Today's cybersecurity headlines are brought to you by ThreatPerspective


Ethical Hacking News

Russia's Mass Scanning for Vulnerabilities: A Global Cybersecurity Threat



Russia's aggressive scanning for vulnerabilities poses a significant threat to organizations worldwide, with the US National Security Agency and UK National Cyber Security Centre urging immediate action to bolster cyber defenses. According to the joint advisory, APT29 is exploiting known vulnerabilities across the globe, including those in Cisco iOS software and JetBrains TeamCity software. Organizations must prioritize patching habits and implementing robust cybersecurity measures to protect themselves against this global threat.

  • Russia has been actively scanning the globe for vulnerabilities in systems.
  • The APT29 group, linked to the SVR, is behind this campaign and targets unpatched vulnerabilities.
  • A list of 24 known vulnerabilities has been identified by the Russians, some of which are publicly disclosed.
  • Remedies include configuring systems properly, disabling unnecessary services, and baselining devices to identify irregularities.
  • The US and UK governments have issued a joint advisory urging organizations to take immediate action and prioritize cybersecurity measures.



  • Russia has been actively scanning systems across the globe, exploiting known vulnerabilities to gain access to sensitive information. According to a joint advisory released by the US National Security Agency, FBI, Cyber National Mission Force, and UK National Cyber Security Centre (NCSC), Russian hackers linked to the Foreign Intelligence Service (SVR) have been aggressively searching for targets of opportunity.

    The APT29 group, notorious for its role in the SolarWinds hack, is behind this latest campaign. The joint advisory warns that these cyber operators consistently scan Internet-facing systems for unpatched vulnerabilities, which increases the threat surface to virtually any organization with vulnerable systems.

    A list of 24 CVEs (Common Vulnerabilities and Exposures) has been identified by the Russians, some of which are well-known vulnerabilities such as Cisco iOS software's privilege escalation bug (CVE-2023-20198) and JetBrains TeamCity software's vulnerability (CVE-2023-42793). These vulnerabilities have been publicly disclosed, making them easily exploitable.

    The advisory also highlights potential remedies for reducing one's attack surface. These include properly configuring systems to eliminate unnecessary open ports or default credentials, disabling internet-accessible services on everything that doesn't need it, and baselining all devices to identify irregularities.

    The US National Security Agency, FBI, Cyber National Mission Force, and UK National Cyber Security Centre have issued a joint advisory urging organizations to take immediate action. The NCSC director of operations Paul Chichester stated, "All organisations are encouraged to bolster their cyber defences: take heed of the advice set out within the advisory and prioritise the deployment of patches and software updates."

    This mass scanning and opportunistic exploitation of vulnerable systems is a serious threat that cannot be ignored. Organizations must prioritize patching habits and implementing robust cybersecurity measures to protect themselves against this global threat.



    Related Information:

  • https://go.theregister.com/feed/www.theregister.com/2024/10/12/russia_is_targeting_you_for/

  • https://nvd.nist.gov/vuln/detail/CVE-2023-20198

  • https://www.cvedetails.com/cve/CVE-2023-20198/

  • https://nvd.nist.gov/vuln/detail/CVE-2023-42793

  • https://www.cvedetails.com/cve/CVE-2023-42793/


  • Published: Fri Oct 11 22:27:25 2024 by llama3.2 3B Q4_K_M













         


    © Ethical Hacking News . All rights reserved.

    Privacy | Terms of Use | Contact Us