Rare NSA Advisory About Russia-Based Cyberattacks Unlikely to Stop Them

  /     /     /  
Publicated : 23/11/2024   Category : security


Rare NSA Advisory About Russia-Based Cyberattacks Unlikely to Stop Them


The Sandworm group -- behind disinformation and election-hacking campaigns and responsible for a 2016 power outage in the Ukraine -- is now targeting e-mail servers.



A rare advisory from the US National Security Agency (NSA), warning of attacks by Russian military intelligence on vulnerable e-mail servers, is not likely to dissuade the nation-state cyber-espionage group from attacking targets of interest, cybersecurity experts say.
On Thursday,
the NSA told organizations
that a remotely exploitable vulnerability in the EXIM mail transfer agent, which comes installed by default on some versions of Linux, is being targeted by Russian cyber actors from the GRU Main Center for Special Technologies (GTsST), field post number 74455 — otherwise known as the Sandworm group. The Sandworm group is one of two main cyber operations groups for Russian military intelligence.
But aside from convincing targeted organizations to take the appropriate actions to protect their systems, the advisory will likely not blunt the attacks, says Greg Lesnewich, a threat intelligence researcher at Recorded Future.
We have tried naming and shaming of the individual operators and the unit — obviously sanctions have been tried, he says. I think that Russian intelligence agencies have a high risk tolerance and feel pretty emboldened to do what they are doing, so Im not entirely sure what we could potentially do to deter them from conducting these activities.
The 
warning
 does not bode well for the latest US election cycle. With politics already polarized and disinformation regularly being used by political parties and foreign rivals, the revelation that Russian intelligence has likely gained access to some government organizations and businesses e-mail servers is troubling. 
In addition, the fact that a US intelligence agency is raising a flag should lend credence to the information and may spur action, Lesnewich says.
Predominantly, it is to help American — and potentially some UK, Australian, and Canadian — businesses and entities to patch these servers to prevent incidents from happening, he says. In addition, by naming the GRU unit associated with the activity, they are putting resources and a warning out to help the public. We are in an election year, and this GRU activity has been implicated in election meddling both in the US and abroad.
Attack Record
For at least 15 years, the Sandworm group — also known as Iridium, Electrum, 
BlackEnergy, and Voodoo Bear
 — has compromised a variety of political targets, sown disinformation, and collected intelligence on Russias rivals and interests. It has twice caused power outages in Ukraine and targeted the 2018 Winter Olympics with the Olympic Destroyer attack. The group has also started focusing on deploying Android malware to target South Korean and Ukrainian targets by creating knock-off applications that resembled other applications – in one case compromising a developer account, 
according to Googles Threat Analysis Group
.
The Russian government agency behind the attacks, known as the Main Directorate of the General Staff of the Armed Forces (GRU), is one of the most well-known state actors on the Internet, global consulting firm Booz Allen Hamilton stated in an
in-depth analysis of Sandworm attacks
published in March 2020.
The GRU is not the only Russian government agency that conducts cyber operations, but it is Russias most thoroughly documented and consistently publicly implicated cyber operations organization, according to the 84-page analysis. In recent years, the United States, its allies, and its partners have repeatedly, explicitly, and unequivocally attributed numerous cyber events, cover personas, and security industry group names to the GRU.
The EXIM vulnerability (CVE-2019-10149) is trivial to exploit and only requires a specially crafted command to be sent in the MAIL FROM filed of a message, the NSA warned in the latest advisory. When CVE-2019-10149 is successfully exploited, an actor is able to execute code of their choosing, the NSA said. 
The code downloaded from Sandworm-linked domains and executed on exploited servers adds privileged users, disables some networks security, modifies SSH configuration to allow remote access for the attackers, and executes other code to further compromise the network, the NSA advisory stated.
EXIM is a popular mail transfer agent — the servers that shuffle e-mail around the Internet — with almost 5.3 million computers running the software. At least 30% of those servers are running vulnerable EXIM versions, according to data from 
Internet intelligence service Shodan.io

The attackers began targeting the software in August 2019 and downloaded scripts from domains and servers known to belong to the Sandworm group, the NSA stated in its advisory. The agencys warning is a rare trifecta move because the NSA is outing a particular threat actor, warning about a vulnerability, and releasing indicators of compromise, says
It is sort of this unprecedented thing for them to publish about, which suggests that these operators have hit targets of interest inside the US or inside friendly foreign intelligence apparatus, he says. And that means there must be cases of some juicy targets that are using the EXIM mail server for them to be worried about.
The attribution is useful in this case because access to e-mail servers is a critical step in a common cybercriminal operation known as business e-mail compromise (BEC), but the Russian group is not known to use such tactics. Under the lucrative scheme, fraudsters use a compromised e-mail server to intercept messages and invoices sent between a vendor and its clients. By using the access to request changes to bank account information, attackers have rerouted payments to their own accounts, resulting in BEC 
topping the list of damages due to cybercriminal operations
.
Related Content:
Securing Our Elections Requires Change in Technology, People & Attitudes
FBI: Business Email Compromise Cost Businesses $1.7B in 2019
Dragonfly APT Now Able to Disrupt US Power Grid Operations, Symantec Warns
Russia Hacked Clintons Computers Five Hours After Trumps Call
DHS-FBI Report Shows Russian Attributions A Bear
How Cybersecurity Incident Response Programs Work (and Why Some Dont)
 
 
 
 
 
 
Learn from industry experts in a setting that is conducive to interaction and conversation about how to prepare for that really  bad day in cybersecurity. Click for 
more information and to register


Last News

▸ IoT Devices on Average Have 25 Vulnerabilities ◂
Discovered: 23/12/2024
Category: security

▸ DHS-funded SWAMP scans code for bugs. ◂
Discovered: 23/12/2024
Category: security

▸ Debunking Machine Learning in Security. ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Rare NSA Advisory About Russia-Based Cyberattacks Unlikely to Stop Them