The Russian Foreign Intelligence Service (SVR) continues to exploit five publicly known cyber vulnerabilities, the National Security Agency, Cybersecurity and Infrastructure Security Agency and FBI said in a  last week. 

鈥淚n addition to compromising the SolarWinds Orion software supply chain, recent SVR activities include targeting COVID-19 research facilities via WellMess malware and targeting networks through the VMware vulnerability disclosed by NSA,鈥 the advisory states. 

At a briefing yesterday, the government also expressed concerns about vulnerabilities in the  virtual private network, including one recent vulnerability for which a patch will be issued in May. Meanwhile, Pulse Connect has released a tool (https://kb.pulsesecure.net/pkb_mobile#article/l:en_US/KB44755/s) to help customers check the integrity of their product installations. 

John Riggi, AHA senior advisor for cybersecurity and risk, said, 鈥淚n an ongoing pattern since 2019, it appears the SVR and other hostile nation-states are continuing to target VPN infrastructure and collaboration platforms 鈥 which are ubiquitous and critical for information flow and business continuity, especially in the age of the COVID remote-work environment. Our adversaries have adopted a multi-prong cyber espionage strategy that focuses on not only stealing data while at rest in databases but also intercepting it while in transit between databases, organizations and remote users. With expanded remote access to networks, comes an expanded attack surface. Implementing the recommended patches as soon as possible will help reduce that risk.鈥   

For more information on this or other risk issues, contact Riggi at jriggi@aha.org
 

Related News Articles

Headline
The Cybersecurity and Infrastructure Security Agency April 17 released guidance to reduce risks associated with a reported breach of Oracle cloud services.鈥
Headline
The National Counterintelligence and Security Center, the FBI, and the Defense Counterintelligence and Security Center yesterday released guidance on鈥
AHA Cyber Intel
While the rate of cyberattacks on hospitals has risen dramatically, the severity of the impacts has also grown exponentially. Let鈥檚 look at the state of cyber鈥
Headline
The House Energy and Commerce Oversight and Investigations Subcommittee April 1 discussed cybersecurity threats in legacy medical devices during a hearing. The鈥
Headline
The Trump Administration March 28 announced that it renewed for one year the public emergency for ongoing malicious cyber-enabled activities against the U.S.鈥
Headline
The FBI March 26 advised that, after extensive investigation and intelligence review, they have not identified any specific credible threat targeted against鈥