Significant Cyber Event (SCE) Intelligence Report – Nobelium
Deepwatch is currently tracking and responding to Microsoft’s report regarding the Nobelium threat actor group. Nobelium is the threat actor behind the Solarwinds campaign, including Sunburst and Teardrop. Currently and traditionally, Nobellium has targeted government agencies, think tanks, consultants, and non-governmental organizations. During the current campaign, Microsoft has identified more than 150 organizations in 24 countries that have been targeted.
As in prior campaigns, the threat actors were able to compromise a legitimate service; this time it was USAID’s Constant Contact account. Constant Contact is a mass email marketing solution. Once they had control of the account, they were able to conduct targeted spear phishing campaigns that contained a malicious payload which would create a backdoor on the victim’s machine. The attackers could then pivot to data theft or further entrench themselves in the victim’s network.
As mentioned above, information is limited on the full scope of the attacks and as more information is made available, Deepwatch will review and provide you with an update. For the complete technical analysis, Deepwatch refers you to Microsoft’s report.
What can you do?
Deepwatch recommends that you immediately update your defense-in-depth technologies and signatures to provide you with the most up-to-date protections. We also highly encourage enabling Two-Factor Authentication (2FA) at a minimum, and Multi-Factor Authentication (MFA) preferably where appropriate.
In addition to this, Deepwatch recommends the following:
- Update your anti-virus and Endpoint Detection & Response (EDR) to the latest signatures.
- Log PowerShell activity from all Microsoft devices.
- Quarantine or block all compression extensions and the compromised email addresses on your Security Email Gateway.
- Review critical access groups to ensure only the appropriate personnel have access to critical systems and applications.
- Enable data loss prevention mechanisms to monitor and block unauthorized file transfers.
- Log web facing applications.
- Review your logging standards to ensure Deepwatch is receiving all of your critical logs (e.g. Security Email Gateway, Web Application Firewalls, PowerShell, CLI, etc.).
What is Deepwatch doing?
- Managed Detection & Response team is conducting a review for all customers who are currently sending network and email gateway logs to Splunk.
- Deepwatch is performing a year-to-date analysis of associated Indicators of Compromise (IOCs) across the customer base to identify potential targets.
- Detection Engineering is updating the emerging threat rules to include relevant IOCs.
- Deepwatch’s Managed EDR and Firewall teams are evaluating IOCs to ensure that they are loaded into the security platform of choice.