NCSC joins US authorities to expose Russian brute force campaign

A joint attribution by the British and American authorities accuses Russia’s GRU intelligence services of conducting a campaign of brute force attacks on enterprise and cloud environments
The UK’s National Cyber Security Centre (NCSC), alongside US partners including the National Security Agency (NSA), Cybersecurity and Infrastructure Security Agency (CISA) and Federal Bureau of Investigation (FBI), have today published a joint security advisory exposing a long-running campaign of brute force cyber attacks by Russia’s GRU military intel unit.The campaign supposedly began in mid-2019 and appears to be ongoing. It has seen the 85th Main Special Service Centre (GTsSS) of the Russian General Staff Main Intelligence Directorate (GRU) attempt to compromise the networks of organisations around the world, including government and public sector bodies and enterprises, with brute force attacks – a trial and error method of breaking into a target’s system by running through all possible combinations of credentials until a match is hit.

This technique is not at all new – indeed it resembles to some extent how a bank robber might crack a safe in an old movie, by trying lots of combinations – but in this campaign, the Russian operatives have been using a Kubernetes cluster to scale and automate its credential-busting activities.

A significant number of these attacks are understood to have targeted Microsoft Office 365 cloud services, although the campaign also hit other service providers and even on-premise email servers. The GRU was thus able to access protected data, including emails, and identify valid account credentials to obtain deeper access, establish persistence while evading detection, and escalate privileges. Its spies also exploited publicly known vulnerabilities for remote code execution.

Known targets so far include government and military, defence contractors, energy companies, higher education institutions, logistics companies, law firms, media companies, political consultants and political parties, and think tanks.

Commenting on the latest disclosure, Mandiant Threat Intelligence vice-president John Hultquist said: “APT28 [Mandiant’s designation for GRU ops] conducts intelligence collection against these targets regularly as part of its remit as the cyber arm of a military intelligence agency.

“The bread and butter of this group is routine collection against policy makers, diplomats, the military, and the defence industry and these sorts of incidents don’t necessarily presage operations like hack and leak campaigns. Despite our best efforts we are very unlikely to ever stop Moscow from spying,” he told Computer Weekly in an emailed statement. “This is a good reminder that the GRU remains a looming threat, which is especially important given the upcoming Olympics, an event they may well attempt to disrupt.”

As with any campaign leveraging credential theft techniques, there are several steps organisations can take straight away to avoid becoming compromised. These include:

  • Using of multi-factor authentication (MFA) technology;
  • Enabling time-out and lock-out features whenever password authentication is needed, which can slow brute force attacks;
  • Using services that prevent users from making easily guessed password choices;
  • Using captchas to hinder automated access attempts when protocols support human interaction;
  • Changing all default credentials and disabling protocols that use weak authentication or don’t support MFA;
  • Configuring access controls on cloud resources to ensure only well-maintained and well-protected accounts may access them;
  • Employing network segmentation and restrictions to limit access;
  • And using automated tools to audit access logs for security concerns, and identify dodgy access requests.

The full advisory, including more information on the campaign’s tactics, techniques and procedures, can be found here.

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses artificial intelligence and machine learning to reduce spam. See how your comment data is processed.

Related posts


The Rise of the Underground Offline World: Digital Smuggling Networks

Discover how digital smuggling networks around the world provide uncensored access to the digital world in areas where internet restrictions and censorship are in place. This article highlights the phenomenon of offline internet and illustrates it through examples such as the Cuban “paquete semanal” and the Havana Street Network.

Read more

This significantly extends the lifespan of your phone battery.

How long do you typically use an Apple or Samsung smartphone? Often, the contracts that come with such devices run for two years, after which you have the option to enter into a new contract with a device. This is a waste and far from sustainable; the device is typically still in good condition after two years. Only the phone's battery will typically have decreased in quality after two years. This does not mean that you have to replace the entire device; simply replacing the battery of your Samsung phone may be sufficient to keep going for some time. Not only is this sustainable, but it is also more cost-effective! Battery replacement can start from 30 euros, depending on the Samsung model you have.

Read more
  • Tags

  • Categories

  • Archives