Security News > 2021 > May > US-UK Gov Warning: SolarWinds Attackers Add Open-Source PenTest Tool to Arsenal

US-UK Gov Warning: SolarWinds Attackers Add Open-Source PenTest Tool to Arsenal
2021-05-07 16:32

Agencies in the United States and the United Kingdom on Friday published a joint report providing more details on the activities of the Russian cyberspy group that is believed to be behind the attack on IT management company SolarWinds.

The FBI, NSA, CISA and the UK's NCSC say the Russian threat actor tracked as APT29 was behind the SolarWinds attack, which resulted in hundreds of organizations having their systems breached through malicious updates served from compromised SolarWinds systems.

The agencies previously published several other reports on the activities of the group, which they say is controlled by a Russian intelligence agency named the Foreign Intelligence Service, or SVR. The latest report shares more information on the tactics, techniques and procedures associated with the cyberspies, and also describes some of the changes made by the group in response to the previous reports.

Last year, the government agencies described APT29 operations targeting organizations in the US, UK and Canada that were involved in research and development of vaccines for the SARS‑CoV‑2 coronavirus.

"As observed with the SolarWinds incidents, SVR operators often used separate command and control infrastructure for each victim of Sliver," the agencies said.

The report also shares some information on the impact of the attack on email security firm Mimecast, which was carried out through the SolarWinds breach.


News URL

http://feedproxy.google.com/~r/Securityweek/~3/dDVgOs7Nb-E/us-uk-gov-warning-solarwinds-attackers-add-open-source-pentest-tool-arsenal

Related vendor

VENDOR LAST 12M #/PRODUCTS LOW MEDIUM HIGH CRITICAL TOTAL VULNS
Solarwinds 56 33 104 80 50 267