By Anand Vasu
The Federal Bureau of Investigation warned on April 16 that actors of the Russian Foreign Intelligence Service (SVR) were exploiting five known vulnerabilities.
The vulnerabilities listed by the FBI were:
CVE-2018-13379 Fortinet FortiGate VPN
CVE-2019-9670 Synacor Zimbra Collaboration Suite
CVE-2019-11510 Pulse Secure Pulse Connect Secure VPN
CVE-2019-19781 Citrix Application Delivery Controller and Gateway
CVE-2020-4006 VMware Workspace ONE Access
The FBI said that the actors, also known as APT29, Cozy Bear, and The Dukes, frequently conducted widespread scanning and exploitation against vulnerable systems in an effort to obtain authentication credentials to allow further access.
“NSA, CISA, and FBI are aware that United States Government, critical infrastructure (including Defense Industrial Base), and allied networks are consistently scanned, targeted, and exploited by Russian state-sponsored cyber actors,” the latest report of the US Department of Defense, said.
The release also formally named Russian actors in the SolarWinds attack. In 2020 a massive cyberattack — one of the largest of its kind — targeted the US government, its agencies and several other private companies.
More recently, SVR’s activities included targeting COVID-19 research facilities via WellMess malware, and targeting networks through the VMware vulnerability disclosed by NSA.
The Department of Defense advocated taking the following measures to mitigate the risk posed by Russian actors:
US law enforcement has warned of the threat Russian cyber criminals posed for some time now.
By a Biometrica staffer On Wednesday, Dec. 15 the U.S. and Australia signed a landmark...
Read articleBy a Biometrica staffer Earlier this month, the Bureau of Justice Statistics (BJS) released data...
Read articleBy a Biometrica staffer Late last week, the Senate Judiciary Committee approved the Open Courts...
Read article