The National Security Agency (NSA) warns that Russian nation-state hackers are conducting brute force attacks to access US networks and steal email and files.
In a new advisory released today, the NSA states that the Russian GRU’s 85th Main Special Service Center (GTsSS), military unit 26165, has been using a Kubernetes cluster since 2019 to perform password spray attacks on US and foreign organizations, including the US government and Department of Defense agencies.
“GTsSS malicious cyber activity has previously been attributed by the private sector using the names Fancy Bear, APT28, Strontium, and a variety of other identifiers,” says the NSA advisory.
“The 85th GTsSS directed a significant amount of this activity at organizations using Microsoft Office 365 cloud services; however, they also targeted other service providers and on-premises email servers using a variety of different protocols. These efforts are almost certainly still ongoing.”
The brute force attacks target cloud services, such as Microsoft 365, to compromise accounts that are then used in conjunction with known vulnerabilities to gain initial access to corporate and government networks.
As part of their attacks, the threat actors are using various exploits, including the Microsoft Exchange CVE-2020-0688 and CVE-2020-17144 remote code execution vulnerabilities.
The NSA says that once they gain access, they will spread laterally through the network while deploying a reGeorg web shell for persistence, harvesting other credentials, and stealing files.
As the threat actors gain further access to credentials, they will exfiltrate Office 365 email inboxes and other data to a remote computer.
Also Read: Compliance Course Singapore: Spotlight on the 3 Offerings
To obfuscate the origin of their attacks, the Kubernetes cluster performs brute force attacks through TOR and VPN services, including CactusVPN, IPVanish, NordVPN, ProtonVPN, Surfshark, and WorldVPN.
The NSA says that between November 2020 and March 2021, the hackers conducted brute force attacks without using an anonymization service, exposing the following IP addresses as being used by the Russian GTsSS’ Kubernetes cluster:
158.58.173[.]40185.141.63[.]47185.233.185[.]21188.214.30[.]76195.154.250[.]89 | 93.115.28[.]16195.141.36[.]18077.83.247[.]81192.145.125[.]42193.29.187[.]60 |
These attacks have targeted US and foreign entities, including the US government and Department of Defense, focusing on the US and Europe.
Also Read: PDPA Singapore Guidelines: 16 Key Concepts For Your Business
The types of entities seen targeted by the attacks are:
When BleepingComputer asked the NSA if any US government agencies were breached using these attacks, the provided the following statement.
“The NSA does not publicly share details on victims of foreign malicious cyber activity.” – NSA.
A complete list of TTPs, including a Yara rule to detect the reGeorg variant web shell, can be found in the NSA’s cybersecurity advisory
To defend against these attacks, the NSA is recommending that organizations expand their use of multi-factor authentication (MFA) to restrict the use of stolen credentials and implement a Zero Trust security model.”This lengthy brute force campaign to collect and exfiltrate data, access credentials and more, is likely ongoing, on a global scale,” said Rob Joyce, NSA’s Director of Cybersecurity, in a statement. “Net defenders should use multi-factor authentication and the additional mitigations in the advisory to counter this activity.”
The full list of recommendations from the NSA are listed below:
In addition to the above recommendations, the NSA advises organizations to block all inbound connections from anonymization services that are not typically used in an organization, such as commercial VPN providers and TOR.