Saturday, November 16, 2024
HomeHacksNSA Released Top 5 Vulnerabilities That Exploited by Russian Hackers to Hack...

NSA Released Top 5 Vulnerabilities That Exploited by Russian Hackers to Hack US Based Networks

Published on

The cybersecurity and Infrastructure Security Agency (CISA) along with The National Security Agency (NSA), and the FBI has recently, released an advisory together about ongoing Russian Foreign Intelligence Service (SVR) exploitation of five publicly known vulnerabilities.

Mitigation against these vulnerabilities is critically important as U.S based networks are constantly scanned, targeted, and exploited by Russian state-sponsored threat actors.

The news pronounced that this advisory is continuously targetting five vulnerabilities in attacks against U.S. organizations and interests.

- Advertisement - SIEM as a Service

Not only this after knowing all the details regarding the advisory NSA said that they got the information that the Russian SVR is using the vulnerabilities to hack USA Govt. Networks.

The vulnerabilities were used against services that are being faced by the public, and the main motive of the threat actors was to obtain authentication credentials.

Once the threat actors get the details they can easily compromise the networks of US corporate and also the government networks.

Vulnerabilities Exploited

  • CVE-2018-13379: In this vulnerability, the threat actors can easily download all the files through HTTP resource requests.
  • CVE-2019-9670: This is a vulnerability of XML External Entity injection (XXE).
  • CVE-2019-11510: Through this vulnerability, the threat actors can send a specific crafted Uniform Resource Identifier (URI) so that they can perform an arbitrary file read.
  • CVE-2019-19781: This is a Directory traversal vulnerability, and it generally enables the threat actors to perform the arbitrary code.
  • CVE-2020-4006: It is a command injection vulnerability, that enables and threat actors to execute commands with unrestricted dues on the operating system.

Mitigation

Some mitigations were mentioned by the experts in this joint advisory, and here they are mentioned below:-

  • Always, keep the systems updated and patch soon after the patches are released.
  • Remember to disable external management abilities so that you can easily set up the management network.
  • Always, allow the robust logging of Internet-facing services and authentication functions.
  • Remember to block expire or redundant protocols that are present at the network edge and break them in device configurations.

The cybersecurity experts declared that the joint advisory clearly pronounces that the Russian SVR has been using a proper mixture of these vulnerabilities in their attacks.

However, the analysts have suggested that every administrator must install the security updates that are being associated with the updates as soon as possible. 

Moreover, the mitigations that were mentioned above should be maintained and followed carefully by the administrators. Not only this but the NSA, CISA, and FBI have recognized all partners of private as well as public sectors for inclusive and collaborative efforts.

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity, and hacking news updates.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Critical TP-Link DHCP Vulnerability Let Attackers Execute Arbitrary Code Remotely

A critical security flaw has been uncovered in certain TP-Link routers, potentially allowing malicious...

Chinese SilkSpecter Hackers Attacking Black Friday Shoppers

SilkSpecter, a Chinese financially motivated threat actor, launched a sophisticated phishing campaign targeting e-commerce...

Cybercriminals Launch SEO Poisoning Attack to Lure Shoppers to Fake Online Stores

The research revealed how threat actors exploit SEO poisoning to redirect unsuspecting users to...

Black Basta Ransomware Leveraging Social Engineering For Malware Deployment

Black Basta, a prominent ransomware group, has rapidly gained notoriety since its emergence in...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

Telegram Bot Selling Phishing Tools to Bypass 2FA & Hack Microsoft 365 Accounts

A newly discovered phishing marketplace, ONNX Store, empowers cybercriminals to launch sophisticated attacks against...

Mobile Device Management Vendor Mobile Guardian Hacked

 Mobile Guardian, a leading Mobile Device Management (MDM) vendor, experienced unauthorized access to its...

Hunt3r Kill3rs Group claims they Infiltrated Schneider Electric Systems in Germany

The notorious cybercriminal group Hunt3r Kill3rs has claimed responsibility for infiltrating Schneider Electric's systems...