Russian Cyber Espionage Attack

Released: Sep 09, 2024


Critical Severity

Atlassian, Microsoft, Redhat, Sophos Vendor

Round-up Type


Russia's Cyber Unit Targets Global Infrastructure

FortiGuard Labs continues to observe attack attempts exploiting the vulnerabilities highlighted in the recent CISA advisory about Russian military cyber actors. These actors are targeting U.S. and global critical infrastructure to conduct espionage, steal data, and compromise or destroy sensitive information. Learn More »

Background

Unit 29155 cyber actors are known to target critical infrastructure and key resource sectors, including the government services, financial services, transportation systems, energy, and healthcare sectors of NATO members, the EU, Central American, and Asian countries since 2020.

CISA's analysis concluded Unit 29155 cyber actors had exploited multiple CVEs for initial access. These CVEs primarily involve remote code execution, authentication bypass, privilege escalation, and buffer overflow issues affecting products and software such as Dahua IP Cameras, Atlassian Confluence Server and Data Center, and Sophos Firewall Vulnerabilities.

According to the advisory, to date, the FBI has observed more than 14,000 instances of domain scanning across at least 26 NATO members and several additional European Union (EU) countries.

Latest Development

Recent news and incidents related to cybersecurity threats encompassing various events such as data breaches, cyber-attacks, security incidents, and vulnerabilities discovered.


Fortinet Customers remain protected by the FortiGuard IPS (Intrusion Prevention System) Security Service that can detect and block exploit attempts targeting the vulnerabilities listed in the CISA's advisory and has protections against known malware used in the campaigns. Please see the Solution Tab for full list of available protections.

FortiGuard Cybersecurity Framework

Mitigate security threats and vulnerabilities by leveraging the range of FortiGuard Services.


PROTECT
  • AV

  • Vulnerability

  • AV (Pre-filter)

  • IPS

  • Web App Security

  • IoT/IIoT Virtual Patch

DETECT
  • IOC

  • Outbreak Detection

  • Threat Hunting

RESPOND
  • Automated Response

  • Assisted Response Services

RECOVER
  • NOC/SOC Training

  • End-User Training

IDENTIFY
  • Vulnerability Management

  • Attack Surface Hardening

  • Attack Surface Monitoring (Inside & Outside)

Threat Intelligence

Information gathered from analyzing ongoing cybersecurity events including threat actors, their tactics, techniques, and procedures (TTPs), indicators of compromise (IOCs), malware and related vulnerabilities.


Loading ...

Indicators of compromise Indicators of compromise
IOC Threat Activity

Last 30 days

Chg

Avg 0