and Authorization Management Program) compliance further underscored the severity of the situation. While SolarWinds was aggressively marketing its products to the federal government, this internal assessment identified significant gaps that would disqualify a vendor from handling sensitive government data. The assessment highlighted the same recurring themes: weak access controls, insufficient monitoring, and a absence of “cyber hygiene.”

This document serves as another serious evidence point that the ” state” was not a matter of opinion a quantifiable fact known to the security team. The FedRAMP assessment process is rigorous, and failing to meet its controls internally while publicly implying compliance constitutes a material omission. The SEC alleged that Brown and SolarWinds “defrauded investors by overstating SolarWinds’ cybersecurity practices” precisely because these internal assessments existed. They provided a documented trail of knowledge that contradicted the optimistic boilerplate language found in the company’s Form 10-K and 8-K filings. The executives could not claim ignorance of the technical details when they were the recipients of reports explicitly failing the company on basic security metrics.

Executive Awareness and the Failure to Act

The circulation of these presentations destroys the defense that the cybersecurity failures were the result of rogue engineers or oversight. The August 2019 presentation was not buried in a sub-folder on a forgotten server; it was presented to the C-suite. The CEO, CIO, and CISO were all aware that the company’s identity management maturity was rated at a 1. They were aware that access to serious data was “inappropriate.” They were aware that the remote access VPN was insecure. Yet, throughout 2019 and 2020, the company continued to cut costs and prioritize sales growth over the remediation of these known risks.

The decision to leave these vulnerabilities unaddressed while the company’s stock price soared represents a calculated gamble. The SEC’s charges against Brown were unique in their focus on an individual executive, they illuminate a broader corporate culture where the CISO’s role was reduced to documenting failure rather than preventing it. Brown’s presentations were accurate diagnoses of a terminal illness, yet the patient, SolarWinds, refused the treatment. Instead of authorizing the massive architectural overhaul required to fix the “inappropriate” access, leadership allowed the vulnerabilities to fester. This inaction was not passive; it was an active choice to maintain a ” state” in service of operational efficiency and financial performance.

The Disconnect: Internal Truth vs. External Fiction

Internal Assessment (2019)Public Statement (Security Statement/Filings)
“Current state of security leaves us in a very state for our serious assets.”“SolarWinds is committed to high standards of security… [using] industry-standard security technologies.”
NIST Score: 1 (Ad Hoc/Initial) for Identity Management.Claims of following the NIST Cybersecurity Framework (CSF).
“Access and privilege to serious systems/data is inappropriate.”“We follow best practices for access control and least privilege.”
Remote access is “not very secure.”“We use secure VPN technologies to protect our network.”

The table above illustrates the chasm between the truth Brown spoke internally and the fiction the company sold externally. This duality is the heart of the fraud allegations. Investors rely on accurate disclosures to price risk. By concealing the ” state” of the serious assets, specifically the build servers that would later become the vector for the Sunburst attack, SolarWinds denied the market the ability to assess the true value of the company. The 2019 presentations prove that the catastrophe of 2020 was not an “unforeseeable” black swan event the logical, predicted outcome of the conditions described by the CISO himself.

The ” state” was not a technical observation; it was a prophecy. When Russian intelligence operatives (APT29) eventually exploited these exact weaknesses, using the insecure remote access and the inappropriate administrative privileges to inject malicious code, they walked through doors that Timothy Brown had already told his bosses were unlocked. The tragedy of the SolarWinds breach is not that the attackers were unstoppable, that the defenders had already surrendered the ground years before the packet was intercepted.

June 2020 Email Evidence: 'Backends Are Not That Resilient'

The June 2020 internal communications represent the most damaging evidence against SolarWinds and CISO Tim Brown. These documents destroy the defense that the company was a victim of a sophisticated attack it could not have foreseen. The records show that senior leadership identified the exact method of their vulnerability months before the public disclosure of the Sunburst attack. They knew their infrastructure was weak. They knew customers were seeing suspicious activity. Yet they chose silence over transparency.

The US Trustee Program Incident

The sequence of events began with a specific notification from a high-profile customer. In June 2020 the US Trustee Program (USTP) contacted SolarWinds with a disturbing report. The agency had observed the Orion software engaging in unexpected behavior. The software was “reaching out to contact websites with an unknown purpose” immediately after installation. This was not normal network management traffic. It was the signature of a backdoor beaconing to a command-and-control server. Tim Brown was directly involved in assessing this report. He did not dismiss it as a false positive. He recognized the of the anomaly. In his internal correspondence regarding the USTP incident he described the attack vector as “unique” and the as “very concerning.” This was not a theoretical risk. A federal agency had provided evidence that the Orion platform was behaving maliciously within a secure government network.

The ‘Backends’ Admission

Brown’s reaction to the USTP notification produced the “smoking gun” email heavily by the SEC. In a message to members of the engineering team he explicitly linked the customer’s compromise to the fragility of SolarWinds’ own internal systems. Brown wrote that he was worried the attacker might use Orion in larger attacks because “our backends are not that resilient.” This sentence is the pivot point of the fraud case. The CISO of a major security vendor admitted in writing that the company’s backend infrastructure, the systems responsible for building, signing, and distributing software updates, absence resilience. This admission implies knowledge that the internal environment was porous enough to allow an attacker to pivot from a compromise into the software supply chain itself. The term “resilient” refers to the ability of the infrastructure to withstand or recover from an intrusion. By stating the backends were *not* resilient Brown acknowledged that once an attacker gained a foothold there were insufficient controls to stop them from moving laterally or injecting malicious code. This assessment was accurate. The Russian threat actor Nobelium had indeed compromised the build environment and was using the absence of resilience to distribute the Sunburst malware.

The ‘Spooked’ Engineer and Continued Warnings

The alarm bells did not stop with the June email. The internal anxiety grew as more anomalies surfaced. In July 2020 a member of the engineering team sent an email to Brown describing another incident at a customer site. The engineer admitted to being “spooked” by the activity they were witnessing. This was not the language of a confident security team managing routine alerts. It was the language of professionals realizing they were facing a threat they could not contain. Brown replied to this “spooked” engineer by reiterating his earlier concerns. He agreed the incident was “very concerning” and repeated his assessment of the company’s infrastructure. He wrote: “As you guys know our backends are not that resilient and we should definitely make them better.” The phrase “as you guys know” suggests that the weakness of the backend systems was common knowledge among the engineering and security leadership. It was not a new discovery. It was an accepted fact of their operational reality. The team operated with the understanding that their foundation was cracked.

The Volume of Unresolved problem

The June and July emails were part of a broader pattern of overwhelmed defenses. By September 2020 the situation had further. An internal document shared with Brown stated that “the volume of security problem being identified over the last month have outstripped the capacity of Engineering teams to resolve.” This document paints a picture of a security apparatus in collapse. The company was drowning in vulnerabilities. They identified more problems than they could fix. This reality stands in sharp contrast to the narrative of a “strong” security posture presented to investors. A company that cannot keep up with its own security tickets is not a company that follows a “Secure Development Lifecycle” or adheres to the NIST Cybersecurity Framework. It is a company operating on luck.

The Disconnect with Public Statements

While Brown was emailing colleagues about non-resilient backends and spooked engineers the company’s external messaging remained aggressively optimistic. The “Security Statement” on the SolarWinds website continued to assure customers and investors that the company followed industry-best practices.

Internal Reality (June-Sept 2020)Public Claim (Security Statement)
“Our backends are not that resilient.”“SolarWinds is committed to high security standards.”
“Volume of security problem… outstripped capacity.”Claims of adherence to NIST Cybersecurity Framework.
Engineer “spooked” by customer breach.No disclosure of specific risks or incidents.
USTP reports Orion beaconing to unknown sites.Orion described as a secure network monitoring tool.

The fraud charges hinge on this gap. The SEC argued that Brown and SolarWinds had a duty to correct the public record once they knew the “Security Statement” was materially false. When Brown wrote that the backends were not resilient he possessed information that contradicted the company’s primary marketing document for security. By failing to update the disclosure he allowed investors and customers to continue buying stock and software based on a lie.

The Missed Opportunity to Stop Sunburst

The June 2020 email is tragic because it reveals a missed opportunity to stop the most significant supply chain attack in history. The Sunburst malicious code was distributed in Orion updates released between March and June 2020. The USTP notification in June occurred while the malicious campaign was still active before it had been publicly discovered by FireEye in December. If Brown had acted on his realization that the backends were not resilient the company could have initiated a forensic audit of the build environment in June. They had the evidence from USTP. They had the internal admission of weakness. A rigorous investigation at that moment would likely have uncovered the Sunburst code six months early. It would have prevented thousands of downstream compromises. Instead the company treated the USTP incident as an anomaly to be managed rather than a widespread failure to be investigated. The “risk acceptance” culture described in other internal documents prevailed. The warning signs were filed away. The backends remained non-resilient. The malware continued to flow to 18, 000 customers.

Legal of ‘Scienter’

In securities fraud litigation “scienter” refers to the intent to deceive or a reckless disregard for the truth. The June 2020 email is the primary evidence of scienter in the SEC’s case against Tim Brown. It proves he was not negligent. He was aware. A negligent CISO might miss a vulnerability. A CISO acting with scienter identifies the vulnerability, admits it destroys the product’s integrity, and then allows the company to tell the world the product is safe. Brown’s explicit acknowledgment of the backend fragility removes the possibility that he genuinely believed the “Security Statement” was accurate. He knew the delta between the marketing and the metal. The defense argued that these emails were standard “grumbling” among engineers or attempts to secure more budget. Yet the context refutes this. These were not budget requests. These were operational responses to active threat indicators from a federal agency. The discussion was not about chance future risks. It was about an active, ongoing failure of the system to protect itself.

The Definition of Resilience

Brown’s use of the word “resilience” warrants specific technical examination. in cybersecurity resilience is not just prevention. It is the capacity to limit the blast radius of a breach. A resilient backend might suffer a phishing attack on an employee would have segmentation to prevent that employee’s credentials from accessing the build server. By admitting the backends were not resilient Brown was admitting that SolarWinds absence defense-. He was acknowledging that the “soft center” of the corporate network was exposed. This explains why the Russian hackers were able to move so freely once they gained initial access. There were no internal bulkheads to stop them. The absence of resilience meant that a single point of failure—a compromised VPN account or a stolen cookie—could lead to total system compromise. The June 2020 emails strip away the veneer of sophistication frequently applied to the Sunburst attack. While the malware itself was the environment it flourished in was known to be defective by the very people paid to protect it. They did not need a sophisticated counter-intelligence operation to find the holes. They just needed to read their own email.

September 2020 Risk Acceptance Form: Security Issues Outpacing Engineering

The September 2020 Risk Acceptance Form stands as a definitive artifact of corporate negligence in the SolarWinds timeline. While the company publicly projected an image of a hardened software manufacturer adhering to the National Institute of Standards and Technology (NIST) frameworks, internal documentation from this period reveals a catastrophic collapse in their ability to remediate vulnerabilities. This specific document, flagged for and shared with CISO Tim Brown, did not list a specific bug or a temporary delay. Instead, it formalized a widespread failure: the volume of security defects had physically overwhelmed the engineering department’s ability to fix them. In the months leading up to the public disclosure of the Sunburst attack, SolarWinds’ internal security posture had to the point where risk acceptance became a method for ignoring problems. The September 2020 Risk Acceptance Form explicitly stated that “the volume of security problem being identified over the last month have [sic] outstripped the capacity of Engineering teams to resolve.” This admission is devastating in a legal and operational context. It confirms that the security team was identifying vulnerabilities faster than the developers could patch them, creating a backlog of security debt on the company’s flagship Orion platform. Tim Brown and other senior executives did not respond to this capacity failure by halting production, surging resources, or warning customers. They responded by signing a form. The document asked management to “accept the risk of legacy problem in the Orion Platform.” By affixing their names or tacitly approving this waiver, they sanctioned the operation of a product. This bureaucratic maneuver converted known engineering failures into “accepted risks,” shielding the company from internal friction while leaving customers exposed to the consequences of that friction. The reference to “legacy problem” in the Orion Platform is particularly damning. Orion was not a side project; it was the company’s “crown jewel,” accounting for approximately 45% of SolarWinds’ total revenue in 2020. It was the software installed deep within the networks of the Pentagon, the Department of Justice, and thousands of private enterprises. Admitting that this specific asset was with legacy problem that engineering could not address contradicts every public assurance SolarWinds gave regarding its Secure Development Lifecycle (SDL). A functional SDL precludes the release of code with known high-severity vulnerabilities, yet the September 2020 form proves that the release pattern continued even as the bug backlog became unmanageable. This capitulation in September was not an event the culmination of a summer defined by ignored warnings. In July 2020, just two months prior, a SolarWinds engineer sent an email to Brown describing an incident at a customer site that left him “spooked.” The engineer suspected a larger compromise or a widespread weakness. Brown’s response to this alarm was not a mobilization of defense a resignation to mediocrity. He replied, “As you guys know our backends are not that resilient and we should definitely make them better.” This casual acknowledgment that the backend infrastructure—the very used to build and distribute software—was “not that resilient” aligns perfectly with the September admission of engineering incapacity. The SEC’s fraud charges rely heavily on the distance between these internal realities and the external narrative. At the exact moment Brown was reviewing a form stating that engineering was drowning in security defects, the SolarWinds website hosted a “Security Statement” claiming the company used a “strong” development lifecycle and adhered to strict security standards. An investor or customer reading that statement in September 2020 would believe that SolarWinds had a handle on its code quality. The Risk Acceptance Form proves that the executives knew the opposite was true. They knew the “current state of security” was untenable, yet they allowed the misleading public statements to remain online, soliciting new business based on false pretenses. The concept of “risk acceptance” in cybersecurity is designed for edge cases—accepting the risk of a legacy printer protocol or a specific, server that cannot be patched. It is not designed to accept the risk that the entire engineering department is incapable of securing the company’s primary product. Using a Risk Acceptance Form to cover for a resource deficiency is a corruption of the risk management process. It treats a absence of budget or competence as an operational constraint that must be tolerated, rather than a serious failure that must be solved. For a company valued at billions of dollars, claiming that engineering “capacity” prevented the resolution of security problem is an admission that profit margins were prioritized over product safety. This document also sheds light on the internal culture regarding the “Security Transformation” Brown was supposedly leading. Since his arrival in 2017, Brown had presented multiple times on the need to improve security. Yet, by late 2020, the trajectory was negative. The volume of problem was increasing, not decreasing, and the engineering response was slowing down. The September form indicates that the “transformation” had failed to take root in the engineering culture. Security was still viewed as a bottleneck or a tax on development, rather than an integral part of the process. When the load became too heavy, the solution was not to fix the code to paper over the problem with a signature. The timing of this document is serious to the fraud angle. The Sunburst malicious code was injected into the Orion software updates between March and June 2020. By September 2020, the attackers had been inside the build environment for months. While the Risk Acceptance Form does not explicitly mention the Russian intruders—because SolarWinds had not yet detected them—it documents the environment that allowed them to remain. A security team overwhelmed by a volume of “legacy problem” has no to hunt for sophisticated threats. An engineering team that cannot fix known bugs has no capacity to investigate subtle anomalies in the build process. The “capacity” deficit in the form created the perfect smokescreen for the attackers. also, the existence of this form destroys the “sophisticated victim” defense frequently used by SolarWinds. After the breach, the company portrayed the attack as a highly advanced operation that would have penetrated any defense. The September 2020 document suggests otherwise. It suggests that the door was left open not because the lock was picked by a master thief, because the owners knew the lock was broken and decided it was too much trouble to fix. When a CISO accepts that his team cannot keep up with security flaws, he is voluntarily lowering the defensive posture of the organization. The attackers did not need to be infinitely sophisticated; they only needed to be more persistent than an engineering team that had already tapped out. The SEC complaint emphasizes that this information was material to investors. A reasonable investor knowing that SolarWinds’ engineering team was “outstripped” by security flaws would view the stock as a toxic asset. By concealing this form and the reality it represented, SolarWinds artificially inflated its stock price. The “Security Statement” acted as a warranty of quality that the company knew it could not honor. Brown’s participation in this scheme—receiving the form, acknowledging the backend weakness, and staying silent—places him at the center of the alleged fraud. In the broader context of the investigation, the September 2020 Risk Acceptance Form serves as the smoking gun for “scienter”—intent or knowledge of wrongdoing. It proves that the executives were not negligent; they were informed. They quantified the failure, documented it, signed it, and filed it away, all while the “Security Statement” continued to deceive the public. This was not a passive failure of oversight. It was an active decision to prioritize the release schedule of the Orion Platform over the security of the United States government agencies that relied on it. The disconnect between the “Security Statement” and the Risk Acceptance Form is absolute. One describes a controlled, secure environment; the other describes a chaotic backlog where risks are accepted because they cannot be managed. This specific instance of documentation provides the SEC with irrefutable evidence that the people in charge of SolarWinds’ security knew exactly how bad things were, months before the world found out. They chose to accept the risk on behalf of their customers, without ever asking for their consent.

November 2020 Internal Culture: The 'Throw Up' Comment on Security Mindset

November 2020 represented the final month of SolarWinds’ existence as a company perceived to be secure. While the Sunburst malicious code had been resident within the Orion platform since at least the spring of that year, the public and the vast majority of the company’s own staff remained unaware of the catastrophe. Yet, inside the information security department, the atmosphere was not one of ignorance, of visceral disgust. The Securities and Exchange Commission’s investigation later unearthed internal communications from this specific month that dismantled the corporate narrative of “Security.” These records reveal a security team that watched the company’s external marketing with a sense of physical nausea, knowing the reality of the engineering practices behind the curtain. The most damning piece of evidence from this period is an instant message sent by a Senior Information Security Manager. The manager, whose identity was shielded in the complaint whose words became central to the fraud charges, wrote to a colleague: “We’re so far from being a security focused company. Every time I hear about our head geeks talking about security I want to throw up.” This statement was not a complaint about workload or a specific technical grievance. It was a total repudiation of the company’s identity. The “Head Geeks” were SolarWinds’ brand evangelists, the public faces who attended conferences, hosted webcasts, and assured the IT community that SolarWinds understood their needs. For the Senior Information Security Manager, seeing these figures promote the company’s security posture was physically repulsing because the internal truth was so clear different. The SEC used this communication to that the deception was not accidental; it was a known condition that caused distress to the very people paid to protect the firm. The conversation did not end with that expression of disgust. A colleague, also within the Information Security team, responded to the manager with an assessment that was equally bleak. This employee wrote, “The products are and obviously have been for years.” This exchange destroys the defense that the security failures were incidents or recent oversights. The use of the word ” ” suggests a widespread, pervasive problem where vulnerabilities were the norm rather than the exception. The employee’s addition that this state had “for years” corroborates the timeline of negligence that stretched back to the 2018 IPO and beyond. These November 2020 messages provide a window into the morale and mindset of the security apparatus just weeks before the Sunburst disclosure. The team appeared defeated. They were not hunting for advanced nation-state actors; they were drowning in basic engineering failures. The same employee who described the products as ” ” also explained the futility of their remediation efforts: “We filed more vulnerabilities then [sic] we fixed. And by fixed, it frequently means just a temporary fix… the problem is still there and it’s huge.” This specific admission highlights a “treadmill” effect in SolarWinds’ security operations. The security team was identifying flaws faster than the engineering teams could—or would—resolve them. The reference to “temporary fixes” indicates that even when problem were addressed, the solutions were cosmetic or incomplete, leaving the underlying architectural weaknesses intact. This aligns with the “duct tape” culture described in earlier years, by November 2020, the accumulation of technical debt had reached a breaking point. The security team knew the “problem is still there and it’s huge,” yet the company continued to sell its software to the US government and Fortune 500 companies with assurances of high security standards. CISO Tim Brown’s role in this culture was the primary focus of the SEC’s charges. The Commission argued that Brown was not an aloof executive unaware of these grumblings. Evidence suggests he was deeply in the reality that caused his staff to want to “throw up.” Just two months prior, in September 2020, a Risk Acceptance Form marked for Brown’s attention warned that the “volume of security problem being identified over the last month have outstripped the capacity of Engineering teams to resolve.” The November comments from his staff were the direct downstream consequence of that September warning. Brown knew the engineering capacity was insufficient. He knew the vulnerabilities were piling up. Yet, the external messaging remained unchanged. The “Head Geeks” marketing machine continued to churn out content that positioned SolarWinds as a leader in IT management and security. This disconnect is what generated the “throw up” reaction. It is a specific psychological toll borne by professionals who are forced to witness their employer sell a lie that implicates their own professional ethics. The security manager did not say they were angry; they said they were sick. This reaction implies a deep sense of helplessness. The security apparatus at SolarWinds had lost the battle for resources and attention, and they were forced to watch the victory lap of a marketing team selling a “secure” product that they knew was ” ” with holes. The SEC’s complaint juxtaposed these private admissions against the public “Security Statement” still live on the SolarWinds website in November 2020. That statement claimed the company followed a “secure development lifecycle” and adhered to NIST standards. The internal chat logs from November prove that the employees responsible for that lifecycle knew it was a fiction. They were not following a secure lifecycle; they were filing vulnerabilities that went unfixed or received only temporary patches. The “Security Statement” was a static document of compliance; the internal chat was a record of failure. This culture of concealment also explains why the Sunburst attack went for so long. A security team that is overwhelmed by basic vulnerabilities and ” ” products absence the to hunt for sophisticated intrusions. When a team is drowning in known problem, they have no capacity to look for unknown threats. The “throw up” comment suggests a team in survival mode, barely keeping up with the daily influx of bad news, let alone monitoring for a silent, nation-state backdoor. The noise of the ” ” product likely masked the signal of the Russian intrusion. The timing of these comments is also legally significant. In November 2020, SolarWinds was still soliciting new business and renewing contracts based on its reputation. Every contract signed in November 2020 was signed under the false pretense of security, a pretense that the company’s own Senior Information Security Manager found nauseating. The SEC viewed this not just as poor management, as securities fraud. The investors were led to believe their capital was invested in a company with a “strong” (to use the company’s own banned buzzword) security posture, while the insiders knew the assets were “very.” also, the “throw up” exchange reveals the failure of internal escalation channels. If a Senior Information Security Manager feels the only outlet for their concern is a private instant message to a colleague, it shows that formal channels were either blocked or ineffective. In a healthy security culture, a manager who believes the products are ” ” presents a plan to leadership to fix it. In SolarWinds’ November 2020 culture, the manager expressed physical illness and resignation. This silence—the failure to scream from the rooftops—was purchased by a corporate culture that prioritized sales velocity over engineering integrity. The “Head Geeks” themselves were likely unaware of the depth of the rot, serving as unwitting proxies for the deception. They read the scripts and promoted the features, unaware that the security team behind them was retching at their words. This compartmentalization is a hallmark of the fraud alleged by the SEC. By keeping the marketing arm separated from the engineering reality, SolarWinds maintained a pristine public image while the internal infrastructure crumbled. Tim Brown stood at the intersection of these two worlds. He saw the marketing, and he saw the Risk Acceptance Forms. He heard the “Head Geeks,” and he managed the team that wanted to throw up. As November 2020 closed, the stage was set for the December. The “huge” problem the engineers referenced was about to become global news. The “temporary fixes” would no longer suffice. The “throw up” comment stands as the final epitaph for SolarWinds’ pre-breach era—a moment of clarity where the internal guardians acknowledged that the company had lost its way, just before the rest of the world found out. The nausea felt by that manager was a physiological reaction to a corporate lie that was about to collapse. The SEC’s inclusion of this quote in their complaint served to pierce the corporate veil. It stripped away the legal defenses of “sophisticated attacks” and “unforeseeable risks.” It showed that the risk was not only foreseeable; it was the subject of daily ridicule and despair within the company’s own walls. The fraud was not that they were hacked; the fraud was that they sold themselves as secure while their own experts watched in horror. The “throw up” comment remains one of the most vivid illustrations of the human cost of corporate deception—the moment when professional pride turns into physical sickness.

Generic Risk Disclosures During the Sunburst Dwell Time (2019-2020)

The ‘Hypothetical’ Shield: Boilerplate Warnings Amidst Active Compromise

The Securities and Exchange Commission (SEC) centered of its fraud charges on SolarWinds’ use of generic, boilerplate risk disclosures during the precise period Russian threat actors were actively exploiting the company’s systems. Between 2019 and 2020, while the “Sunburst” malicious code was being injected into the Orion software build pipeline, SolarWinds filed multiple periodic reports (Forms 10-K and 10-Q) with the SEC. These documents, legally required to provide investors with a clear view of material risks, consistently framed cybersecurity threats as theoretical possibilities. The SEC complaint alleges that this “hypothetical” language, warning that attacks “may” occur or “could” result in damage, was materially misleading because Chief Information Security Officer (CISO) Tim Brown and other executives possessed specific knowledge that the company’s serious assets were already in a ” state” and that security deficiencies were not chance, actual and severe.

2019 Form 10-K: The ‘We May’ Defense

On February 24, 2020, SolarWinds filed its Annual Report on Form 10-K for the fiscal year ended December 31, 2019. In the “Risk Factors” section, the company stated that it “may” be subject to cyberattacks and that such attacks “could” result in the loss of proprietary information or disruption of operations. The filing warned that “if” the company sustained system failures or data security incidents, it could face liability. This language was standard corporate boilerplate, indistinguishable from the risk factors of thousands of other compliant firms. Yet, the investigative timeline reveals a clear different reality. By the time this document was filed, the threat actors behind Sunburst had already compromised the SolarWinds build environment (as early as September 2019) and were actively testing their ability to inject code. The SEC alleges that while the company may not have known of the specific Russian intrusion at that moment, they definitively knew that the “risk” of such an intrusion was not hypothetical. Internal assessments from 2019 had already flagged that “access and privilege to serious systems/data is inappropriate,” rendering the “we may be subject to” language a deceptive minimization of a known, elevated hazard.

Q2 2020 Form 10-Q vs. The ‘Resilience’ Email

The between public disclosure and private knowledge widened significantly by the second quarter of 2020. On August 10, 2020, SolarWinds filed its Form 10-Q, repeating the standard warnings that “security incidents” could occur. Just two months prior, in June 2020, CISO Tim Brown had engaged in an internal email exchange regarding a cyberattack on a customer. In this correspondence, Brown explicitly admitted to a colleague that the prospect of an attacker targeting SolarWinds’ Orion backend was “very concerning” because “our backends are not that resilient.” This admission, that the company’s defensive posture for its flagship product was weak, was never communicated to investors. Instead, the Form 10-Q maintained the facade of a standard risk profile, failing to disclose that the executive in charge of security believed the company’s backend infrastructure absence the resilience to withstand the very attacks the filing described as theoretical possibilities.

Q3 2020 Form 10-Q vs. The ‘Outstripped Capacity’ Memo

The pattern of concealment continued into the third quarter. On November 5, 2020, mere weeks before the Sunburst attack would be publicly exposed, SolarWinds filed another Form 10-Q. Once again, the risk factors relied on the “we may” and “could” formulation. This filing occurred shortly after a September 2020 internal risk acceptance form, shared with Brown, declared that “the volume of security problem being identified over the last month have [sic] outstripped the capacity of Engineering teams to resolve.” The SEC complaint highlights this juxtaposition as evidence of scienter (intent to deceive). While the legal team was filing documents warning investors of *chance* future risks, the engineering and security teams were documenting an *actual* collapse of their remediation capacity. The “risk” was no longer that an attack might happen; the risk was that the company had already lost the ability to keep pace with known vulnerabilities, a material fact that was omitted from the quarterly report.

Tim Brown’s Sub-Certifications

A serious method in this alleged fraud was the internal sub-certification process. For each quarterly and annual filing, CISO Tim Brown was required to sign sub-certifications attesting to the effectiveness of the company’s internal controls over financial reporting and disclosure. The SEC alleges that Brown signed these certifications knowing they were false. Specifically, the complaint states that Brown “knew, or was reckless or negligent in not knowing,” that the certifications were inaccurate because the “numerous, documented cybersecurity failures prevented SolarWinds from having controls.” By signing these documents, Brown provided the necessary assurance for the CEO and CFO to sign the final Sarbanes-Oxley certifications, so embedding the deception into the official federal record. The SEC that Brown’s signature was not a passive act an affirmative step in the scheme to conceal the company’s true security posture from the investing public.

The ‘Crown Jewel’ Omission

The SEC’s investigation further criticized the generic nature of the disclosures for failing to identify risks specific to the Orion platform, the company’s “crown jewel” product which accounted for a significant percentage of its revenue. The risk factors lumped cyberattacks into a broad list of chance disruptions alongside “natural disasters, fire, power loss, telecommunication failures, and employee theft.” This dilution buried the specific, heightened risk facing the Orion build pipeline. Internal documents showed that engineers had warned that the remote access setup for Orion was “not very secure” and that an attacker could “basically do whatever without us detecting it.” By failing to tailor the risk disclosures to reflect these specific, known vulnerabilities in their most serious product, SolarWinds deprived investors of the information needed to assess the true magnitude of the investment risk. The “generic” language served to satisfy the letter of the disclosure requirement while violating its spirit by obscuring the specific “red flags” that were waving inside the Austin headquarters.

The ‘Dwell Time’ Irony

The irony of these generic disclosures lies in the timeline of the Sunburst attack. Throughout the entire period of 2019 and 2020, while SolarWinds was telling the SEC and its shareholders that it “may” face cyber threats, the Russian Foreign Intelligence Service (SVR) was a silent administrator on their network. The “hypothetical” risks described in the 10-Ks and 10-Qs were, in fact, operational realities. The attackers had already subverted the build process, injected the backdoor, and were distributing it to customers. While SolarWinds maintains they were unaware of the specific Sunburst intrusion until December 2020, the SEC’s argument rests on the premise that they *were* aware of the widespread vulnerabilities that made such an intrusion inevitable. By framing the risk as a future possibility rather than a present condition of “inappropriate access” and “non-resilient backends,” SolarWinds engaged in what the SEC described as a campaign to “paint a false picture” of its cyber controls environment.

Investor Stock Sales of $315 Million Prior to Public Disclosure

The timing of the transaction remains one of the most contentious financial elements of the SolarWinds scandal. On December 7, 2020, private equity firms Thoma Bravo and Silver Lake sold approximately $286 million in SolarWinds stock. This sale occurred days before the company publicly disclosed the catastrophic “Sunburst” cyberattack, which subsequently caused the stock price to plummet. The total value of the deal, involving the Canada Pension Plan Investment Board (CPPIB) as the buyer, reached $315 million when including shares from other sellers. This massive transfer of wealth—and risk—from insiders to a public pension fund became a focal point for regulators and class-action attorneys, raising serious questions about who knew what, and when.

The December 7 Private Placement

The transaction was executed as a private placement, a method that allows large investors to sell blocks of shares directly to an institutional buyer rather than on the open market. In this instance, Thoma Bravo and Silver Lake, who shared owned roughly 70% of SolarWinds and held six board seats, offloaded a combined 13 million shares at a price of $21. 97 per share.

The deal closed on December 7, 2020. The timeline of surrounding events creates a clear picture of the informational asymmetry present at the time:

DateEvent
November 2020Outgoing CEO Kevin Thompson sells approximately $15 million in stock.
December 7, 2020Thoma Bravo and Silver Lake sell $286 million in stock to CPPIB at $21. 97/share.
December 8, 2020FireEye (Mandiant) publicly discloses it was hacked, a breach later linked to SolarWinds.
December 9, 2020SolarWinds announces Sudhakar Ramakrishna as the incoming CEO.
December 12, 2020FireEye notifies SolarWinds CEO Kevin Thompson that the Orion software is the vector.
December 14, 2020SolarWinds files Form 8-K disclosing the Sunburst vulnerability.
December 17, 2020SolarWinds stock closes at $14. 18, a drop of roughly 35% from the sale price.

The proximity of the sale to the public of the breach triggered immediate scrutiny. The Canada Pension Plan Investment Board, managing the retirement funds of millions of Canadians, saw the value of its new investment evaporate almost instantly. Reports indicate the fund lost approximately $100 million in book value within two weeks of the purchase. This loss fueled the narrative that insiders had exited their positions at the peak of the company’s valuation, leaving public investors to absorb the financial impact of the company’s accumulated security negligence.

Regulatory Scrutiny and the “Awareness” Defense

The Securities and Exchange Commission (SEC) launched an inquiry into these trades to determine if they constituted insider trading. The core legal question was whether the private equity firms or their representatives on the board possessed material non-public information regarding the breach at the time of the sale. Both Thoma Bravo and Silver Lake denied any prior knowledge of the Sunburst attack. In joint statements, the firms asserted that the transaction was a pre-scheduled financial decision and that they were “not aware of this chance cyberattack” when the deal was signed. They maintained that the timing was coincidental, aligning with the transition of the CEO role rather than the discovery of the breach. The investigation faced high blocks. Proving insider trading requires evidence that the sellers knew of the *specific* negative event. While the SEC charged CISO Timothy Brown with fraud for concealing the *general* state of cybersecurity risks, the agency did not file insider trading charges against the private equity firms in its major complaints. The investigation into the trades concluded without enforcement action against the investors, a decision that frustrated observers who viewed the optics as indicative of a rigged system. Even without a smoking gun proving they knew of the specific Russian hack, the investors benefited from a stock price that the SEC alleged was inflated by years of fraudulent security statements.

The Link to CISO Fraud and Valuation

The SEC’s fraud charges against CISO Timothy Brown and SolarWinds Corporation provide the necessary context for understanding the economic damage of these stock sales. The SEC alleged that from the 2018 IPO through 2020, the company engaged in a campaign to overstate its cybersecurity posture. By concealing the ” state” of the Orion platform, as documented in internal emails and the 2018 “Not Very Secure” assessment, the company maintained an artificially high stock price. When Thoma Bravo and Silver Lake sold their shares at $21. 97, that valuation relied on the market’s belief that SolarWinds was a secure, compliant enterprise. The SEC’s complaint detailed how the company touted its adherence to the NIST Cybersecurity Framework and its Secure Development Lifecycle (SDL), claims that were allegedly false. Therefore, the $315 million transaction was executed at a price point sustained by the very misrepresentations the CISO is accused of orchestrating. Whether the investors knew of the specific breach is legally distinct from the fact that they cashed out on a valuation built on a “house of cards” regarding security compliance.

Class Action Lawsuits and Settlement

Following the stock crash, shareholders filed class-action lawsuits against SolarWinds, its executives, and the private equity owners. The plaintiffs alleged that the defendants had a fiduciary duty to disclose the true state of the company’s cybersecurity and that the stock sales demonstrated a motive to conceal the truth. The lawsuit, led by the New York City District Council of Carpenters Pension Fund, argued that the board members from the private equity firms had access to information showing the company’s security was deficient. In late 2022, the parties reached a settlement. SolarWinds agreed to pay $26 million to resolve the claims. The settlement did not include an admission of liability, and the private equity firms were released from the claims as part of the agreement. The $26 million figure, paid largely by insurance, represented a fraction of the losses suffered by investors like CPPIB, yet it closed the civil liability chapter regarding the securities fraud allegations for the class.

Governance

The stock sales highlighted a serious governance problem common in private-equity-backed technology firms. The dual role of Thoma Bravo and Silver Lake, as both major shareholders and board members, created inherent conflicts of interest. As board members, they had a duty to oversee risk management, including cybersecurity. As shareholders, their primary interest was maximizing the return on their investment. Critics that this structure incentivized cost-cutting measures that weakened security defenses, as detailed in the SEC’s allegations regarding the rejection of security resources in favor of profitability. The “throw up” comment by an employee regarding the company’s security culture reflects the operational reality that prioritized sales over safety. The ability of these controlling firms to execute a massive block sale just days before the consequences of that culture were revealed remains a definitive example of how information asymmetry harms institutional and retail investors.

Final Resolution of Legal Claims

While the suspicion surrounding the trades in the public record, the legal battles concluded with mixed results. The SEC pursued SolarWinds and Brown vigorously, the specific insider trading probe against the investors did not result in charges. also, in a significant development in late 2025, the SEC’s remaining fraud claims against SolarWinds and Brown were dismissed with prejudice, following a partial dismissal by a federal judge in July 2024. The court found that while the company’s security may have been flawed, the specific legal standards for securities fraud required a higher bar of proof regarding intent and the materiality of the specific risk disclosures. Even with the legal dismissal, the $315 million stock sale stands as a historical fact. It represents a moment where the financial interests of insiders were secured immediately before the exposure of a widespread risk that devastated the company’s clients and public shareholders. The transaction serves as a permanent case study in the need for tighter restrictions on executive and major shareholder trading during periods of executive transition and heightened operational risk. The method that allowed $286 million to move from the balance sheets of private equity firms to a pension fund days before a emergency remain legal, yet they show the disconnect between corporate financial maneuvering and the operational reality of cybersecurity failures.

SEC Charges Against CISO Timothy Brown: Individual Liability Precedent

The Securities and Exchange Commission (SEC) filed charges against SolarWinds Chief Information Security Officer (CISO) Timothy Brown on October 30, 2023, marking a definitive shift in the regulatory enforcement of cybersecurity. For the time, federal regulators sought to hold a corporate security executive personally liable for securities fraud, alleging that Brown actively participated in concealing the company’s “poor” cyber practices from investors. The complaint, filed in the Southern District of New York, accused Brown of violating the antifraud provisions of the Securities Act of 1933 and the Securities Exchange Act of 1934, alongside aiding and abetting the company’s violations. ### The Charges: Fraud and Deception The SEC’s case rested on the assertion that Brown knew SolarWinds’ public “Security Statement” was materially false yet continued to approve its distribution to customers and investors. The complaint detailed a clear contrast between Brown’s internal communications and his external representations. While the Security Statement claimed SolarWinds followed the NIST Cybersecurity Framework and maintained strong password policies, internal emails in the complaint painted a different picture. Investigators pointed to a 2018 internal presentation where Brown admitted the company’s remote access configuration was “not very secure.” In June 2020, months before the Sunburst attack was publicized, Brown wrote in an email that the company’s “backends are not that resilient.” The SEC argued that by failing to correct the Security Statement while possessing this knowledge, Brown acted with *scienter*—the intent to deceive or defraud. The commission sought permanent injunctive relief, disgorgement of ill-gotten gains, civil penalties, and an officer and director bar, a penalty reserved for CEOs and CFOs involved in financial accounting fraud. ### The Wells Notice and Industry Reaction The legal escalation began in June 2023 when the SEC issued a “Wells Notice” to Brown, a formal warning that enforcement action was imminent. This move sent shockwaves through the cybersecurity profession. Security leaders viewed the charges as a dangerous precedent that criminalized the inevitable gap between a security program’s aspirational goals and its operational reality. The charges suggested that a CISO could be held personally responsible for stock price drops if they failed to disclose every internal vulnerability to the public—a requirement argued was operationally impossible and chance dangerous. ### The July 2024 Ruling: A Partial Dismissal The case reached a serious juncture on July 18, 2024, when U. S. District Judge Paul A. Engelmayer issued a 107-page opinion that dismantled the majority of the SEC’s arguments. The court dismissed the claims related to SolarWinds’ internal accounting controls, rejecting the SEC’s attempt to expand Section 13(b)(2)(B) of the Exchange Act to cover cybersecurity controls. Judge Engelmayer ruled that “internal accounting controls” refer strictly to financial accounting, not the technical controls used to secure IT assets. This ruling was a significant victory for the defense, as it prevented the SEC from regulating cybersecurity standards through the backdoor of accounting statutes. The judge also dismissed claims regarding the company’s post-Sunburst disclosures, describing the SEC’s arguments as relying on “hindsight.” The court found that the initial Form 8-K filings made after the attack discovery were not misleading simply because they did not include every detail known to the technical teams at that exact moment. Yet, the court allowed the securities fraud claim against Brown to proceed. Judge Engelmayer found that the SEC had adequately pleaded that the pre-Sunburst “Security Statement” posted on the company’s website was materially misleading. Because Brown was the “owner” and primary approver of this document, the court ruled he could chance be held liable for its inaccuracies. This decision established a legal standard: while CISOs might not be liable for the efficacy of their controls under accounting laws, they are accountable for the truthfulness of the marketing documents they approve. ### The November 2025 Voluntary Dismissal The litigation concluded abruptly on November 20, 2025. The SEC filed a joint stipulation with SolarWinds and Timothy Brown to dismiss the remaining claims with prejudice. The commission stated the decision was an “exercise of its discretion,” ending the of Brown without a trial or a settlement involving penalties. Legal analysts attribute the dismissal to the weakened state of the case following the July 2024 ruling. With the internal controls and post-incident disclosure charges stripped away, the SEC was left with a narrow fraud claim based on a marketing document—a difficult case to win before a jury, especially given the technical nuance of whether a “Security Statement” constitutes a warranty of perfection. ### Legacy of the Brown Charges Even with the dismissal, the case against Timothy Brown permanently altered the risk environment for security executives. The survival of the fraud claim past the motion to dismiss stage proved that CISOs face personal exposure for public-facing statements. Corporate legal teams subject security white papers and website attestations to the same rigorous review as financial disclosures. The “Brown Precedent” established that a CISO’s signature on a security document is not a bureaucratic formality a certification of truthfulness subject to federal securities laws. Liability insurance for CISOs, previously a niche product, became a standard contract requirement for top-tier security roles in 2025 and 2026. The case demonstrated that while the SEC may not be able to dictate how a company secures its network, it can and punish executives who lie about it.

SEC v. SolarWinds & Timothy Brown: Case Timeline
DateEventSignificance
June 23, 2023Wells Notice IssuedSEC warns Brown of impending enforcement action, signaling individual targeting.
Oct 30, 2023Charges FiledSEC formally charges Brown with fraud and internal control violations.
July 18, 2024Court RulingJudge dismisses internal control charges; allows fraud claim on “Security Statement” to proceed.
Nov 20, 2025Case DismissedSEC voluntarily dismisses remaining charges with prejudice, ending the litigation.

Judicial Dismissal of Internal Accounting Control Claims in July 2024

The July 18, 2024, ruling by Judge Paul A. Engelmayer in the United States District Court for the Southern District of New York marked a decisive moment in the legal battle between the Securities and Exchange Commission and SolarWinds Corporation. This decision specifically dismantled the Commission’s aggressive attempt to classify cybersecurity failures as violations of internal accounting controls. The court dismissed the SEC’s claim that SolarWinds violated Section 13(b)(2)(B) of the Securities Exchange Act of 1934. This statutory provision requires companies to devise and maintain a system of internal accounting controls sufficient to provide reasonable assurances that access to assets is permitted only in accordance with management’s authorization. The SEC had advanced a and expansive legal theory. The agency argued that the term “assets” within the statute should extend beyond traditional financial assets like cash and inventory to include the company’s software source code and information technology systems. Under this interpretation, the Commission contended that SolarWinds’ failure to enforce strong password policies and access restrictions constituted a failure to maintain internal accounting controls. The SEC asserted that because the company’s “crown jewel” software code was an asset, the poor cybersecurity practices that allowed the Sunburst attackers to access it were accounting violations. This argument sought to transform a law designed to prevent corporate bribery and embezzlement into a method for federal cybersecurity regulation. Judge Engelmayer rejected this reasoning in his 107 page opinion. He characterized the SEC’s reading of the statute as “not tenable” and contrary to the text and history of the law. The court conducted a detailed analysis of the Foreign Corrupt Practices Act of 1977 which added the internal accounting controls provision to the Exchange Act. The judge noted that the statute was enacted to address financial improprieties such as off the books slush funds and bribery of foreign officials. The opinion clarified that “internal accounting controls” are a term of art in the accounting profession. They refer specifically to the safeguards that ensure the accuracy of financial reporting and the physical security of financial assets. The court ruled that the SEC’s interpretation would impermissibly expand the agency’s authority. Judge Engelmayer wrote that accepting the Commission’s argument would turn the SEC into a general cybersecurity regulator with the power to penalize public companies for any security failure that compromised a digital asset. He stated that such a sweeping expansion of regulatory power requires clear congressional authorization which the Exchange Act does not provide. The ruling emphasized that while cybersecurity is undoubtedly important for modern companies, it remains distinct from financial accounting. A failure to patch a VPN vulnerability or a failure to enforce password complexity rules does not constitute a breakdown in the system of checks and balances used to prepare financial statements. This dismissal had immediate consequences for the charges against CISO Timothy Brown. The SEC had charged Brown with aiding and abetting the company’s violations of the internal accounting controls provision. Since the court found that no primary violation of Section 13(b)(2)(B) existed as a matter of law, the aiding and abetting claims against Brown were also dismissed. This removed of the liability facing the security executive. It signaled to the industry that while CISOs can face fraud charges for making false statements, they cannot be held personally liable under accounting provisions for the operational adequacy of their security programs. The court also dismissed the SEC’s claims regarding “disclosure controls and procedures” under Rule 13a-15(a). The Commission had alleged that SolarWinds failed to maintain controls because it misclassified the Sunburst attack and earlier incidents during its internal assessment processes. The SEC argued that these misclassifications prevented the information from rising to the level of senior management quickly enough. Judge Engelmayer found this argument insufficient. He noted that SolarWinds did have a system in place to escalate information. The fact that the system may have produced an erroneous result in specific instances did not prove that the system itself was non-existent or legally deficient. The opinion stated that “errors happen without widespread deficiencies” and that the securities laws do not require perfection in the execution of disclosure. The distinction drawn by the court was precise. The judge allowed the securities fraud claims to proceed where the SEC alleged that SolarWinds and Brown had actively lied to investors about their security posture. The “Security Statement” posted on the company website contained specific representations about access controls and password protections that allegedly contradicted the internal reality known to Brown. These claims survived because they were based on the element of deception. In contrast, the internal accounting control claims were based on the element of negligence in maintaining security. By dismissing the control claims, the court established that having bad security is not a securities law violation in itself. The violation occurs only when the company misleads the market about the state of that security. Legal observers viewed the dismissal of the accounting control claims as a check on the SEC’s enforcement division. The agency had settled a similar case with R. R. Donnelley & Sons Co regarding a ransomware attack using the same internal accounting controls theory. The SolarWinds ruling provided the judicial test of this theory in a litigated context. The rejection of the theory by a federal judge in the Southern District of New York created a significant hurdle for the SEC’s plan to use Section 13(b)(2)(B) as a primary tool for cybersecurity enforcement. The decision forces the Commission to rely on the more difficult task of proving fraud or disclosure failures rather than simply pointing to a security breach and labeling it an accounting control failure. The court’s analysis of the term “access to assets” relied heavily on the context of financial stewardship. Judge Engelmayer explained that the purpose of limiting access to assets in an accounting context is to prevent financial loss that would distort the company’s financial records. For example, limiting access to a warehouse prevents inventory theft that would make the balance sheet inaccurate. Limiting access to a bank account prevents embezzlement. In the case of SolarWinds, the theft of source code or customer data did not directly alter the financial records of the company in the same way. The judge reasoned that while the source code is a valuable proprietary asset, the “internal accounting controls” provision was never intended to govern the digital rights management or cybersecurity defenses protecting that intellectual property. This ruling clarified the boundaries of the CISO’s legal exposure. Timothy Brown faced intense scrutiny as the CISO to be charged with fraud and control violations in this manner. The dismissal of the control charges validated the defense argument that security executives manage operational risks, not financial accounting risks. The court ruled that the tools of financial regulation cannot be repurposed to police the technical configurations of a corporate network. The responsibility for accurate financial reporting lies with the CFO and the controller. The responsibility for network security lies with the CISO. Attempting to merge these distinct domains under the banner of “internal accounting controls” conflated two fundamentally different corporate functions. The survival of the fraud claims regarding the Security Statement meant that the case was not entirely over in July 2024. The court found that the SEC had adequately pleaded that Brown and SolarWinds acted with scienter, or intent to deceive, regarding the specific pledge made on the website. The judge pointed to the gap between the public claims of compliance with NIST standards and the internal emails describing the state of security as “.” This bifurcation of the case highlighted the core principle of the ruling. Companies are free to have poor security without violating the Exchange Act, provided they do not lie about it. The legal violation from the dishonesty, not the vulnerability. The July 2024 decision serves as a precedent that limits the scope of the SEC’s cybersecurity enforcement program. It establishes that the agency cannot use the internal accounting controls provision as a catch all penalty for cyber incidents. The ruling demands that the SEC stick to its traditional lane of disclosure and fraud prevention. It prevents the agency from dictating the specific technical measures a company must employ to secure its data. The court recognized that while the SEC has a valid role in ensuring investors are informed about cyber risks, it does not have the authority to prescribe the specific firewalls, password policies, or access control lists that a company must use. The dismissal of the internal accounting control claims against SolarWinds and Timothy Brown represents a significant judicial restraint on regulatory overreach. It affirms that existing statutes must be interpreted according to their text and history rather than being stretched to cover emerging technological problems. The decision leaves the SEC with tools to punish deception removes the weapon of punishing operational negligence under the guise of accounting failures. For the cybersecurity industry, the ruling provides a degree of clarity. It separates the duty to secure the network from the duty to account for the finances. It confirms that a security failure is not automatically a financial crime.

Key Legal Outcomes of the July 2024 Ruling

Legal ClaimCourt DecisionReasoning
Internal Accounting Controls (Section 13(b)(2)(B))DismissedCybersecurity controls are not “internal accounting controls.” “Assets” refers to financial assets, not source code.
Disclosure Controls (Rule 13a-15(a))DismissedErrors in classifying specific incidents do not prove the absence of a control system. Perfection is not required.
Securities Fraud (Section 10(b) / Rule 10b-5)Survived (Partially)Claims regarding the “Security Statement” on the website survived because they alleged specific, intentional misrepresentations.
Aiding and Abetting (Timothy Brown)Dismissed (Controls)Since the primary violation of internal accounting controls was dismissed, the aiding and abetting charge against the CISO also failed.
Timeline Tracker
December 2020

The 'Security Statement' Discrepancies: Public Claims vs. Internal Reality — The "Security Statement" served as the primary artifact of deception in the Securities and Exchange Commission's case against SolarWinds Corporation. For years prior to the massive.

2019

The NIST Framework Fabrication — SolarWinds publicly touted its with the NIST Cybersecurity Framework, a gold standard for evaluating security practices. This claim suggested a detailed, top-down method to managing cyber.

January 2018

The Secure Development Lifecycle Myth — The "Security Statement" also asserted that SolarWinds used a Secure Development Lifecycle (SDL) to create its software. An SDL integrates security checks at every phase of.

2018

Password Policies and Access Control Failures — Perhaps the most tangible gap involved basic hygiene: passwords and access controls. The "Security Statement" claimed SolarWinds maintained strong password protections and that passwords were individually.

June 2020

Timothy Brown's Knowledge and Inaction — The SEC's case against CISO Timothy Brown hinged on his specific knowledge of these failures. As the executive responsible for information security, Brown had the duty.

July 2024

The Legal Aftermath — In July 2024, a federal judge dismissed several parts of the SEC's complaint sustained the fraud charges related to the "Security Statement." The court ruled that.

October 2018

False Claims of NIST Cybersecurity Framework Compliance — The SolarWinds "Security Statement" served as the company's primary shield against customer scrutiny. This document was not marketing collateral. It functioned as a formal attestation of.

November 2019

The 'Solarwinds123' Credential: A Monument to Negligence — In the annals of cybersecurity failures, few incidents rival the sheer absurdity of the "solarwinds123" credential. This alphanumeric string, discovered in plain text on a public.

July 2024

The SEC Complaint: Fraud Through Misrepresentation — The SEC's complaint, filed in the Southern District of New York (Case 1: 23-cv-09518), leveraged the "solarwinds123" incident to the company's "Security Statement." This document, published.

February 2021

The 'Intern' Defense and Executive Deflection — When the password leak garnered global attention following the Sunburst disclosure, SolarWinds executives attempted to minimize the catastrophe by shifting blame to a junior employee. During.

November 2025

widespread Failure of Internal Controls — The "solarwinds123" incident also exposed the hollowness of SolarWinds' internal enforcement method. The SEC complaint highlighted that while the company had written policies on paper, they.

June 2018

The 'Unmanaged' Device Loophole: A Gateway for Intrusion — The Securities and Exchange Commission's complaint against SolarWinds and CISO Timothy Brown centered on a specific, vulnerability in the company's remote access architecture: the permission of.

2018

Internal Warnings: "Not Very Secure" — The between internal knowledge and external representation was documented in explicit warnings delivered to Brown and other executives. The SEC complaint a 2018 presentation prepared by.

January 2019

The January 2019 Intrusion — The theoretical risk of unmanaged access materialized in January 2019. According to the SEC, threat actors successfully accessed the SolarWinds VPN using an unmanaged third-party device.

July 2024

Legal Ramifications and the Fraud Charge — The SEC's of SolarWinds and Brown marked a shift in regulatory enforcement, targeting a CISO individually for the time in such a context. The core of.

September 2019

The Orion Build Server: A Playground for Attackers — The most damning evidence of the SDL failure lies in the compromise of the Orion build server. In a secure environment, the build system is the.

January 2018

Internal Warnings Ignored by Leadership — The absence of an SDL was not a secret to the company's technical staff. Internal communications obtained by the SEC show a workforce deeply aware of.

2018

2018 Internal Assessment: 'Not Very Secure' Remote Access Warnings

October 2018

The 2018 Internal Assessment: A Verdict of 'Not Very Secure' — In the months leading up to SolarWinds' initial public offering (IPO) in October 2018, the company's internal cybersecurity reality stood in clear contrast to the strong.

2018

The Engineer's Warning — According to the SEC complaint filed against SolarWinds and its Chief Information Security Officer (CISO), Timothy Brown, a company engineer prepared a presentation in 2018 that.

March 2018

CISO Awareness and Inaction — The SEC's investigation revealed that Timothy Brown was fully aware of these deficiencies. The "not very secure" presentation was not the only red flag he received.

January 2019

The Unmanaged Device Vulnerability — The specific technical failure identified in the 2018 assessment, the ability for unmanaged devices to access the VPN, created a gaping hole in SolarWinds' perimeter. By.

December 2018

widespread Negligence — The 2018 assessment also shed light on broader widespread failures beyond the VPN. The engineer's report and subsequent internal communications painted a picture of a security.

March 2018

SEC Fraud — The "not very secure" assessment is a smoking gun in the SEC's case. It provides documentary evidence that the risks leading to the Sunburst attack were.

2019

2019 CISO Presentations on 'Vulnerable State' of Critical Assets — SECTION 7 of 14: 2019 CISO Presentations on ' State' of serious Assets.

October 2018

The " State" Warning: A Persistent Reality — By 2019, the internal cybersecurity posture at SolarWinds had to a level that compelled Chief Information Security Officer Timothy Brown to problem clear warnings to the.

August 2019

August 2019: The Quarterly Review and the "NIST Score of 1" — The between internal reality and public claims reached a nadir during the "Security & Compliance Program Quarterly Review" in August 2019. Prepared by Brown and reviewed.

September 2019

The September 2019 FedRAMP Assessment — One month after the damning Quarterly Review, a September 2019 internal assessment related to FedRAMP (Federal Risk and Authorization Management Program) compliance further underscored the severity.

August 2019

Executive Awareness and the Failure to Act — The circulation of these presentations destroys the defense that the cybersecurity failures were the result of rogue engineers or oversight. The August 2019 presentation was not.

2019

The Disconnect: Internal Truth vs. External Fiction — The table above illustrates the chasm between the truth Brown spoke internally and the fiction the company sold externally. This duality is the heart of the.

June 2020

June 2020 Email Evidence: 'Backends Are Not That Resilient' — The June 2020 internal communications represent the most damaging evidence against SolarWinds and CISO Tim Brown. These documents destroy the defense that the company was a.

June 2020

The US Trustee Program Incident — The sequence of events began with a specific notification from a high-profile customer. In June 2020 the US Trustee Program (USTP) contacted SolarWinds with a disturbing.

July 2020

The 'Spooked' Engineer and Continued Warnings — The alarm bells did not stop with the June email. The internal anxiety grew as more anomalies surfaced. In July 2020 a member of the engineering.

September 2020

The Volume of Unresolved problem — The June and July emails were part of a broader pattern of overwhelmed defenses. By September 2020 the situation had further. An internal document shared with.

2020

The Disconnect with Public Statements — While Brown was emailing colleagues about non-resilient backends and spooked engineers the company's external messaging remained aggressively optimistic. The "Security Statement" on the SolarWinds website continued.

June 2020

The Missed Opportunity to Stop Sunburst — The June 2020 email is tragic because it reveals a missed opportunity to stop the most significant supply chain attack in history. The Sunburst malicious code.

June 2020

Legal of 'Scienter' — In securities fraud litigation "scienter" refers to the intent to deceive or a reckless disregard for the truth. The June 2020 email is the primary evidence.

June 2020

The Definition of Resilience — Brown's use of the word "resilience" warrants specific technical examination. in cybersecurity resilience is not just prevention. It is the capacity to limit the blast radius.

September 2020

September 2020 Risk Acceptance Form: Security Issues Outpacing Engineering — The September 2020 Risk Acceptance Form stands as a definitive artifact of corporate negligence in the SolarWinds timeline. While the company publicly projected an image of.

November 2020

November 2020 Internal Culture: The 'Throw Up' Comment on Security Mindset — November 2020 represented the final month of SolarWinds' existence as a company perceived to be secure. While the Sunburst malicious code had been resident within the.

2019-2020

Generic Risk Disclosures During the Sunburst Dwell Time (2019-2020)

2019

The 'Hypothetical' Shield: Boilerplate Warnings Amidst Active Compromise — The Securities and Exchange Commission (SEC) centered of its fraud charges on SolarWinds' use of generic, boilerplate risk disclosures during the precise period Russian threat actors.

February 24, 2020

2019 Form 10-K: The 'We May' Defense — On February 24, 2020, SolarWinds filed its Annual Report on Form 10-K for the fiscal year ended December 31, 2019. In the "Risk Factors" section, the.

August 10, 2020

Q2 2020 Form 10-Q vs. The 'Resilience' Email — The between public disclosure and private knowledge widened significantly by the second quarter of 2020. On August 10, 2020, SolarWinds filed its Form 10-Q, repeating the.

November 5, 2020

Q3 2020 Form 10-Q vs. The 'Outstripped Capacity' Memo — The pattern of concealment continued into the third quarter. On November 5, 2020, mere weeks before the Sunburst attack would be publicly exposed, SolarWinds filed another.

December 2020

The 'Dwell Time' Irony — The irony of these generic disclosures lies in the timeline of the Sunburst attack. Throughout the entire period of 2019 and 2020, while SolarWinds was telling.

December 7, 2020

Investor Stock Sales of $315 Million Prior to Public Disclosure — The timing of the transaction remains one of the most contentious financial elements of the SolarWinds scandal. On December 7, 2020, private equity firms Thoma Bravo.

December 7, 2020

The December 7 Private Placement — The transaction was executed as a private placement, a method that allows large investors to sell blocks of shares directly to an institutional buyer rather than.

2018

The Link to CISO Fraud and Valuation — The SEC's fraud charges against CISO Timothy Brown and SolarWinds Corporation provide the necessary context for understanding the economic damage of these stock sales. The SEC.

2022

Class Action Lawsuits and Settlement — Following the stock crash, shareholders filed class-action lawsuits against SolarWinds, its executives, and the private equity owners. The plaintiffs alleged that the defendants had a fiduciary.

July 2024

Final Resolution of Legal Claims — While the suspicion surrounding the trades in the public record, the legal battles concluded with mixed results. The SEC pursued SolarWinds and Brown vigorously, the specific.

June 23, 2023

SEC Charges Against CISO Timothy Brown: Individual Liability Precedent — June 23, 2023 Wells Notice Issued SEC warns Brown of impending enforcement action, signaling individual targeting. Oct 30, 2023 Charges Filed SEC formally charges Brown with.

July 18, 2024

Judicial Dismissal of Internal Accounting Control Claims in July 2024 — The July 18, 2024, ruling by Judge Paul A. Engelmayer in the United States District Court for the Southern District of New York marked a decisive.

July 2024

Key Legal Outcomes of the July 2024 Ruling — Internal Accounting Controls (Section 13(b)(2)(B)) Dismissed Cybersecurity controls are not "internal accounting controls." "Assets" refers to financial assets, not source code. Disclosure Controls (Rule 13a-15(a)) Dismissed.

Pinned News
Vanishing Forests
Why it matters: India's forests are disappearing rapidly, despite efforts to replant trees using a special fund. The fund meant for afforestation has been plagued by corruption and mismanagement, leading.
Read Full Report

Questions And Answers

Tell me about the the 'security statement' discrepancies: public claims vs. internal reality of SolarWinds Corporation.

The "Security Statement" served as the primary artifact of deception in the Securities and Exchange Commission's case against SolarWinds Corporation. For years prior to the massive Sunburst cyberattack discovered in December 2020, this document resided on the company's website, presenting an image of a digital. It assured investors and customers that SolarWinds adhered to rigorous standards, specifically the National Institute of Standards and Technology (NIST) Cybersecurity Framework. It claimed the.

Tell me about the the nist framework fabrication of SolarWinds Corporation.

SolarWinds publicly touted its with the NIST Cybersecurity Framework, a gold standard for evaluating security practices. This claim suggested a detailed, top-down method to managing cyber risk. The SEC complaint detailed a different reality. Investigators found that SolarWinds had not implemented the NIST framework across its enterprise. Evidence showed the company relied on a preliminary self-assessment from 2019 that did not even evaluate the NIST Cybersecurity Framework. Instead, it looked.

Tell me about the the secure development lifecycle myth of SolarWinds Corporation.

The "Security Statement" also asserted that SolarWinds used a Secure Development Lifecycle (SDL) to create its software. An SDL integrates security checks at every phase of the creation process, from design to coding to testing. This practice aims to catch defects early, preventing vulnerabilities from reaching the final product. Internal emails painted a picture of an SDL that existed in name only. In January 2018, an engineering manager explicitly questioned.

Tell me about the password policies and access control failures of SolarWinds Corporation.

Perhaps the most tangible gap involved basic hygiene: passwords and access controls. The "Security Statement" claimed SolarWinds maintained strong password protections and that passwords were individually stored in an encrypted state or "salted and hashed." It also boasted of strict access controls, implying that administrative rights were tightly restricted. The SEC's findings shattered this facade. Internal documents showed that the company stored passwords in simple, unencrypted formats. The investigation famously.

Tell me about the timothy brown's knowledge and inaction of SolarWinds Corporation.

The SEC's case against CISO Timothy Brown hinged on his specific knowledge of these failures. As the executive responsible for information security, Brown had the duty to ensure the accuracy of the "Security Statement." The court found that the SEC adequately pled that Brown acted with scienter, intent or severe recklessness, in allowing the false statement to remain public. Brown's own words served as the most damaging evidence. In presentations.

Tell me about the the legal aftermath of SolarWinds Corporation.

In July 2024, a federal judge dismissed several parts of the SEC's complaint sustained the fraud charges related to the "Security Statement." The court ruled that a jury could find this document materially false and misleading. The judge noted that Brown knew of the "substantial body of data" that impeached the statement's content. His conduct in allowing it to remain public for years, even with contradictory internal practices, was plausible.

Tell me about the false claims of nist cybersecurity framework compliance of SolarWinds Corporation.

The SolarWinds "Security Statement" served as the company's primary shield against customer scrutiny. This document was not marketing collateral. It functioned as a formal attestation of the company's defensive posture. At the center of this attestation stood a definitive claim: SolarWinds "follows" the National Institute of Standards and Technology (NIST) Cybersecurity Framework. For government clients and Fortune 500 buyers, this assertion carried specific weight. The NIST framework is the gold.

Tell me about the the 'solarwinds123' credential: a monument to negligence of SolarWinds Corporation.

In the annals of cybersecurity failures, few incidents rival the sheer absurdity of the "solarwinds123" credential. This alphanumeric string, discovered in plain text on a public repository, stands as the definitive symbol of the internal negligence that plagued SolarWinds Corporation prior to the Sunburst attack. While the company projected an image of military-grade security to investors and clients, the reality within its engineering trenches involved credentials so weak they violated.

Tell me about the the sec complaint: fraud through misrepresentation of SolarWinds Corporation.

The SEC's complaint, filed in the Southern District of New York (Case 1: 23-cv-09518), leveraged the "solarwinds123" incident to the company's "Security Statement." This document, published on the SolarWinds website and referenced in filings, asserted that the company enforced a rigorous password policy requiring complexity, rotation, and obfuscation. The Commission alleged that these claims were materially false. The complaint detailed that SolarWinds and Brown knew of specific deficiencies in access.

Tell me about the the 'intern' defense and executive deflection of SolarWinds Corporation.

When the password leak garnered global attention following the Sunburst disclosure, SolarWinds executives attempted to minimize the catastrophe by shifting blame to a junior employee. During a joint hearing before the House Committees on Oversight and Reform and Homeland Security in February 2021, former CEO Kevin Thompson testified that the password was "a mistake that an intern made." Thompson claimed the intern violated password policies by posting the credential on.

Tell me about the widespread failure of internal controls of SolarWinds Corporation.

The "solarwinds123" incident also exposed the hollowness of SolarWinds' internal enforcement method. The SEC complaint highlighted that while the company had written policies on paper, they absence the technical "teeth" to ensure compliance. Internal emails in the litigation showed that employees routinely bypassed security to prioritize speed and product development. The culture, as described by the SEC, was one where security was viewed as an impediment to operations rather than.

Tell me about the the 'unmanaged' device loophole: a gateway for intrusion of SolarWinds Corporation.

The Securities and Exchange Commission's complaint against SolarWinds and CISO Timothy Brown centered on a specific, vulnerability in the company's remote access architecture: the permission of "unmanaged" devices on the corporate Virtual Private Network (VPN). While the company's public-facing Security Statement assured clients and investors of rigorous access controls, internal painted a dangerously different picture. "Unmanaged" devices, personal laptops, phones, and tablets not owned, monitored, or secured by SolarWinds IT.

Latest Articles From Our Outlets
January 2, 2026 • All, Crimes
Why it matters: Cross-border scam call centers pose a significant threat, exploiting technological and legal loopholes to target individuals and businesses internationally. Despite the increasing.
December 31, 2025 • Intel, All
Why it matters: State secrets laws are increasingly used to limit transparency, affecting national security and public accountability. The surge in invoking these laws, seen.
October 8, 2025 • All, Trackers
Why it matters: Gender-based violence in post-conflict Africa is a silent emergency that often goes unnoticed. Survivors in war-torn regions like the DRC, South Sudan,.
Why it matters: Global public trust in businesses is at historic lows, with only 39% of respondents believing in their ethical behavior. Organizations face existential.
May 7, 2025 • All, Corruption
Why it matters: A handful of well-connected corporations and insiders profited significantly during the COVID-19 crisis, raising concerns about fairness and transparency. Emergency contracts and.
Why it matters: Public Relations in 2025 is evolving to be more dynamic, data-driven, and crucial for business success. PR teams are under pressure to.
Similar Reviews
Get Updates
Get verified alerts whenever a new review is published. We email just once a week.