[BreachExchange] Russian SolarWinds hackers are back with new wave of cyberattacks, Microsoft warns

Sophia Kingsbury sophia.kingsbury at riskbasedsecurity.com
Fri May 28 14:09:21 EDT 2021


https://news.yahoo.com/russian-solarwinds-hackers-back-wave-113037015.html

The same Russian hackers behind the massive SolarWinds breach have launched
a new wave of cyberattacks targeting government agencies, think tanks,
consultants and NGOs, Microsoft disclosed
<https://blogs.microsoft.com/on-the-issues/2021/05/27/nobelium-cyberattack-nativezone-solarwinds/>
late
Thursday night.

Why it matters: The revelation of the ongoing attack comes less than two
months after the U.S. imposed sanctions
<https://www.axios.com/russia-sanctions-solarwinds-cyber-39561a8d-76c0-46ec-9047-6309153d1382.html?utm_medium=partner&utm_source=verizon&utm_content=edit&utm_campaign=subs-partner-vmg>
and
expelled Russian diplomats in response to the SolarWinds hack, described by
Microsoft as the "most sophisticated attack the world has ever seen."

   -

   The new breach was discovered just weeks before President Biden is set
   to hold his first in-person summit
   <https://www.axios.com/biden-putin-summit-russia-939c9554-81e0-4241-94d8-b76693ae19f1.html?utm_medium=partner&utm_source=verizon&utm_content=edit&utm_campaign=subs-partner-vmg>
with
   Russian President Vladimir Putin in Geneva, and comes on the heels of other
   Russian-backed cyber espionage campaigns.

Microsoft said the hacking group Nobelium, which is linked to Russia’s main
intelligence agency, was behind the attack.

   -

   The Kremlin-linked hacking group took control of a U.S. Agency for
   International Development account and sent legitimate-looking emails
   containing malicious files to international human rights groups and
   humanitarian organizations, according to Microsoft.
   -

   Microsoft, which monitors for malicious activity on the internet, said
   this attack "differs significantly"
   <https://www.microsoft.com/security/blog/2021/05/27/new-sophisticated-email-based-attack-from-nobelium/>
from
   the SolarWinds breach, with the hackers appearing to use newer tools and
   tradecraft.

How it works: Nobelium gained access to USAID's Constant Contact email
marketing account, allowing the group to send malicious emails that
appeared to come from genuine government addresses to 3,000 emails across
more than 150 organizations.

   -

   The emails contained a "backdoor" through which the hacks could steal
   data and infect other computers on a network. Some of the emails were
   flagged by automated email threat detection systems, but some may have been
   successfully delivered.
   -

   Many of the organizations targeted have been critical of Putin and have
   revealed and condemned Russian action against dissidents, including the
   poisoning and jailing of opposition leader, Alexei Navalny, according to
   the New York Times
   <https://www.nytimes.com/2021/05/28/us/politics/russia-hack-usaid.html>.

What they're saying: A spokesperson for the Cybersecurity and
Infrastructure Security Agency told the Times Thursday that the agency was
“aware of the potential compromise, and that it was working with USAID and
the FBI "to better understand the extent of the compromise and assist
potential victims.”

   -

   "First, when coupled with the attack on SolarWinds, it’s clear that part
   of Nobelium’s playbook is to gain access to trusted technology providers
   and infect their customers," Tom Burt, a Microsoft vice president, wrote in
   a blog post
   <https://blogs.microsoft.com/on-the-issues/2021/05/27/nobelium-cyberattack-nativezone-solarwinds/>
    Thursday.
   -

   "By piggybacking on software updates and now mass email providers,
   Nobelium increases the chances of collateral damage in espionage operations
   and undermines trust in the technology ecosystem," Burt added.
   -

   “At least a quarter of the targeted organizations were involved in
   international development, humanitarian, and human rights work."

The big picture: The attack suggests Russia is not slowing its hacking
campaigns against the U.S. government and U.S.-based companies, despite new
sanctions
<https://www.axios.com/russia-sanctions-solarwinds-cyber-39561a8d-76c0-46ec-9047-6309153d1382.html?utm_medium=partner&utm_source=verizon&utm_content=edit&utm_campaign=subs-partner-vmg>
.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.riskbasedsecurity.com/pipermail/breachexchange/attachments/20210528/b4111e32/attachment.html>


More information about the BreachExchange mailing list