Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

8/21/2018
05:35 PM
Connect Directly
Google+
Twitter
RSS
E-Mail
100%
0%

Microsoft Sinkholes 6 Fancy Bear/APT28 Internet Domains

Operation appears to have disrupted early stages of an attack campaign using spoofed nonprofit, Senate, and Microsoft domains.

In a sign that US security experts and officials this election season are on high alert for potential Russian hacking and meddling during the midterms, Microsoft today revealed that it has taken over six potentially malicious Internet domains set up by the nation-state hacking team Fancy Bear, aka APT 28, Pawn Storm, and Strontium.

The sinkhole operation shutting down the domains appears to have disrupted the early stages of a possible cyberattack campaign. Microsoft president Brad Smith said there was no indication that the attackers had used the domains in any full-blown attacks, and they weren't able to discern the actual targets Fancy Bear may have been after by using these domains.

The domains provide a sneak peek at some of the types of targets the Russian nation-state hacking team, which is believed to be the Russian military intelligence agency GRU, was after: my-iri.org, which poses as that of the International Republican Institute, a nonprofit with several high-profile politicians and government officials on its board including Sen. Marco Rubio (R-Fla.) and Gen H.R. McMaster; hudsonorg-my-sharepoint.com, which resembles the domain of the Hudson Institute, another conservative nonprofit that has sponsored events and written reports on Russian government corruption; and senate.group, adfs-senateservices, and adfs-senate.email, which appear to be spoofing US Senate websites and servers.

Microsoft also found and sinkholed a domain that was a little too-close-to-home-looking, called office365-onedrive.com, which the attackers appeared to be setting up to look like a legitimate Microsoft Office365 domain.

The sinkhole operation, which was engineered by Microsoft's Digital Crimes Unit via a court order last week, is the twelfth time in two years that the company has legally wrested control of phony websites set up by Fancy Bear. It has sinkholed 84 of Fancy Bear's malicious websites in that time frame.

"Despite last week's steps, we are concerned by the continued activity targeting these and other sites and directed toward elected officials, politicians, political groups and think tanks across the political spectrum in the United States. Taken together, this pattern mirrors the type of activity we saw prior to the 2016 election in the United States and the 2017 election in France," Smith wrote in a post.

Daniel Twining, president of the International Republican Institute, said in a statement that the organization had been targeted before and was already taking "proactive steps" for such attacks. "This latest attempt is consistent with the campaign of meddling that the Kremlin has waged against organizations that support democracy and human rights. It is clearly designed to sow confusion, conflict and fear among those who criticize Mr. Putin's authoritarian regime," he said.

The Hudson Institute said in a statement that the attack was likely to gather information, compromise, or disrupt its democracy-promotion programs –  namely its "initiatives to expose the activities of foreign kleptocratic regimes," including Russia.

"Microsoft, working in conjunction with private, U.S.-based cybersecurity firms and American law enforcement agencies, detected this malicious campaign in its early stages, shortly after Russian hackers registered a fraudulent internet address designed to mimic a legitimate Hudson webpage and infect the computers of unsuspecting visitors with malware. The fraudulent internet address was successfully taken offline," the nonprofit said. "This is not the first time authoritarian overseas regimes have attempted to mount cyberattacks against Hudson, our experts, and their friends and professional associates. We expect it will not be the last."

Same Old Fancy Bear
Trend Micro, which like many security companies has been tracking Fancy Bear/APT 28/Pawn Storm for several years, says Fancy Bear's tactics and targets mostly have remained consistent with its profile of the group published in an April 2017 report.

Mark Nunnikhoven, vice president of cloud research at Trend Micro, says the three Senate-spoofed domains Microsoft shut down were also identified by his firm earlier this year as those used by Fancy Bear.

It was around three years ago, according to the company, that the nation-state group began to expand beyond pure cyber espionage. That shift was punctuated in 2016, when the Russian group hacked the Democratic National Committee (DNC) and leaked stolen information in an attempt to sway public opinion and the US presidential election in favor of Donald Trump. 

"Pawn Storm is known for its sophisticated social engineering lures, efficient credential phishing, zero days, a private exploit kit, an effective set of malware, false flag operations, and campaigns to influence the public opinion about political issues," Trend Micro wrote in that report.

John Hultquist, director of intelligence analysis at FireEye, which has studied the Russian nation-state hacking group's moves for several years, says Fancy Bear/APT 28 long has targeted think tanks and legislative bodies as part of traditional cyber espionage.

Free Security for Candidates, Campaigns, Nonprofits
Microsoft today also launched AccountGuard, a free cybersecurity service for federal, state, and local candidates and campaign offices, as well as think tanks and political organizations that use Office 365. "We're concerned that these and other attempts pose security threats to a broadening array of groups connected with both American political parties in the run-up to the 2018 elections," Smith said in the post today.

Among the services included in AccountGuard is a detection and notification service from Microsoft of attacks by nation-state or other groups, including both corporate Office 365 accounts as well as personal accounts of users who opt into the service.

"In this way organizations can get protection for high profile surrogates helping a campaign, board members of nonprofit organizations or volunteers who use their personal accounts to communicate," Smith wrote. "Threat detection and notification will initially be available only for Microsoft services including Office 365, Outlook.com and Hotmail."

Microsoft also will provide best practices guidance, materials, and workshops covering threat modelling, secure coding, phishing awareness, and identity management, to name a few. The organizations that register for AccountGuard also get early access to new Microsoft security features.

(Photo credit for home page image: Michael Weber / imageBROKER/Shutterstock)

Related Content:

 

Learn from the industry's most knowledgeable CISOs and IT security experts in a setting that is conducive to interaction and conversation. Early bird rate ends August 31. Click for more info

Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Kunchen
50%
50%
Kunchen,
User Rank: Apprentice
8/22/2018 | 11:52:08 AM
MS as threathunters?
Wow, never thought I'd live to see the day that Microsoft was in the business of threathunting.  
COVID-19: Latest Security News & Commentary
Dark Reading Staff 8/10/2020
Pen Testers Who Got Arrested Doing Their Jobs Tell All
Kelly Jackson Higgins, Executive Editor at Dark Reading,  8/5/2020
Researcher Finds New Office Macro Attacks for MacOS
Curtis Franklin Jr., Senior Editor at Dark Reading,  8/7/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Changing Face of Threat Intelligence
The Changing Face of Threat Intelligence
This special report takes a look at how enterprises are using threat intelligence, as well as emerging best practices for integrating threat intel into security operations and incident response. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-7029
PUBLISHED: 2020-08-11
A Cross-Site Request Forgery (CSRF) vulnerability was discovered in the System Management Interface Web component of Avaya Aura Communication Manager and Avaya Aura Messaging. This vulnerability could allow an unauthenticated remote attacker to perform Web administration actions with the privileged ...
CVE-2020-17489
PUBLISHED: 2020-08-11
An issue was discovered in certain configurations of GNOME gnome-shell through 3.36.4. When logging out of an account, the password box from the login dialog reappears with the password still visible. If the user had decided to have the password shown in cleartext at login time, it is then visible f...
CVE-2020-17495
PUBLISHED: 2020-08-11
django-celery-results through 1.2.1 stores task results in the database. Among the data it stores are the variables passed into the tasks. The variables may contain sensitive cleartext information that does not belong unencrypted in the database.
CVE-2020-0260
PUBLISHED: 2020-08-11
There is a possible out of bounds read due to an incorrect bounds check.Product: AndroidVersions: Android SoCAndroid ID: A-152225183
CVE-2020-16170
PUBLISHED: 2020-08-11
The Temi application 1.3.3 through 1.3.7931 for Android has hard-coded credentials.