Sobolev Igor - Fotolia
The UK’s National Cyber Security Centre (NCSC), alongside US partners including the National Security Agency (NSA), Cybersecurity and Infrastructure Security Agency (CISA) and Federal Bureau of Investigation (FBI), have today published a joint security advisory exposing a long-running campaign of brute force cyber attacks by Russia’s GRU military intel unit.
The campaign supposedly began in mid-2019 and appears to be ongoing. It has seen the 85th Main Special Service Centre (GTsSS) of the Russian General Staff Main Intelligence Directorate (GRU) attempt to compromise the networks of organisations around the world, including government and public sector bodies and enterprises, with brute force attacks – a trial and error method of breaking into a target’s system by running through all possible combinations of credentials until a match is hit.
This technique is not at all new – indeed it resembles to some extent how a bank robber might crack a safe in an old movie, by trying lots of combinations – but in this campaign, the Russian operatives have been using a Kubernetes cluster to scale and automate its credential-busting activities.
A significant number of these attacks are understood to have targeted Microsoft Office 365 cloud services, although the campaign also hit other service providers and even on-premise email servers. The GRU was thus able to access protected data, including emails, and identify valid account credentials to obtain deeper access, establish persistence while evading detection, and escalate privileges. Its spies also exploited publicly known vulnerabilities for remote code execution.
Known targets so far include government and military, defence contractors, energy companies, higher education institutions, logistics companies, law firms, media companies, political consultants and political parties, and think tanks.
Commenting on the latest disclosure, Mandiant Threat Intelligence vice-president John Hultquist said: “APT28 [Mandiant’s designation for GRU ops] conducts intelligence collection against these targets regularly as part of its remit as the cyber arm of a military intelligence agency.
“The bread and butter of this group is routine collection against policy makers, diplomats, the military, and the defence industry and these sorts of incidents don’t necessarily presage operations like hack and leak campaigns. Despite our best efforts we are very unlikely to ever stop Moscow from spying,” he told Computer Weekly in an emailed statement. “This is a good reminder that the GRU remains a looming threat, which is especially important given the upcoming Olympics, an event they may well attempt to disrupt.”
Read more about GRU activity
- The EU is applying restrictive measure to six individuals and three entities accused of conducting disruptive cyber attacks in Europe, including the Russian GRU.
- Russia has been hacking the UK for years and the British government has also known about it for years, according to the Intelligence and Security Committee’s report.
- The Russian intelligence-linked Fancy Bear group is deploying a new malware called Drovorub against Linux environments as part of a cyber espionage operation, according to US warnings.
As with any campaign leveraging credential theft techniques, there are several steps organisations can take straight away to avoid becoming compromised. These include:
- Using of multi-factor authentication (MFA) technology;
- Enabling time-out and lock-out features whenever password authentication is needed, which can slow brute force attacks;
- Using services that prevent users from making easily guessed password choices;
- Using captchas to hinder automated access attempts when protocols support human interaction;
- Changing all default credentials and disabling protocols that use weak authentication or don’t support MFA;
- Configuring access controls on cloud resources to ensure only well-maintained and well-protected accounts may access them;
- Employing network segmentation and restrictions to limit access;
- And using automated tools to audit access logs for security concerns, and identify dodgy access requests.
The full advisory, including more information on the campaign’s tactics, techniques and procedures, can be found here.