Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

Rare NSA Advisory About Russia-Based Cyberattacks Unlikely to Stop Them

The Sandworm group -- behind disinformation and election-hacking campaigns and responsible for a 2016 power outage in the Ukraine -- is now targeting e-mail servers.

A rare advisory from the US National Security Agency (NSA), warning of attacks by Russian military intelligence on vulnerable e-mail servers, is not likely to dissuade the nation-state cyber-espionage group from attacking targets of interest, cybersecurity experts say.

On Thursday, the NSA told organizations that a remotely exploitable vulnerability in the EXIM mail transfer agent, which comes installed by default on some versions of Linux, is being targeted by "Russian cyber actors from the GRU Main Center for Special Technologies (GTsST), field post number 74455" — otherwise known as the Sandworm group. The Sandworm group is one of two main cyber operations groups for Russian military intelligence.

But aside from convincing targeted organizations to take the appropriate actions to protect their systems, the advisory will likely not blunt the attacks, says Greg Lesnewich, a threat intelligence researcher at Recorded Future.

"We have tried naming and shaming of the individual operators and the unit — obviously sanctions have been tried," he says. "I think that Russian intelligence agencies have a high risk tolerance and feel pretty emboldened to do what they are doing, so I'm not entirely sure what we could potentially do to deter them from conducting these activities."

The warning does not bode well for the latest US election cycle. With politics already polarized and disinformation regularly being used by political parties and foreign rivals, the revelation that Russian intelligence has likely gained access to some government organizations' and businesses' e-mail servers is troubling. 

In addition, the fact that a US intelligence agency is raising a flag should lend credence to the information and may spur action, Lesnewich says.

"Predominantly, it is to help American — and potentially some UK, Australian, and Canadian — businesses and entities to patch these servers to prevent incidents from happening," he says. "In addition, by naming the GRU unit associated with the activity, they are putting resources and a warning out to help the public. We are in an election year, and this GRU activity has been implicated in election meddling both in the US and abroad."

Attack Record
For at least 15 years, the Sandworm group — also known as Iridium, Electrum, BlackEnergy, and Voodoo Bear — has compromised a variety of political targets, sown disinformation, and collected intelligence on Russia's rivals and interests. It has twice caused power outages in Ukraine and targeted the 2018 Winter Olympics with the Olympic Destroyer attack. The group has also started focusing on deploying Android malware to target South Korean and Ukrainian targets by creating knock-off applications that resembled other applications – in one case compromising a developer account, according to Google's Threat Analysis Group.

The Russian government agency behind the attacks, known as the Main Directorate of the General Staff of the Armed Forces (GRU), is one of the most well-known state actors on the Internet, global consulting firm Booz Allen Hamilton stated in an in-depth analysis of Sandworm attacks published in March 2020.

"The GRU is not the only Russian government agency that conducts cyber operations, but it is Russia's most thoroughly documented and consistently publicly implicated cyber operations organization," according to the 84-page analysis. "In recent years, the United States, its allies, and its partners have repeatedly, explicitly, and unequivocally attributed numerous cyber events, cover personas, and security industry group names to the GRU."

The EXIM vulnerability (CVE-2019-10149) is trivial to exploit and only requires a specially crafted command to be sent in the "MAIL FROM" filed of a message, the NSA warned in the latest advisory. "When CVE-2019-10149 is successfully exploited, an actor is able to execute code of their choosing," the NSA said. 

The code downloaded from Sandworm-linked domains and executed on exploited servers adds privileged users, disables some networks security, modifies SSH configuration to allow remote access for the attackers, and executes other code to further compromise the network, the NSA advisory stated.

EXIM is a popular mail transfer agent — the servers that shuffle e-mail around the Internet — with almost 5.3 million computers running the software. At least 30% of those servers are running vulnerable EXIM versions, according to data from Internet intelligence service Shodan.io

The attackers began targeting the software in August 2019 and downloaded scripts from domains and servers known to belong to the Sandworm group, the NSA stated in its advisory. The agency's warning is a "rare trifecta move" because the NSA is outing a particular threat actor, warning about a vulnerability, and releasing indicators of compromise, says

"It is sort of this unprecedented thing for them to publish about, which suggests that these operators have hit targets of interest inside the US or inside friendly foreign intelligence apparatus," he says. "And that means there must be cases of some juicy targets that are using the EXIM mail server for them to be worried about."

The attribution is useful in this case because access to e-mail servers is a critical step in a common cybercriminal operation known as business e-mail compromise (BEC), but the Russian group is not known to use such tactics. Under the lucrative scheme, fraudsters use a compromised e-mail server to intercept messages and invoices sent between a vendor and its clients. By using the access to request changes to bank account information, attackers have rerouted payments to their own accounts, resulting in BEC topping the list of damages due to cybercriminal operations.

Related Content:

 
 
 
 
 
 
Learn from industry experts in a setting that is conducive to interaction and conversation about how to prepare for that "really  bad day" in cybersecurity. Click for more information and to register
Veteran technology journalist of more than 20 years. Former research engineer. Written for more than two dozen publications, including CNET News.com, Dark Reading, MIT's Technology Review, Popular Science, and Wired News. Five awards for journalism, including Best Deadline ... View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
News
Inside the Ransomware Campaigns Targeting Exchange Servers
Kelly Sheridan, Staff Editor, Dark Reading,  4/2/2021
Commentary
Beyond MITRE ATT&CK: The Case for a New Cyber Kill Chain
Rik Turner, Principal Analyst, Infrastructure Solutions, Omdia,  3/30/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-20020
PUBLISHED: 2021-04-10
A command execution vulnerability in SonicWall GMS 9.3 allows a remote unauthenticated attacker to locally escalate privilege to root.
CVE-2021-30480
PUBLISHED: 2021-04-09
Zoom Chat through 2021-04-09 on Windows and macOS allows certain remote authenticated attackers to execute arbitrary code without user interaction. An attacker must be within the same organization, or an external party who has been accepted as a contact. NOTE: this is specific to the Zoom Chat softw...
CVE-2021-21194
PUBLISHED: 2021-04-09
Use after free in screen sharing in Google Chrome prior to 89.0.4389.114 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
CVE-2021-21195
PUBLISHED: 2021-04-09
Use after free in V8 in Google Chrome prior to 89.0.4389.114 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
CVE-2021-21196
PUBLISHED: 2021-04-09
Heap buffer overflow in TabStrip in Google Chrome on Windows prior to 89.0.4389.114 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.