CLS Blue Sky Blog

Davis Polk Discusses SEC Charges for Inadequate Disclosures by Victims of SolarWinds Cyberattack

On October 22, 2024, the SEC instituted settled actions against four current and former public companies impacted by the 2020 SolarWinds software hack – Unisys Corp. (Unisys), Avaya Holdings Corp. (Avaya), Check Point Software Technologies Ltd (Check Point), and Mimecast Limited (Mimecast). The SEC alleged that the companies made materially misleading disclosures regarding cybersecurity risks and intrusions relating to the SolarWinds hack, and that one of the companies (Unisys) also had deficient disclosure controls and procedures.

The SolarWinds hack, attributed to Russia’s intelligence agencies, involved the insertion of malicious code known as SUNBURST into SolarWinds’ Orion software, which was then distributed to thousands of customers, including private companies, nonprofits and various government agencies. The threat actors used sophisticated tactics to hide in the SolarWinds network for over a year, including a legitimate code-signing certificate, various command and control servers, and custom malware designed for obscurity.

For several years, the SEC has conducted a wide-ranging investigation regarding the SolarWinds hack, including a voluntary request asking hundreds of public companies to inform the SEC how they were impacted by the hack. In October 2023, the SEC brought a much-publicized enforcement action against SolarWinds and the vice president of its information security group, alleging that the company, the primary victim of the cyberattack, made misleading disclosures regarding the security of its software and cybersecurity practices and that the company also had deficient internal accounting and disclosure controls. We previously discussed a decision by the federal judge overseeing the SEC’s litigation, in June 2024, dismissing key aspects of the SEC’s disclosure and internal controls allegations. With these latest enforcement actions, the SEC has broadened its focus to the downstream victims of the breach.

In a troublesome development, the SEC’s theory in some of these cases suggests that it will expect disclosure that goes beyond what is required by the SEC’s cybersecurity disclosure rules for public companies, adopted in July 2023, which we covered here and predate the recent settled actions. As summarized below, the SEC alleged that some of the companies failed to disclose details regarding cybersecurity intrusions—such as the identity of a threat actor or the number of customers impacted—that are not specifically required to be disclosed under the current rules. While the materiality of any particular fact must be considered on a case-by-case basis, our concern is that companies may feel pressured by these enforcement cases to disclose details they believe are immaterial, and thus not required to be disclosed under the SEC’s disclosure rules. This could undermine the effectiveness of the new rules by flooding investors with immaterial details, making it more challenging for them to identify the material events and risks that might impact their investment decisions.

SEC Settlements

The SEC’s actions focus on the disclosures made by the four settling companies after they came to learn of the SUNBURST cyberattack. The SEC alleged that the companies failed to provide accurate disclosures regarding the impact of the attack and minimized the scope and severity of the intrusions. The SEC alleged negligence-based fraud violations against each of the companies—the SEC did not allege intentional fraud and it did not bring claims against any individuals. The SEC acknowledged that the settling companies cooperated with the SEC’s investigations and imposed civil penalties ranging from $990,000 to $4 million.

Dissent

SEC commissioners Hester Peirce and Mark Uyeda dissented from the settled proceedings on the grounds that the companies, in their view, had provided sufficient material information to investors. They criticized the SEC’s approach as “playing Monday morning quarterback” and unfairly engaging in a “hindsight review” of the disclosure decisions. The commissioners cautioned that the SEC’s aggressive enforcement approach risked causing companies to disclose immaterial facts to investors out of fear of being second-guessed by the SEC, which would thereby divert investor attention and result in the mispricing of securities – concerns which they said the SEC recognized in the cybersecurity rules adopted in July 2023. The commissioners also suggested that the enforcement actions could undermine the SEC staff’s recent guidance steering companies away from disclosing immaterial incidents under Item 1.05 of Form 8-K.

Commissioners Peirce and Uyeda also noted that the allegations against Check Point—that the company had failed to update its cybersecurity risk factor disclosures after becoming aware of a specific cybersecurity event—were similar to the SEC’s allegations against SolarWinds, and which had been rejected by a federal judge. That court held that SolarWinds’ cybersecurity risk disclosure was sufficient because it had alerted the investing public to the cybersecurity threat faced by the company. The commissioners noted that Check Point’s and SolarWinds’ risk factor disclosures were “arguably similar.”

Key Takeaways

These latest resolutions signal that the SEC, under current leadership, will continue to take an aggressive approach toward issuer cybersecurity disclosures despite the mixed result in its pending litigation against SolarWinds. We see a few key takeaways:

This post comes to us from Davis, Polk & Wardwell LLP. It is based on the firm’s memorandum, “SEC charges public companies with inadequate disclosures in aftermath of the SolarWinds cyberattack,” dated October 30, 2024, and available here. 

Exit mobile version