Russian Hackers Actively Targeting the U.S. and Other Organizations

russian hackers

Share This Post

Share on facebook
Share on linkedin
Share on twitter
Share on email

The FBI, DHS, and CISA have now warned about ongoing attacks coordinated by Russian Hackers and the Russian Foreign Intelligence Service (SVR) or APT29 against U.S. and foreign organizations. Moreover, the SVR had a connection with the recent SolarWinds Orion supply chain attack.

About the warning

The joint advisory provides additional information on russian hackers APT29 tactics, tools, techniques, and capabilities. Among the TTPs associated with SVR, the federal agencies highlighted the following.

  • Password Spraying: In one compromise of a large network (in 2018), the threat actors used password spraying to spot a weak password linked with an administrative account.
  • Leveraging Zero-Day Vulnerability: In another incident, russian hackers SVR used a zero-day exploit (CVE-2019-19781) against a VPN appliance to gain access inside the network.
  • The WELLMESS Malware: In 2020, intrusion attempts on governments in the U.K, Canada, and the U.S., that were performed using malware known as WELLMESS, were attributed to APT29 (aka SVR).
  • Similarities with SolarWinds-enabled Intrusions: Mid-2020, the APT group used modified SolarWinds network monitoring software as an initial intrusion vector. The attack vector is similar to other SVR-sponsored intrusions.

Additional insights 

The recent attacks were aimed at government networks, think tanks, policy analysis organizations, and IT companies. The attackers were looking for intelligence information from the targeted entities.

  • Recently, the U.S. government formally linked the SolarWinds supply chain attack to APT29.
  • In addition, the recent advisory complements a previous one published on April 15, sharing details about vulnerabilities exploited by the threat actor.

Conclusion

The CISA stated that APT29 will continue to collect intelligence from U.S. and foreign entities with cyber exploitation. It is using a range of sophisticated initial exploitation techniques, along with stealthy intrusion. In addition, the security alert shared recommendations and mitigation measures that should be followed by organizations worldwide.

Subscribe To Our Newsletter

More To Explore

Wanna take it to the next level?

drop us a line and let's get started

We're Here To help

Feel free to contact us, and we’ll be more than happy to answer all of your questions.

a2Da Digital

a2Da Digital is a brand of a2Da Enterprises

ERHUB
Ahtri 12
10151 Tallinn, Estonia

[email protected]

+372 712 4283
Hours : 08:00 to 18:00 Mon – Fri
Support 24×7 Submit a Ticket Here
Registered in Tallinn, EE : 14740580
VAT : EE102279616

By completing this form, you consent to a2Da Digital, in its capacity as data controller, collecting your data in order to be able to respond to your message. To assert your right of access or removal, see our Privacy Policy.

Notre entreprise est un collectif de personnes extraordinaires dont le seul objectif est de construire les solutions dont vous avez besoin.

Des interlocuteurs disponibles, compétents et à votre disposition pour vous aider à définir vos besoins et les traduire en outils performants et faciles à utiliser.

Nous répondons à vos demandes au plus vite de manière claire et compréhensible.

Contactez nous à [email protected] avec vos questions.

Nous maintenons nous même notre matériel 24/7 et avons construit une infrastructure sécurisée, efficace et fiable.

Ceci nous permet de vous proposer des produits adaptés à tous les budgets et à forte valeur ajoutée.

Nous ne revendons pas des packs d’hébergement… Nous disposons de nos propres serveurs, maintenus, mis à jour et gérés par nos propres équipes.