Russian Hackers Actively Targeting the U.S. and Other Organizations

russian hackers

Share This Post

Share on facebook
Share on linkedin
Share on twitter
Share on email

The FBI, DHS, and CISA have now warned about ongoing attacks coordinated by Russian Hackers and the Russian Foreign Intelligence Service (SVR) or APT29 against U.S. and foreign organizations. Moreover, the SVR had a connection with the recent SolarWinds Orion supply chain attack.

About the warning

The joint advisory provides additional information on russian hackers APT29 tactics, tools, techniques, and capabilities. Among the TTPs associated with SVR, the federal agencies highlighted the following.

  • Password Spraying: In one compromise of a large network (in 2018), the threat actors used password spraying to spot a weak password linked with an administrative account.
  • Leveraging Zero-Day Vulnerability: In another incident, russian hackers SVR used a zero-day exploit (CVE-2019-19781) against a VPN appliance to gain access inside the network.
  • The WELLMESS Malware: In 2020, intrusion attempts on governments in the U.K, Canada, and the U.S., that were performed using malware known as WELLMESS, were attributed to APT29 (aka SVR).
  • Similarities with SolarWinds-enabled Intrusions: Mid-2020, the APT group used modified SolarWinds network monitoring software as an initial intrusion vector. The attack vector is similar to other SVR-sponsored intrusions.

Additional insights 

The recent attacks were aimed at government networks, think tanks, policy analysis organizations, and IT companies. The attackers were looking for intelligence information from the targeted entities.

  • Recently, the U.S. government formally linked the SolarWinds supply chain attack to APT29.
  • In addition, the recent advisory complements a previous one published on April 15, sharing details about vulnerabilities exploited by the threat actor.


The CISA stated that APT29 will continue to collect intelligence from U.S. and foreign entities with cyber exploitation. It is using a range of sophisticated initial exploitation techniques, along with stealthy intrusion. In addition, the security alert shared recommendations and mitigation measures that should be followed by organizations worldwide.

Subscribe To Our Newsletter

More To Explore

Wanna take it to the next level?

drop us a line and let's get started

We're Here To help

Feel free to contact us, and we’ll be more than happy to answer all of your questions.

a2Da Digital

a2Da Digital is a brand of a2Da Enterprises

Ahtri 12
10151 Tallinn, Estonia

[email protected]

+372 712 4283
Hours : 08:00 to 18:00 Mon – Fri
Support 24×7 Submit a Ticket Here
Registered in Tallinn, EE : 14740580
VAT : EE102279616

By completing this form, you consent to a2Da Digital, in its capacity as data controller, collecting your data in order to be able to respond to your message. To assert your right of access or removal, see our Privacy Policy.

Our company is a collective of amazing people striving to build solutions you need.

Actual people, easy to contact and who know what they are doing, these are the members of the team you will deal with.
We all speak French and English and will be able to answer all your questions as quickly as possible.
Just drop an email at [email protected] with your question.

We have both eyes on our equipment, update and maintain it ourselves 24/7 and have constructed an architecture that we believe is sound, secured, efficient and cost effective. We own our servers, we do not resell hosting packages!