Intelligence

Foreign hackers breached Russian federal agencies, said FSB

FSB National Coordination Center for Computer Incidents (NKTsKI) revealed that foreign hackers have breached networks of Russian federal agencies.

A joint report published by Rostelecom-Solar and the FSB National Coordination Center for Computer Incidents (NKTsKI) revealed that foreign hackers have stolen information from Russian federal agencies.

The attacks were spotted in 2020, threat actors leveraged spear-phishing attacks, exploitation of vulnerabilities in web applications, hacking the infrastructure of contractors to penetrate the infrastructure of the Russian federal executive authorities.

Experts believe that threat actors behind the intrusions are sophisticated cyber mercenaries engaged by a foreign state.

“The level of attackers (the technologies and mechanisms used, the speed and quality of the work they have done) makes it possible to qualify them as cyber mercenaries pursuing the interests of a foreign state. Such attackers could stay inside the infrastructure for a long time and not give themselves away.” reads the report. “The main goal of the hackers was to completely compromise the IT infrastructure and steal confidential information, including documents from closed segments and mail correspondence of key federal executive authorities.”

Once compromised the networks of the targeted agencies, hackers gathered sensitive information from internal systems. Attackers gained access to mail servers, electronic document management servers, file servers, and workstations of various levels to steal data of interest.

The threat actors employed two previosuly undetected piece of malware dubbed Mail-O and Webdav-O.

“Mail-O is a downloader program that accesses the Mail.ru Cloud associated with account sewn into the sample. All communication takes place using the Cloud API Mail.ru” states the report. “Webdav-O is another malware that has never been described before. Like Mail-O, it interacts with the management server through the Yandex.Disk cloud. The malware supports two authentication methods: basic (with login and password) and oauth (with using a token).”

According to the report, the hackers have specifically targeted systems within federal agencies and designed their malware to bypass the most popular Russian antivirus Kaspersky that is usually installed by government offices.

“The malware developed by cybercriminals used the cloud storages of the Russian companies Yandex and Mail.ru Group to download the collected data. The hackers disguised their network activity as the legitimate utilities Yandex Disk and Disk-O. Such malware has never been encountered anywhere before;” continues the report.

  • FSB concludes these are unprecedented attacks for multiple factors including:
  • Level of threat, the attacks hit federal significance;
  • 5th level of threat according to the model used by Solar JSOC;
  • Complete compromise of infrastructure and theft of confidential government data;
  • Involvement of previously undetected malware;
  • The use of multiple attack vectors;
  • The use of Russian cloud providers “Yandex” and Mail.ru Group;
  • Zero-detection rate of the artifacts involved;

FSB did not attribute the attack to any foreign country.

Follow me on Twitter: @securityaffairs and Facebook

[adrotate banner=”9″][adrotate banner=”12″]

Pierluigi Paganini

(SecurityAffairs – hacking, Russian federal agencies)

[adrotate banner=”5″]

[adrotate banner=”13″]

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 49

Security Affairs Malware newsletter includes a collection of the best articles and research on malware…

28 minutes ago

Security Affairs newsletter Round 528 by Pierluigi Paganini – INTERNATIONAL EDITION

A new round of the weekly Security Affairs newsletter has arrived! Every week, the best…

3 hours ago

Palo Alto Networks fixed multiple privilege escalation flaws

Palo Alto Networks addressed multiple vulnerabilities and included the latest Chrome patches in its solutions.…

1 day ago

Unusual toolset used in recent Fog Ransomware attack

Fog ransomware operators used in a May 2025 attack unusual pentesting and monitoring tools, Symantec…

1 day ago

Paraguay Suffered Data Breach: 7.4 Million Citizen Records Leaked on Dark Web

Resecurity researchers found 7.4 million records containing personally identifiable information (PII) of Paraguay citizens on…

2 days ago