The US National Security Agency (NSA) today issued a warning about a new wave attacks in cyberspace against email servers. The attacks were carried out by one of Russia's most advanced spy units.
The NSA reports that members of Unit 74455 of the GRU Main Center for Special Technologies, a division of Russia's military intelligence service, attacked email servers running Exim mail transfer agent (MTA).
The team, also known as "Sandworm", has been attacking Exim servers since August 2019, taking advantage of a critical vulnerability (CVE-2019-10149), the NSA said in a security alert [PDF] announced today.
“When Sandworm exploits CVE-2019-10149, the victim's system downloads and runs a shell script from a Sandworm-controlled domain,” the NSA says.
This shell script I will:
- Add privileged users
- Disable network security settings
- Update SSH settings to allow remote access
- Run an additional script to allow further exploits
The NSA is now warning private and government organizations to update Exim servers to version 4.93 and look for signs infringements. Breach indicators are in the PDF released by the NSA.
The Sandworm group has been active since the mid-2000s and is believed to be the hacker group that developed the BlackEnergy malware that caused blackouts in Ukraine in December 2015. In December 2016 and the team developed the famous ransomware NotPetya which caused billions of dollars in losses to companies around the world.
Vulnerability CVE-2019-10149 was unveiled in June 2019 and has the code name "Return of the WIZard".
Within a week of its revelation, various hacking groups began using it. Two weeks later, Microsoft also issued a warning at the time, warning Azure customers.
Almost half of all Internet email servers run on Exim. According to statistics as of May 1, 2020, only half of these Exim servers have been updated to version 4.93 or later, leaving a large number of systems vulnerable to attack.