Author:
Kaustubh Jagtap, Product Marketing Director, SafeBreach
On September 5th, the Federal Bureau of Investigation (FBI), Cybersecurity and Infrastructure Security Agency (CISA), and National Security Agency (NSA) issued an urgent advisory warning security teams about efforts undertaken by threat actors affiliated with Russia’s General Staff Main Intelligence Directorate (GRU) 161st Specialist Training Center (Unit 29155). Detailed information about this threat and the associated IOCs and TTPs can be seen on Russian Military Cyber Actors Target US and Global Critical Infrastructure.
This blog will share an overview of the threat and our coverage for these threat actors. As a SafeBreach customer, you will have access to all the attacks listed below and more to validate your organizational security controls against these state-sponsored threat actors.
GRU Unit 29155 is well known for carrying out cyber attacks with the sole purpose of espionage, sabotage, and reputational harm from at least 2020. In early 2022, they began deploying the destructive WhisperGate malware against Ukrainian organizations in an attempt to disable critical infrastructure at the start of the regional conflict. This group operates independently of other known GRU units 26165 and 74455. This advisory is intended to warn organizations and entities across United States and its international partners against the potential threat from Unit 29155 which has been previously responsible for attempted coups, sabotage and influence operations, and assassination attempts throughout Europe. Additionally, this group is known to collect data for espionage purposes, causing reputational harm (via data leaks), and sabotage (via destruction of stolen data). The FBI believes that Unit 29155 threat actors also rely on non-GRU threat groups to conduct their malicious operations.
GRU Unit 29155 is also known by the following names:
The group has continually targeted several NATO and non-NATO members in Europe and North America, in addition to other countries in Latin America, and Central Asia. These attacks include website defacements, infrastructure scanning, data exfiltration, and data leak operations. Since the beginning of the Ukrainian conflict in 2022, Unit 29155 has been responsible for disrupting efforts to provide aid to Ukraine by targeting critical infrastructure sectors including government services, financial services, transportation systems, energy, and healthcare.
Reconnaissance – According to the information available, Unit 29155 leverages several publicly available tools (see below) to scan victim networks for IP addresses that can potentially grant them access into the network:
They typically enumerate the victims’ Active Directory (AD), looking for active devices and searching for vulnerabilities on these devices to further their goals. Unit 29155 also leverages common red teaming techniques and publicly available tools to conduct cyber operations.
Initial Access – VPNs are typically used to anonymize their presence and Unit 29155 constantly attempt to exploit weaknesses in internet-facing systems by targeting the unpatched vulnerabilities, including:
Lateral Movement – Unit 29155 uses the Shodan search engine to scan for vulnerable IoT devices and leverages exploitation scripts to authenticate to IP Cameras with default usernames and passwords and exfiltrate image files. Additionally, they attempt to perform remote command execution (RCE) on vulnerable IP cameras to extract and dump configuration settings and credentials.
Command and Control (C&C) – Unit 29155 uses Virtual Private Servers (VPSs) to hide their location and host operational tools that enable the threat group to perform recon, exploit victim infrastructure, and exfiltrate stolen data. Once an exploit is successful on a victim network, a Meterpeter payload is used to initiate communication with C&C infrastructure.
Exfiltration of Stolen Data – Stolen data from the victims is compressed and exfiltrated using the command line utility, Rclone and sent to the threat actors’ remote storage location. Unit 29155 have been observed exfiltrated Windows processes and artifacts, such as Local Security Authority Subsystem Service (LSASS) memory dumps, Security Accounts Manager (SAM) files, and SECURITY and SYSTEM event log files.
As soon as details were made available, the SafeBreach Labs team mapped existing attacks in the Hacker’s Playbook to this US-CERT alerts immediately. It is important to note that existing SafeBreach customers already had a comprehensive level of coverage against the tactics and techniques leveraged by the Fox Kitten threat group identified in the advisory. Please run/re-run the attacks listed below to ensure your environments are protected against these TTPs.
New IOC-Based Playbook Attacks Related to AA24-249A (Unit 29155)
Existing IOC-Based Playbook Attacks Related to AA24-249A (Unit 29155)
Existing Behavioral Playbook Attacks Related to AA24-249A (Unit 29155)
SafeBreach customers can now validate their security controls against these TTPs in multiple ways.
Method 1 – You can go to the “SafeBreach Scenarios” page and choose the AA24-249A (Unit 29155), customize scenario, and run it.
Method 2 – From the Attack Playbook, select and filter attacks related to AA24-249A (Unit 29155). Additionally, you can refer to the list above as well to ensure a comprehensive level of coverage.
Method 3 – From the Known Attack Series report, select the US-CERT Alert AA24-249A (Unit 29155) report and select Run Simulations, which will run all attack methods.
NOTE – FBI, CISA, and NSA recommend continually validating your security program, at scale, in a production environment to ensure optimal performance against growing threat of advanced cyber threats. Additional recommendations can be seen in the advisory (linked below):
Additional References: