UPDATED 20:06 EST / FEBRUARY 15 2021

SECURITY

Russian Sandworm hackers linked to attacks on French IT providers

The French National Agency for the Security of Information Systems has publicly attributed a range of attacks that targeted multiple information technology providers in France to Russia’s Sandworm group.

A technical report released in late January by the agency, also known as ANSSI, details a campaign that ran from 2017 to 2020. It exploited a vulnerability in Centreon, a French IT resource monitoring platform that’s similar to the SolarWinds Worldwide LLC Orion platform that was famously compromised last year.

Centreon, while also offering services in North America, is popular among French companies and is also extensively used by the French government. Known Centreon customers include Airbus SE, Air France KLM S.A., Agence France-Presse, Euronews, Orange S.A., Arcelor Mittal S.A. and Sephora.

Upon gaining access via systems where Centreon was left connected to the internet, the attackers installed a version of the so-called P.A.S. web shell and the Exaramel backdoor trojan virus. ZDNet today described the pair as two malware strains that when used together allow hackers to gain full control of the compromised system and its adjacent network.

The involvement of Sandworm is not surprising. The U.S. National Security Agency issued a warning in May that Russian military hackers, the Sandworm Team, had been exploiting a known vulnerability in email servers since at least August 2019. In October, the Department of Justice indicated six Russians were related to Sandworm.

The Justice Department indictment said the Sandworm members are employed by Unit 74455 of the Russian Main Intelligence Directorate, a military intelligence agency of the General Staff of the Armed Forces. Also known as APT 28 and Fancy Bear, the group has been linked to a wide range of attacks.

In August 2017 it was reported that APT 28 was using U.S. National Security Agency leak exploits to target high-profile hotel guests. MacOS malware discovered in February 2017 was also linked to the same group. In August 2018, Microsoft Corp. shut down some domains used by the group, but it was equivalent to swatting a few flies in a swarm. Sandworm was also linked to a hack that targeted the Pyeongchang Winter Olympics, the 2017 French elections and the NotPetya ransomware attacks.

Photo: Pixabay

A message from John Furrier, co-founder of SiliconANGLE:

Support our mission to keep content open and free by engaging with theCUBE community. Join theCUBE’s Alumni Trust Network, where technology leaders connect, share intelligence and create opportunities.

  • 15M+ viewers of theCUBE videos, powering conversations across AI, cloud, cybersecurity and more
  • 11.4k+ theCUBE alumni — Connect with more than 11,400 tech and business leaders shaping the future through a unique trusted-based network.
About SiliconANGLE Media
SiliconANGLE Media is a recognized leader in digital media innovation, uniting breakthrough technology, strategic insights and real-time audience engagement. As the parent company of SiliconANGLE, theCUBE Network, theCUBE Research, CUBE365, theCUBE AI and theCUBE SuperStudios — with flagship locations in Silicon Valley and the New York Stock Exchange — SiliconANGLE Media operates at the intersection of media, technology and AI.

Founded by tech visionaries John Furrier and Dave Vellante, SiliconANGLE Media has built a dynamic ecosystem of industry-leading digital media brands that reach 15+ million elite tech professionals. Our new proprietary theCUBE AI Video Cloud is breaking ground in audience interaction, leveraging theCUBEai.com neural network to help technology companies make data-driven decisions and stay at the forefront of industry conversations.