Rare NSA Advisory About Russia-Based Cyberattacks Unlikely to Stop Them
The Sandworm group — behind disinformation and election-hacking campaigns and responsible for a 2016 power outage in the Ukraine — is now targeting e-mail servers.
A rare advisory from the US National Security Agency (NSA), warning of attacks by Russian military intelligence on vulnerable e-mail servers, is not likely to dissuade the nation-state cyber-espionage group from attacking targets of interest, cybersecurity experts say.
On Thursday, the NSA told organizations that a remotely exploitable vulnerability in the EXIM mail transfer agent, which comes installed by default on some versions of Linux, is being targeted by “Russian cyber actors from the GRU Main Center for Special Technologies (GTsST), field post number 74455” — otherwise known as the Sandworm group. The Sandworm group is one of two main cyber operations groups for Russian military intelligence.
But aside from convincing targeted organizations to take the appropriate actions to protect their systems, the advisory will likely not blunt the attacks, says Greg Lesnewich, a threat intelligence researcher at Recorded Future.
“We have tried naming and shaming of the individual operators and the unit — obviously sanctions have been tried,” he says. “I think that Russian intelligence agencies have a high risk tolerance and feel pretty emboldened to do what they are doing, so I’m not entirely sure what we could potentially do to deter them from conducting these activities.”
The warning does not bode well for the latest US election cycle. With politics already polarized and disinformation regularly being used by political parties and foreign rivals, the revelation that Russian intelligence has likely gained access to some government organizations’ and businesses’ e-mail servers is troubling.
In addition, the fact that a US intelligence agency is raising a flag should lend credence to the information and may spur action, Lesnewich says.
“Predominantly, it is to help American — and potentially some UK, Australian, and Canadian — businesses and entities to patch these servers to prevent incidents from happening,” he says. “In addition, by naming the GRU unit associated with the activity, they are putting resources and a warning out to help the public. We are in an election year, and this GRU activity has been implicated in election meddling both in the US and abroad.”
Attack Record
For at least 15 years, the Sandworm group — also known as Iridium, Electrum, BlackEnergy, and Voodoo Bear — has compromised a variety of political targets, sown disinformation, and collected intelligence on Russia’s rivals and interests. It has twice caused power outages in Ukraine and targeted the 2018 Winter Olympics with the Olympic Destroyer attack. The group has also started focusing on deploying Android malware to target South Korean and Ukrainian targets by creating knock-off applications that resembled other applications – in one case compromising a developer account, according to Google’s Threat Analysis Group.
The Russian government agency behind the attacks, known as the Main Directorate of the General Staff of the Armed Forces (GRU), is one of the most well-known state actors on the Internet, global consulting firm Booz Allen Hamilton stated in an in-depth analysis of Sandworm attacks published in March 2020.
“The GRU is not the only Russian government agency that conducts cyber operations, but it is Russia’s most thoroughly documented and consistently publicly implicated cyber operations organization,” according to the 84-page analysis. “In recent years, the United States, its allies, and its partners have repeatedly, explicitly, and unequivocally attributed numerous cyber events, cover personas, and security industry group names to the GRU.”
The EXIM vulnerability (CVE-2019-10149) is trivial to exploit and only requires a specially crafted command to be sent in the “MAIL FROM” filed of a message, the NSA warned in the latest advisory. “When CVE-2019-10149 is successfully exploited, an actor is able to execute code of their choosing,” the NSA said.
The code downloaded from Sandworm-linked domains and executed on exploited servers adds privileged users, disables some networks security, modifies SSH configuration to allow remote access for the attackers, and executes other code to further compromise the network, the NSA advisory stated.
EXIM is a popular mail transfer agent — the servers that shuffle e-mail around the Internet — with almost 5.3 million computers running the software. At least 30% of those servers are running vulnerable EXIM versions, according to data from Internet intelligence service Shodan.io.
The attackers began targeting the software in August 2019 and downloaded scripts from domains and servers known to belong to the Sandworm group, the NSA stated in its advisory. The agency’s warning is a “rare trifecta move” because the NSA is outing a particular threat actor, warning about a vulnerability, and releasing indicators of compromise, says
“It is sort of this unprecedented thing for them to publish about, which suggests that these operators have hit targets of interest inside the US or inside friendly foreign intelligence apparatus,” he says. “And that means there must be cases of some juicy targets that are using the EXIM mail server for them to be worried about.”
The attribution is useful in this case because access to e-mail servers is a critical step in a common cybercriminal operation known as business e-mail compromise (BEC), but the Russian group is not known to use such tactics. Under the lucrative scheme, fraudsters use a compromised e-mail server to intercept messages and invoices sent between a vendor and its clients. By using the access to request changes to bank account information, attackers have rerouted payments to their own accounts, resulting in BEC topping the list of damages due to cybercriminal operations.
Related Content:
Veteran technology journalist of more than 20 years. Former research engineer. Written for more than two dozen publications, including CNET News.com, Dark Reading, MIT’s Technology Review, Popular Science, and Wired News. Five awards for journalism, including Best Deadline … View Full Bio
Recommended Reading:
More Insights
Read More HERE