Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

5/28/2021
12:03 PM
Connect Directly
Twitter
LinkedIn
RSS
E-Mail
50%
50%

SolarWinds Attackers Impersonate USAID in Advanced Email Campaign

Microsoft shares the details of a wide-scale malicious email campaign attributed to Nobelium, the group linked to the SolarWinds supply chain attack.

The group behind last year's SolarWinds supply chain attack is conducting an advanced and widespread email campaign that delivers malicious links while impersonating the US Agency for International Development (USAID), Microsoft reports.

Related Content:

Stopping the Next SolarWinds Requires Doing Something Different

Special Report: Assessing Cybersecurity Risk in Today's Enterprises

New From The Edge: How Are Cyber Insurance Companies Assessing Ransomware Risk?

Microsoft's Threat Intelligence Center (MSTIC) says it has been tracking this Nobelium-operated campaign since January 2021 and it has evolved as the group experiments with new tactics. The phishing attack has so far targeted some 3,000 accounts at more than 150 organizations across several industry verticals. The victims span 24 countries, though most attacks aimed at the US.

Nobelium, a group connected to Russia, has historically targeted organizations, non-governmental organizations, think tanks, military, IT service providers, health technology and research, and telecommunications providers. In this case, Microsoft reports at least a quarter of targets work with international development, humanitarian, and human rights work.

Its newest campaign leverages Constant Contact, a legitimate mass-mailing service used for email marketing. Due to a high volume of emails distributed in this campaign, automated email threat detection marked many of the malicious emails as spam. However, some automated detection systems may have effectively delivered them due to configuration and policy settings.

Microsoft reports the attackers were able to gain control of the USAID Constant Contact account, allowing them to send seemingly authentic emails from USAID to thousands of victims. There were many iterations in the May 25 campaign; in one example, emails appear to come from USAID but have an authentic sender email address that matches Constant Contact.

"Nobelium launched this week's attacks by gaining access to the Constant Contact account of USAID," wrote Tom Burt, corporate vice president for consumer security and trust at Microsoft, in a blog post. Burt noted Microsoft is in the process of notifying targeted customers and there is no indication these attacks use an exploit against, or flaw in, Microsoft products and services.

Use of Constant Contact allowed attackers to hide links behind the mailing service's URL. Officials note many emails and document service providers offer a tool to simplify link sharing and provide information into who clicks these links and when.

When clicked, the email's malicious link leads to delivery of an ISO file that contains a malicious LNK file, a malicious DLL file, and a legitimate lure referencing foreign threats to the 2020 US federal elections, Volexity researchers explain in a blog post on the threat published this week. Microsoft notes the DLL is a custom Cobalt Strike Beacon loader that it calls NativeZone.

If successfully deployed, these payloads let attackers remain persistent on compromised systems so they can move laterally, steal data, deploy additional malware, and infect other machines on the network.

"Microsoft security researchers assess that the Nobelium's spearphishing operations are recurring and have increased in frequency and scope," MSTIC wrote in a separate blog post sharing the details of this attack, as well as its evolution and mitigations. "It is anticipated that additional activity may be carried out by the group using an evolving set of tactics."

A Closer Look At Nobelium's Strategy
This active campaign is notable for a few reasons, Burt explained. When considered along with the SolarWinds attack, it's clear Nobelium aims to breach trusted technology providers and infect their customers.

"By piggybacking on software updates and now mass email providers, Nobelium increases the chances of collateral damage in espionage operations and undermines trust in the technology ecosystem," Burt wrote.

While different from the attack on SolarWinds, this campaign underscores the consistency of cyber espionage. SolarWinds was notable for its stealth and discipline, but loud and widespread spear-phishing attacks were once a "calling card" of SVR operators who launched noisy phishing campaigns, says John Hultquist, vice president of analysis for Mandiant Threat Intelligence, who adds these attacks by Russia's Foreign Intelligence Service often effectively gained access to major government offices and other targets.

"And while the spear-phishing emails were quickly identified, we expect that any post-compromise actions by these actors would be highly skilled and stealthy," he points out. This newly identified campaign seems to have ramped up as the supply chain attacks were winding down, a sign these threats aren't going away any time soon.

"Given the brazen nature of this incident," Hultquist says, "it does not appear the SVR is prepared to throttle down on their cyberespionage activity."

Kelly Sheridan is the Staff Editor at Dark Reading, where she focuses on cybersecurity news and analysis. She is a business technology journalist who previously reported for InformationWeek, where she covered Microsoft, and Insurance & Technology, where she covered financial ... View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-37759
PUBLISHED: 2021-07-31
A Session ID leak in the DEBUG log file in Graylog before 4.1.2 allows attackers to escalate privileges (to the access level of the leaked session ID).
CVE-2021-37760
PUBLISHED: 2021-07-31
A Session ID leak in the audit log in Graylog before 4.1.2 allows attackers to escalate privileges (to the access level of the leaked session ID).
CVE-2020-26564
PUBLISHED: 2021-07-31
ObjectPlanet Opinio before 7.15 allows XXE attacks via three steps: modify a .css file to have <!ENTITY content, create a .xml file for a generic survey template (containing a link to this .css file), and import this .xml file at the survey/admin/folderSurvey.do?action=viewImportSurvey['importFil...
CVE-2020-26565
PUBLISHED: 2021-07-31
ObjectPlanet Opinio before 7.14 allows Expression Language Injection via the admin/permissionList.do from parameter. This can be used to retrieve possibly sensitive serverInfo data.
CVE-2020-26806
PUBLISHED: 2021-07-31
admin/file.do in ObjectPlanet Opinio before 7.15 allows Unrestricted File Upload of executable JSP files, resulting in remote code execution, because filePath can have directory traversal and fileContent can be valid JSP code.