The US Suffers Multiple Attacks By Russian Hackers

The National Security Agency, the Department of Homeland Security Cybersecurity and Infrastructure Security Agency, and the FBI has released a joint alert statement, warning that nation-state threat actors from Russia are actively targeting and exploiting five publicly known vulnerabilities to compromise US networks.
 
According to the US government nation-state threat actors with ties to Russia are actively exploiting five publicly known vulnerabilities to compromise a range of entities within the US and its allies. The Biden administration says it has been clear that the US wants a stable relationship with Russia. But now the Biden administration is taking actions to impose costs on Russia for actions by its government and intelligence services against the US.
 
The news followed the Biden Administration’s sanctions against the Russian government, which formerly attributed SolarWinds supply-chain attack to the country’s foreign service: the Russian Foreign Intelligence Service (SVR) actors, also known as APT29, Cozy Bear, and The Dukes. “The US Intelligence Community has high confidence in its assessment of attribution to the SVR,” according to the White House statement. “The SVR’s compromise of the SolarWinds software supply chain gave it the ability to spy on or potentially disrupt more than 16,000 computer systems worldwide.”
 
The US National Security Agency (NSA) the Cybersecurity, the Infrastructure Security Agency (CISA), and the Federal Bureau of Investigation (FBI), has recently said that nation-state actors are using five vulnerabilities that affect VPN solutions, collaboration-suite software and virtualisation technologies to attack US and allied national-security and government networks. 
 
The NSA say that the attack, which is ongoing is directed by by the Russian Foreign Intelligence Service (SVR) who are exploiting five publicly known vulnerabilities. 
 
“NSA, CISA, and FBI strongly encourage all cybersecurity stakeholders to check their networks for indicators of compromise related to all five vulnerabilities and the techniques detailed in the advisory and to urgently implement associated mitigations. 
“NSA, CISA, and FBI also recognise all partners in the private and public sectors for comprehensive and collaborative efforts to respond to recent Russian activity in cyberspace”, says the NSA.
 
According to the NSA,the hackers are conducting “widespread scanning and exploitation against vulnerable systems in an effort to obtain authentication credentials to allow further access.” According to the NSA, the following are under widespread attack in cyber-espionage efforts:

The 5 Vulnerabilities Being Actively Exploited

CVE-2018-13379:   A directory traversal vulnerability in Fortinet FortOS allows unauthenticated attackers to access and download system files, by sending specially crafted HTTP resource requests. 
 
CVE-2019-9670:  This bug is an XML External Entity Injection (XXE) vulnerability in the mailbox component of the Synacore Zimbra Collaboration Suite.  Attackers can exploit it to gain access to credentials to further their access or as an initial foothold into a target network. 
 
CVE-2019-11510:   In Pulse Secure VPNs, a critical arbitrary file-reading flaw opens systems to exploitation from remote, unauthenticated attackers looking to gain access to a victim’s networks. 
 
CVE-2019-19781:  This critical directory-traversal vulnerability in the Citrix Application Delivery Controller (ADC) and Gateway that can allow remote code-execution. 
 
CVE-2020-4006:   And finally, a command-injection vulnerability in VMWare Workspace One Access, Access Connector, Identity Manager and Identity Manager Connector allows arbitrary command execution on underlying operating systems. 

The NSA recommended several best practices to protect organisations from attack:

• Update systems and products as soon as possible after patches are released.
• Assume a breach will happen; review accounts and leverage the latest eviction guidance available.
• Disable external management capabilities and set up an out-of-band management network.
• Block obsolete or unused protocols at the network edge and disable them in client device configurations.
• Adopt a mindset that compromise happens: Prepare for incident response activities.
 
NSA:       The White House:     Threatpost:      Health IT Security:      Cyber News Group:      Image: Unsplash
 
You Might Also Read:
 
Western Nations Face A ‘moment of reckoning’ Over Cyber Security:
 
« MI5 Joins Instagram
Two-Factor Authentication Matters More Than Ever »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Morgan Lewis Law

Morgan Lewis Law

Morgan Lewis is an international law firm with offices in North America, Europe, Asia, and the Middle East. Practice areas include Privacy and Cybersecurity.

VADO Security Technologies

VADO Security Technologies

VADO Security enables the safe transfer of data between low & high security networks.

United Security Providers

United Security Providers

United Security Providers is a leading specialist in information security, protecting IT infrastructures and applications for companies with high demands on security.

CLDigital

CLDigital

CLDigital's no-code risk and resilience platform, CL360, provides leaders with risk and resilience data to make strategic and tactical continuity decisions.

Securitybulls

Securitybulls

Securitybulls is an information security firm offering an encyclopedic penetration testing & IT security assessment service for your organization.

AKS IT Services

AKS IT Services

AKS IT Services (an ISO 9001:2015 and ISO 27001:2013 certified company) is a leading IT Security Services and Solutions provider.

AimBrain

AimBrain

AimBrain tools detect and prevent fraud, faster and more accurately than ever before.

Gospel Technology

Gospel Technology

Gospel presents a totally new way of accessing and controlling data which is enterprise grade scalable, highly resilient, and secure.

SAIFE

SAIFE

SAIFE has adapted a Software Defined Perimeter approach and paired it with a Zero Trust model that defines access by the user, their device, and where they are located.

UST

UST

UST is a global provider of digital technology and transformation, IT services and solutions including managed security services.

DH2i

DH2i

DH2i is a leading provider of multi-platform Software Defined Perimeter and Smart Availability software enabling customers to create an entire IT infrastructure that is always-secure and always-on.

Marcum Technology

Marcum Technology

Marcum Technology consultants are focused on helping you reach your company’s full potential by exploring creative ways to integrate tomorrow’s technology into your business today.

Darktrace

Darktrace

Darktrace is a global leader in cybersecurity AI, delivering complete AI-powered solutions in its mission to free the world of cyber disruption.

Intelequia

Intelequia

Intelequia SOC is the Security Operations Center your company needs. 24x7 monitoring, protection and automated response to cyber threats.

Tidelift

Tidelift

Tidelift provides the tools, data, and strategies that help organizations assess risk and improve the health, security, and resilience of the open source used in their applications.

CR Group

CR Group

CR Group is a Swedish-owned, cyber-security company oriented towards the European market. We offer solutions for vital societal functions that are both easy-to-buy and easy-to-use.