top of page
Search

SEC vs. SolarWinds: Lessons from a Landmark Cybersecurity Fraud Complaint

  • Writer: Avraham Cohen
    Avraham Cohen
  • Apr 25, 2025
  • 22 min read

Introduction

In late 2023, the U.S. Securities and Exchange Commission (SEC) took the unprecedented step of charging SolarWinds – an IT management software company – and its Chief Information Security Officer (CISO) in connection with the infamous 2020 “Sunburst” breach (SEC.gov | SEC Charges SolarWinds and Chief Information Security Officer with Fraud, Internal Control Failures ) (The SEC’s Charges Against SolarWinds and its Chief Information Security Officer Provide Important Cybersecurity Lessons for Public Companies | White & Case LLP).


The SEC’s complaint alleges that SolarWinds and its then-CISO defrauded investors by presenting an overly rosy picture of the company’s cybersecurity posture while concealing pervasive security failings and risks (SEC.gov | SEC Charges SolarWinds and Chief Information Security Officer with Fraud, Internal Control Failures ).


This blog-style analysis breaks down the SEC’s case (SEC v. SolarWinds Corp. and Timothy G. Brown, No. 1:23-cv-9518) and draws out key lessons for CISOs and security leaders on how to avoid such breaches – and the lawsuits that follow.


Background: The SolarWinds Breach and SEC Action

SolarWinds Corp. is an Austin, Texas-based software company whose products (notably the Orion IT monitoring platform) are used by thousands of enterprises and government agencies worldwide (SolarWinds Corporation and Timothy G. Brown) (The SEC’s Charges Against SolarWinds and its Chief Information Security Officer Provide Important Cybersecurity Lessons for Public Companies | White & Case LLP).


In December 2020, SolarWinds disclosed that it had been the target of a massive, nearly two-year cyber-espionage campaign. Attackers – later attributed to a Russian state actor – had inserted malware into routine Orion software updates, a supply-chain attack now known as “Sunburst” (SolarWinds Corporation and Timothy G. Brown) (Dismissal of Much of SEC’s SolarWinds Complaint Has Potentially Broad Implications for SEC Cybersecurity Enforcement - Gibson Dunn).


The tainted updates were downloaded by thousands of customers, enabling the attackers to penetrate numerous government and private networks in one of the most extensive cyber-attacks on record (SolarWinds Corporation and Timothy G. Brown) (Dismissal of Much of SEC’s SolarWinds Complaint Has Potentially Broad Implications for SEC Cybersecurity Enforcement - Gibson Dunn).


SolarWinds’ stock price plummeted (down ~25% in two days and ~35% by end of December 2020) after the breach came to light (SEC.gov | SEC Charges SolarWinds and Chief Information Security Officer with Fraud, Internal Control Failures ).


In October 2023, the SEC filed a civil enforcement lawsuit (Complaint No. 2023-227) against SolarWinds and its CISO, Timothy Brown (SEC.gov | SEC Charges SolarWinds and Chief Information Security Officer with Fraud, Internal Control Failures ).


The prosecuting agency – the SEC’s Enforcement Division – alleges that from SolarWinds’ October 2018 initial public offering (IPO) through the December 2020 Sunburst disclosure, the company and Brown misled investors about cybersecurity deliberately.


This marks the first time the SEC has brought cybersecurity fraud charges against an individual corporate officer (The SEC’s Charges Against SolarWinds and its Chief Information Security Officer Provide Important Cybersecurity Lessons for Public Companies | White & Case LLP), signaling regulators’ growing focus on executive accountability for cyber risks.


SolarWinds and Brown have publicly denied the allegations, calling the SEC’s action “misguided,” and the litigation is ongoing (The SEC’s Charges Against SolarWinds and its Chief Information Security Officer Provide Important Cybersecurity Lessons for Public Companies | White & Case LLP).


The SEC Complaint: Fraud and Control Violations

Prosecuting Entity: U.S. Securities and Exchange Commission (SEC).

The complaint was filed in U.S. District Court (Southern District of New York) on October 30, 2023 (SEC.gov | SEC Charges SolarWinds and Chief Information Security Officer with Fraud, Internal Control Failures ).


Company and Individuals Charged: SolarWinds Corporation and Timothy G. Brown (SolarWinds’ Vice President of Security Architecture, effectively the CISO) (SolarWinds Corporation and Timothy G. Brown). Both the company and Brown are named as defendants.


Types of Claims: The SEC’s charges include violations of federal securities fraud provisions and failures in corporate controls. Specifically, the SEC alleges violations of the anti-fraud sections of the Securities Act of 1933 and the Securities Exchange Act of 1934, meaning SolarWinds and Brown are accused of making material misstatements and engaging in deceptive schemes (i.e. securities fraud) (SEC.gov | SEC Charges SolarWinds and Chief Information Security Officer with Fraud, Internal Control Failures ).


In addition, SolarWinds alone is accused of violating reporting and internal control provisions of the Exchange Act – essentially, that it failed to maintain effective internal controls and made false/incomplete filings (SEC.gov | SEC Charges SolarWinds and Chief Information Security Officer with Fraud, Internal Control Failures ).


Brown is further charged with aiding and abetting the company’s violations, given his role in certifying and communicating the false information (SEC.gov | SEC Charges SolarWinds and Chief Information Security Officer with Fraud, Internal Control Failures ).


These claims range from intentional fraud (scienter-based deception) to negligence-based failures to meet reporting obligations.


In summary, the SEC contends SolarWinds and its CISO knowingly overstated the company’s cybersecurity measures and hid known deficiencies, thereby deceiving shareholders and violating securities laws (SEC.gov | SEC Charges SolarWinds and Chief Information Security Officer with Fraud, Internal Control Failures ).


Allegations: Misleading Security Claims vs. Reality

At the heart of the SEC’s case are detailed allegations that SolarWinds’ public representations about its cybersecurity were materially false or misleading when compared to internal realities. Key claims include:

In short, the SEC’s detailed claims portray a company that knew its cybersecurity was deficient and under active threat, yet publicly boasted of strong security and reported only abstract risks. This dichotomy forms the basis of alleged securities fraud (investors were misled by false assurances) and alleged negligence in governance (failure to fix or fess up to problems).


Technical and Security Failings Highlighted

Several specific technical failings were cited as evidence of SolarWinds’ poor cybersecurity practices during the period in question:

In aggregate, these technical failings created an environment ripe for compromise. More importantly for the SEC’s case, the company’s failure to disclose or correct these issues – while simultaneously assuring everyone that security was a priority – is viewed as a material deception.


Internal Control and Governance Failures

Beyond the technical issues, the SEC complaint paints a picture of governance breakdowns at SolarWinds that allowed these problems (and misstatements) to persist:


Enforcement Consequences: The SEC is seeking significant penalties: permanent injunctions, disgorgement of ill-gotten gains, civil fines, and even a bar prohibiting Brown from serving as an officer or director of any public company (SEC.gov | SEC Charges SolarWinds and Chief Information Security Officer with Fraud, Internal Control Failures ).


These are severe outcomes that reflect the SEC’s view of the case as a major violation. It’s worth noting that in mid-2024, in preliminary court rulings, SolarWinds succeeded in getting some of the SEC’s claims (particularly those hinging on internal accounting control rules) dismissed as not legally applicable to cybersecurity (Dismissal of Much of SEC’s SolarWinds Complaint Has Potentially Broad Implications for SEC Cybersecurity Enforcement - Gibson Dunn).


However, the core fraud allegations – such as the misleading “Security Statement” – have been allowed to proceed (Dismissal of Much of SEC’s SolarWinds Complaint Has Potentially Broad Implications for SEC Cybersecurity Enforcement - Gibson Dunn).


Regardless of ultimate legal outcome, the fact that a CISO faces fraud charges is a watershed moment. It puts CISOs and executives on notice that regulators expect truthful disclosure of cyber risks and will hold individuals accountable for deception (The SEC’s Charges Against SolarWinds and its Chief Information Security Officer Provide Important Cybersecurity Lessons for Public Companies | White & Case LLP) (The SEC’s Charges Against SolarWinds and its Chief Information Security Officer Provide Important Cybersecurity Lessons for Public Companies | White & Case LLP).


Lessons and Actionable Advice for CISOs and Security Leaders

The SolarWinds saga and SEC lawsuit carry abundant lessons for security professionals. For CISOs, in particular, it highlights how technical diligence and transparent risk communication are both essential to avoid devastating breaches and legal liability.


Here are key takeaways and actionable strategies:


Conclusion

The SEC’s SolarWinds complaint is a wake-up call for the cybersecurity and risk management community. It underscores that cybersecurity is not just an IT issue but a material business issue that can lead to regulatory enforcement and personal liability if mismanaged.


For CISOs, the case drives home the importance of both sound security practices and honest communication.


On one hand, fundamental security measures (secure coding, strong passwords, vigilant patching, etc.) might have averted the Sunburst breach or at least mitigated it – reinforcing the mantra that basics matter.


On the other hand, the cover-up is often worse than the crime: misleading your investors, customers, or regulators about cybersecurity can be as damaging as the breach itself.


By learning from SolarWinds’ mistakes – fixing problems early, cultivating transparency, and aligning cybersecurity governance with regulatory expectations – security leaders can better protect their organizations and steer clear of the legal quagmire that follows a major cyber incident.


In today’s environment, CISOs must be both defenders of the network and guardians of the truth when it comes to cybersecurity. The SolarWinds saga shows what can happen when either of those duties lapses.


References (Sources)

 
 

Recent Posts

See All

The New Standard
in Cyber Security

Knowledge Base

Location

Netherlands

Contact

+31-619069970

info@sdosecurity.com

Opening Hours

Mon - Fri

8:00 am – 8:00 pm

© 2020 by SDO Security

  • LinkedIn
bottom of page