Article Details

Original Article Text

Click to Toggle View

Russian hackers shift to cloud attacks, US and allies warn. Members of the Five Eyes (FVEY) intelligence alliance warned today that Russian Foreign Intelligence Service (SVR) hackers tracked as APT29 are now increasingly targeting their victims' cloud services. APT29 breached multiple U.S. federal agencies following the SolarWinds supply-chain attack they orchestrated more than three years ago. The Russian cyberspies also compromised Microsoft 365 accounts belonging to various entities within NATO nations to obtain foreign policy-related data and targeted governments, embassies, and senior officials throughout Europe associated in a string of phishing attacks. More recently, Microsoft confirmed in January that the Russian Foreign Intelligence Service hacking group breached the Exchange Online accounts of its executives and users from other organizations in November 2023. Cloud services under attack Today, a joint advisory issued by the U.K.'s National Cyber Security Centre (NCSC), the NSA, CISA, the FBI, and cybersecurity agencies from Australia, Canada, and New Zealand warned that the Russian threat group is gradually moving to attacks against cloud infrastructure. "As organizations continue to modernize their systems and move to cloud-based infrastructure, the SVR has adapted to these changes in the operating environment," the advisory reads. "They have to move beyond their traditional means of initial access, such as exploiting software vulnerabilities in an on-premises network, and instead target the cloud services themselves." As the Five Eyes agencies found, APT29 hackers are now gaining access to their targets' cloud environments using access service account credentials compromised in brute forcing or password spraying attacks. Additionally, they're using dormant accounts that have never been removed after users left the targeted organizations, also enabling them to regain access after systemwide password resets. APT29's initial cloud breach vectors also include the use of stolen access tokens that enable them to hijack accounts without using credentials, compromised residential routers to proxy their malicious activity, MFA fatigue to bypass multi-factor authentication (MFA), and registering their own devices as new devices on the victims' cloud tenants After gaining initial access, SVR hackers use sophisticated tools like the MagicWeb malware (which allows them to authenticate as any user within a compromised network) to evade detection in the victims's networks, mainly government and critical organizations spanning Europe, the United States, and Asia. How to detect SVR cloud attacks Hence, mitigating APT29's initial access vectors should be at the top of the list for network defenders when working towards blocking their attacks. Network defenders are advised to enable MFA wherever and whenever possible, coupled with strong passwords, to use the principle of least privilege for all system and service accounts, to create canary service accounts to detect compromise quicker, and to reduce session lifetimes to block the use of stolen session tokens. They should also only allow device enrollment for authorized devices and monitor for indicators of compromise that would yield the least amount of false positives when monitoring for security breaches. "For organizations that have moved to cloud infrastructure, a first line of defense against an actor such as SVR should be to protect against SVR's TTPs for initial access," the Five Eyes allies said. "By following the mitigations outlined in this advisory, organizations will be in a stronger position to defend against this threat."

Daily Brief Summary

NATION STATE ACTIVITY // Five Eyes Warn of Russian SVR's Shift to Cloud Service Attacks

The Five Eyes intelligence alliance has issued a warning regarding the Russian SVR's (APT29) increased focus on cloud service attacks.

APT29, known for the SolarWinds breach, has been targeting cloud infrastructure, including Microsoft 365 and Exchange Online accounts.

The advisory outlines SVR's tactics, including brute force attacks, password spraying, exploiting dormant accounts, and using stolen access tokens.

SVR uses sophisticated tools like MagicWeb malware to authenticate within compromised networks and targets government and critical organizations globally.

Defenders are urged to enable MFA, enforce strong passwords, practice the principle of least privilege, establish canary accounts, and monitor for specific indicators of compromise.

By implementing the recommended mitigations, organizations could strengthen their defense against this particular nation-state threat.