NSA flags email vulnerability
Russian hackers have been taking advantage of a vulnerability in a commonly used email delivery software that gives hackers the ability to turn off network security, add privileged users and enable remote connections and subsequent penetrations, the National Security Agency says.
Since at least August of last year, Russian hackers have been taking advantage of a longstanding vulnerability in a commonly used email delivery software, according to the National Security Agency.
The flaw, which NSA said allows "pretty much any attacker’s dream access," gives hackers the ability to turn off network security, add privileged users and enable remote connections and subsequent penetrations.
A Russian military intelligence team called Sandworm is responsible, NSA said, for leveraging a flaw in the Exim Mail Transfer Agent software – a program widely used in Unix-based email systems.
The vulnerability was introduced in a June 2019 update, NSA said, and was remediated in the most recent version of the software. The remote code execution allows an unauthenticated remote attacker to send “a specially crafted email to execute commands with root privileges allowing the attacker to install programs, modify data, and create new accounts,” NSA explained in an advisory.
An estimate from last October indicated that Exim was in use in almost 500,000 email servers worldwide, and was by far the most widely used software of its type.
Exim had been publicly urging users to update even before NSA revealed the exploitation of the flaw. NSA advised administrators to conduct checks for prior exploitation on their networks and look for unauthorized accounts or remote access authorizations.
Sandworm, an element of Russia's GRU, has been blamed for the devastating NotPetya cyberattack that crippled the systems of global shipping firm Maersk and cost global firms upward of $1 billion in mitigation and recovery costs. Sandworm has also been linked to efforts to compromise the mobile operating system Android and attempts to target the U.S. electrical grid.
The group was also called out in a Feb. 20 statement by the Department of State for a cyberattack that disrupted government websites and broadcast television in the Republic of Georgia.
"This action contradicts Russia's attempts to claim it is a responsible actor in cyberspace and demonstrates a continuing pattern of reckless Russian GRU cyber operations against a number of countries," Secretary of State Mike Pompeo said at the time.
This article was first posted on FCW, a Defense Systems partner site.