Categories: Hacks

NSA Released Top 5 Vulnerabilities That Exploited by Russian Hackers to Hack US Based Networks

The cybersecurity and Infrastructure Security Agency (CISA) along with The National Security Agency (NSA), and the FBI has recently, released an advisory together about ongoing Russian Foreign Intelligence Service (SVR) exploitation of five publicly known vulnerabilities.

Mitigation against these vulnerabilities is critically important as U.S based networks are constantly scanned, targeted, and exploited by Russian state-sponsored threat actors.

The news pronounced that this advisory is continuously targetting five vulnerabilities in attacks against U.S. organizations and interests.

Not only this after knowing all the details regarding the advisory NSA said that they got the information that the Russian SVR is using the vulnerabilities to hack USA Govt. Networks.

The vulnerabilities were used against services that are being faced by the public, and the main motive of the threat actors was to obtain authentication credentials.

Once the threat actors get the details they can easily compromise the networks of US corporate and also the government networks.

Vulnerabilities Exploited

  • CVE-2018-13379: In this vulnerability, the threat actors can easily download all the files through HTTP resource requests.
  • CVE-2019-9670: This is a vulnerability of XML External Entity injection (XXE).
  • CVE-2019-11510: Through this vulnerability, the threat actors can send a specific crafted Uniform Resource Identifier (URI) so that they can perform an arbitrary file read.
  • CVE-2019-19781: This is a Directory traversal vulnerability, and it generally enables the threat actors to perform the arbitrary code.
  • CVE-2020-4006: It is a command injection vulnerability, that enables and threat actors to execute commands with unrestricted dues on the operating system.

Mitigation

Some mitigations were mentioned by the experts in this joint advisory, and here they are mentioned below:-

  • Always, keep the systems updated and patch soon after the patches are released.
  • Remember to disable external management abilities so that you can easily set up the management network.
  • Always, allow the robust logging of Internet-facing services and authentication functions.
  • Remember to block expire or redundant protocols that are present at the network edge and break them in device configurations.

The cybersecurity experts declared that the joint advisory clearly pronounces that the Russian SVR has been using a proper mixture of these vulnerabilities in their attacks.

However, the analysts have suggested that every administrator must install the security updates that are being associated with the updates as soon as possible. 

Moreover, the mitigations that were mentioned above should be maintained and followed carefully by the administrators. Not only this but the NSA, CISA, and FBI have recognized all partners of private as well as public sectors for inclusive and collaborative efforts.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity, and hacking news updates.

Balaji

BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Recent Posts

Critical TP-Link DHCP Vulnerability Let Attackers Execute Arbitrary Code Remotely

A critical security flaw has been uncovered in certain TP-Link routers, potentially allowing malicious actors…

10 hours ago

Chinese SilkSpecter Hackers Attacking Black Friday Shoppers

SilkSpecter, a Chinese financially motivated threat actor, launched a sophisticated phishing campaign targeting e-commerce shoppers…

14 hours ago

Cybercriminals Launch SEO Poisoning Attack to Lure Shoppers to Fake Online Stores

The research revealed how threat actors exploit SEO poisoning to redirect unsuspecting users to malicious…

14 hours ago

Black Basta Ransomware Leveraging Social Engineering For Malware Deployment

Black Basta, a prominent ransomware group, has rapidly gained notoriety since its emergence in 2022…

14 hours ago

Critical Laravel Vulnerability CVE-2024-52301 Allows Unauthorized Access

CVE-2024-52301 is a critical vulnerability identified in Laravel, a widely used PHP framework for building…

15 hours ago

4M+ WordPress Websites to Attacks, Following Plugin Vulnerability

A critical vulnerability has been discovered in the popular "Really Simple Security" WordPress plugin, formerly…

17 hours ago