The Justice Department announced it has seized domains Russian hackers responsible for the SolarWinds attack used in a phishing scheme last month targeting governments and organizations through mimicking the United States Agency for International Development.
The US Department of Justice announced Tuesday that it has seized two domains used in a phishing campaign to send malicious messages to thousands of potential victims by targeting a marketing firm used by USAID. #cybersecurity https://t.co/Sac7W08ngZ
— Tony Morbin (@tonymorbin) June 2, 2021
Prosecutors said in a statement Tuesday that they seized two domains on Friday that Russia-linked Nobelium hacker group had used as part of its wide-scale attack targeting some 3,000 individual accounts across more than 150 governments, think tanks and organizations.
The scheme, uncovered by Microsoft on Thursday, involved gaining access to the Constant Contact email service of the USAID from which the hackers sent malicious links through authentic-looking government emails to their targets.
When the links were clicked, a malicious file would download a so-called back door onto the computer offering the hackers access to its information and that of other computers on its network.
Microsoft said most of the emails distributed were blocked by email threat detention systems and marked as spam though some may have been delivered.
The Justice Department said it seized theyardservice.com and worldhomeoutlet.com through a court order with the aim to disrupt Nobelium's activities and identify victims, though prosecutors state the hackers may have deployed other backdoors between the initial attack, which began May 25, and Friday's seizure.
Justice Department seizes domains used in Nobelium-USAID phishing campaign https://t.co/mKN9fRsHgc
— Symmetrical Data Security, LLC. (@SymDataSec) June 2, 2021
The US Justice Department announced on Tuesday that it has seized two command-and-control and malware distribution domains that were used as part of a re… https://t.co/jzzupZ4vbm
"Last week's action is a continued demonstration of the department's commitment to proactively disrupt hacking activity prior to the conclusion of a criminal investigation," said Assistant Attorney General John Demers of the department's National Security Division.
This article has been adapted from its original source.
