France Says Russian State Hackers Targeted IT Monitoring Firm Centreon's Servers in Years-Long Campaign (zdnet.com) 24
France's cyber-security agency said that a group of Russian military hackers, known as the Sandworm group, have been behind a three-years-long operation during which they breached the internal networks of several French entities running the Centreon IT monitoring software. From a report: The attacks were detailed in a technical report released today by Agence Nationale de la Securite des Systemes d'Information, also known as ANSSI, the country's main cyber-security agency. "This campaign mostly affected information technology providers, especially web hosting providers," ANSSI officials said today. "The first victim seems to have been compromised from late 2017. The campaign lasted until 2020." The point of entry into victim networks was linked to Centreon, an IT resource monitoring platform developed by French company CENTREON, and a product similar in functionality to SolarWinds' Orion platform. ANSSI said the attackers targeted Centreon systems that were left connected to the internet. The French agency couldn't say at the time of writing if the attacks exploited a vulnerability in the Centreon software or if the attackers guessed passwords for admin accounts. However, in the case of a successful intrusion, the attackers installed a version of the P.A.S. web shell and the Exaramel backdoor trojan, two malware strains that when used together allowed hackers full control over the compromised system and its adjacent network.
Is English not your first language? (Score:3)
I can’t see how, otherwise, you managed to miss the very first word in both the title and the summary.
lol there's those pesky Russian hackers again (Score:1)
Re: (Score:1)
Re:lol there's those pesky Russian hackers again (Score:5, Funny)
Re: (Score:1)
Their bots do just fine there.
Re: (Score:2)
Not a single smartphone, computer or even OS produced in Russia. I find it hard to believe that servers in such advanced IT countries as France or US could be overtaken by the run-of-the-mill juveniles.
Really? Your argument is that Russia, one of the few countries which has gone all-in on mathematics education, is too dumb to figure out how to hack targets in other countries?
Yep (Score:5, Insightful)
I came in here expecting to find posts written by Russians saying "nothing to see here", and I wasn't disappointed.
Re: (Score:2)
I came in here expecting to find posts written by Russians saying "nothing to see here", and I wasn't disappointed.
Well, that's their job, isn't it?
At least, that's what I saw when there was news about the CIA hacking foreign companies or NSA spying on everyone.
It's on! (Score:5, Interesting)
I was about to dismiss this story as "ok, yet another compromise of corporate Windows networks", but this does not seem to be the case here. The targeted system here is Centreon [centreon.com], a CentOS (i.e. linux) based network monitoring tool. In my opinion this attack is nothing like the SolarWinds attack:
BTW for all those, who were turned away by the french summary [ssi.gouv.fr] of the report: The full report [ssi.gouv.fr] is in English language.
Re: (Score:2)
For those wondering, the entry point was the Centreon proprietary Web application. While it is running on CentOS, it wasn't an operating system vulnerability that was exploited. It was yet another poorly written Web application.
Re: (Score:2)
They aren't even sure yet, whether the web application was buggy, or whether the admins just picked an easily guessable password. Whatever happened: such a web app shouldn't have been accessible from the outside anyway, therefore I would point my finger primarily at incompetent admins.
Re: (Score:2)
This tells me, that the primary target of this attack were imbeciles running the software, not professionals.
You say that like there is any meaningful difference between "imbeciles" and "professionals". 10 years or so ago, I had found several thousands public-facing unprotected JMX consoles through a simple google search. Those included servers at the JPL. For fun, I tried again 5 year ago and there were still plenty. I wonder how many are left in 2020. I do know there are companies out there still running older jboss configurations (they either never upgraded from 4.x days or carried over the configurations from
Re:How are they so sure? (Score:4, Informative)
Look at these cyber-ranking results : https://www.statista.com/stati... [statista.com]
Your comment just makes you look like a Russian shill.
Re: (Score:2)
Key for me,IT Monitoring Firm (Score:2)
Your running a lousy IT company! And your Leadership and Management sucks!
Enough with the zdnet neocon cyber BS (Score:1, Interesting)