Intelligence

Foreign hackers breached Russian federal agencies, said FSB

FSB National Coordination Center for Computer Incidents (NKTsKI) revealed that foreign hackers have breached networks of Russian federal agencies.

A joint report published by Rostelecom-Solar and the FSB National Coordination Center for Computer Incidents (NKTsKI) revealed that foreign hackers have stolen information from Russian federal agencies.

The attacks were spotted in 2020, threat actors leveraged spear-phishing attacks, exploitation of vulnerabilities in web applications, hacking the infrastructure of contractors to penetrate the infrastructure of the Russian federal executive authorities.

Experts believe that threat actors behind the intrusions are sophisticated cyber mercenaries engaged by a foreign state.

“The level of attackers (the technologies and mechanisms used, the speed and quality of the work they have done) makes it possible to qualify them as cyber mercenaries pursuing the interests of a foreign state. Such attackers could stay inside the infrastructure for a long time and not give themselves away.” reads the report. “The main goal of the hackers was to completely compromise the IT infrastructure and steal confidential information, including documents from closed segments and mail correspondence of key federal executive authorities.”

Once compromised the networks of the targeted agencies, hackers gathered sensitive information from internal systems. Attackers gained access to mail servers, electronic document management servers, file servers, and workstations of various levels to steal data of interest.

The threat actors employed two previosuly undetected piece of malware dubbed Mail-O and Webdav-O.

“Mail-O is a downloader program that accesses the Mail.ru Cloud associated with account sewn into the sample. All communication takes place using the Cloud API Mail.ru” states the report. “Webdav-O is another malware that has never been described before. Like Mail-O, it interacts with the management server through the Yandex.Disk cloud. The malware supports two authentication methods: basic (with login and password) and oauth (with using a token).”

According to the report, the hackers have specifically targeted systems within federal agencies and designed their malware to bypass the most popular Russian antivirus Kaspersky that is usually installed by government offices.

“The malware developed by cybercriminals used the cloud storages of the Russian companies Yandex and Mail.ru Group to download the collected data. The hackers disguised their network activity as the legitimate utilities Yandex Disk and Disk-O. Such malware has never been encountered anywhere before;” continues the report.

  • FSB concludes these are unprecedented attacks for multiple factors including:
  • Level of threat, the attacks hit federal significance;
  • 5th level of threat according to the model used by Solar JSOC;
  • Complete compromise of infrastructure and theft of confidential government data;
  • Involvement of previously undetected malware;
  • The use of multiple attack vectors;
  • The use of Russian cloud providers “Yandex” and Mail.ru Group;
  • Zero-detection rate of the artifacts involved;

FSB did not attribute the attack to any foreign country.

Follow me on Twitter: @securityaffairs and Facebook

[adrotate banner=”9″][adrotate banner=”12″]

Pierluigi Paganini

(SecurityAffairs – hacking, Russian federal agencies)

[adrotate banner=”5″]

[adrotate banner=”13″]

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

LiteSpeed Cache WordPress plugin actively exploited in the wild

Threat actors are exploiting a high-severity vulnerability in the LiteSpeed Cache plugin for WordPress to…

3 hours ago

Most Tinyproxy Instances are potentially vulnerable to flaw CVE-2023-49606

A critical Remote Code Execution vulnerability in the Tinyproxy service potentially impacted 50,000 Internet-Exposing hosts.…

6 hours ago

UK Ministry of Defense disclosed a third-party data breach exposing military personnel data

The UK Ministry of Defense disclosed a data breach at a third-party payroll system that…

7 hours ago

Law enforcement agencies identified LockBit ransomware admin and sanctioned him

The FBI, UK National Crime Agency, and Europol revealed the identity of the admin of…

18 hours ago

MITRE attributes the recent attack to China-linked UNC5221

MITRE published more details on the recent security breach, including a timeline of the attack…

1 day ago

Alexander Vinnik, the operator of BTC-e exchange, pleaded guilty to money laundering

Alexander Vinnik, a Russian operator of virtual currency exchange BTC-e pleaded guilty to participating in…

1 day ago

This website uses cookies.