FBI Accessing Private Servers to Subvert Cyberattacks
WASHINGTON — In a covert operation to undercut hacking groups’ attempts to exploit vulnerabilities in Microsoft’s Exchange email program, the FBI has begun accessing hundreds of vulnerable computers in the United States to remove malicious web shells.
Web shells, interfaces that grant control over a web server by implementing arbitrary code executions, can be uploaded to servers to enable remote access to hackers. From January to February 2021, hackers began exploiting previously unknown vulnerabilities in Microsoft Exchange Server software to access e-mail accounts and place web shells.
“The FBI conducted the removal by issuing a command through the web shell to the server, which was designed to cause the server to delete only the web shell [identified by its unique file path],” officials from the Department of Justice said in a written statement.
The hacking of Microsoft’s software is believed to have been carried out by a team from the Russian Foreign Intelligence Service to gain a backdoor into SolarWinds programs, TWN previously reported.
Top cybersecurity experts sounded alarm bells once news of the hacking broke, likely prompting the court-authorized FBI operation to delete the harmful code. In retaliation to the hack, the White House expelled 10 Russian diplomats from the country, although cybersecurity experts have signaled the need to ramp up the industry workforce and educational pipeline to prevent future cyberattacks.
“This operation is an example of the FBI’s commitment to combating cyber threats through our enduring federal and private sector partnerships,” Tonya Ugoretz, acting assistant director of the FBI’s Cyber Division, said in a written statement. “Our successful action should serve as a reminder to malicious cyber actors that we will impose risk and consequences for cyber intrusions that threaten the national security and public safety of the American people and our international partners. The FBI will continue to use all tools available to us as the lead domestic law enforcement and intelligence agency to hold malicious cyber actors accountable for their actions.”
Because of the swift and clandestine nature of the operation, the owners of affected Microsoft Exchange servers could be left unaware of the FBI’s actions on their networks. In the Justice Department’s release announcing the operation, the agency said the FBI is “attempting to provide notice” to the owners or operators of the computers.
Although the FBI’s operation succeeded in eliminating malicious web shells, it did not patch any Microsoft Exchange Server vulnerabilities or search for additional malware or hacking tools left behind by cyberattacks. The Justice Department strongly encourages network defenders to review Microsoft’s remediation guidance on detection and patching, the agency said in a release.
“Combating cyber threats requires partnerships with private sector and government colleagues,” Acting U.S. Attorney Jennifer Lowery of the Southern District of Texas said in a written statement. “This court-authorized operation to copy and remove malicious web shells from hundreds of vulnerable computers shows our commitment to use any viable resource to fight cyber criminals. We will continue to do so in coordination with our partners and with the court to combat the threat until it is alleviated, and we can further protect our citizens from these malicious cyber breaches.”
In The News
“Make no mistake, our adversaries want to divide us to conquer us,” warned Erin Joe, section chief of the private sector office of the FBI, noting that nation-states like Russia, North Korea, Iran, and China are deploying daily cyberattacks against the US. Opening yesterday’s CyberSatDigital conference,... Read More
WASHINGTON -- The ongoing energy crisis created by a Russian gang’s ransomware attack late last week led the Biden administration to announce a multi-pronged strategy for confronting it on Monday. While President Biden declared an emergency, Colonial Pipeline officials said they expect to resume transporting most... Read More
Last year saw an increase of 20% in cyberattacks against organizations, said James Turgal, vice president of Optiv, during the first day of the CyberSatDigital conference. The most common attack, with over 184 million reported last year, is known as a ransomware attack - when bad... Read More
WASHINGTON — In a covert operation to undercut hacking groups’ attempts to exploit vulnerabilities in Microsoft’s Exchange email program, the FBI has begun accessing hundreds of vulnerable computers in the United States to remove malicious web shells. Web shells, interfaces that grant control over a web... Read More
WASHINGTON - As Congress continues to worry about the nation’s cybersecurity, a key high-ranking military witness during a Senate hearing Wednesday said he was “concerned about the pace” of building an adequate cybersecurity workforce. When Congress tasked the Department of Defense and military services with building... Read More
The White House on Thursday unveiled sweeping sanctions on Russia in retaliation for cyberattacks, foreign influence operations and other behavior. The measures include the expulsion of 10 Russian diplomats. The moves were announced Thursday morning in a lengthy statement from the Biden administration which for the... Read More