Amid renewed tensions between the U.S. and Russia over Ukraine and Kazakhstan, American cybersecurity and intelligence agencies on Tuesday released a joint advisory on how to detect, respond to, and mitigate cyberattacks orchestrated by Russian state-sponsored actors.
To that end, the Cybersecurity and Infrastructure Security Agency (CISA), Federal Bureau of Investigation (FBI), and National Security Agency (NSA) have laid bare the tactics, techniques, and procedures (TTPs) adopted by the adversaries, including spear-phishing, brute-force, and exploiting known vulnerabilities to gain initial access to target networks.
The list of flaws exploited by Russian hacking groups to gain an initial foothold, which the agencies said are “common but effective,” are below —
- CVE-2018-13379 (FortiGate VPNs)
- CVE-2019-1653 (Cisco router)
- CVE-2019-2725 (Oracle WebLogic Server)
- CVE-2019-7609 (Kibana)
- CVE-2019-9670 (Zimbra software)
- CVE-2019-10149 (Exim Simple Mail Transfer Protocol)
- CVE-2019-11510 (Pulse Secure)
- CVE-2019-19781 (Citrix)
- CVE-2020-0688 (Microsoft Exchange)
- CVE-2020-4006 (VMWare)
- CVE-2020-5902 (F5 Big-IP)
- CVE-2020-14882 (Oracle WebLogic)
- CVE-2021-26855 (Microsoft Exchange, exploited frequently alongside CVE-2021-26857, CVE-2021-26858, and CVE-2021-27065)
“Russian state-sponsored APT actors have also demonstrated sophisticated tradecraft and cyber capabilities by compromising third-party infrastructure, compromising third-party software, or developing and deploying custom malware,” the agencies said.
“The actors have also demonstrated the ability to maintain persistent, undetected, long-term access in compromised environments — including cloud environments — by using legitimate credentials.”
Russian APT groups have been historically observed setting their sights on operational technology (OT) and industrial control systems (ICS) with the goal of deploying destructive malware, chief among them being the intrusion campaigns against Ukraine and the U.S. energy sector as well as attacks exploiting trojanized SolarWinds Orion updates to breach the networks of U.S. government agencies.
To increase cyber resilience against this threat, the agencies recommend mandating multi-factor authentication for all users, looking out for signs of abnormal activity implying lateral movement, enforcing network segmentation, and keeping operating systems, applications, and firmware up to date.
“Consider using a centralized patch management system,” the advisory reads. “For OT networks, use a risk-based assessment strategy to determine the OT network assets and zones that should participate in the patch management program.”
Other recommended best practices are as follows —
- Implement robust log collection and retention
- Require accounts to have strong passwords
- Enable strong spam filters to prevent phishing emails from reaching end-users
- Implement rigorous configuration management programs
- Disable all unnecessary ports and protocols
- Ensure OT hardware is in read-only mode
Why not read
- UK bans Chinese CCTV cameras at ‘sensitive’ government locations - 26 November 2022
- Chrome Update: Exploited Zero-Day Vulnerability fixed by Google, the 8th this year - 25 November 2022
- RESEARCH: analytics information related to iPhones include a Directory Services Identifier (DSID) that may be used to identify users - 24 November 2022