By Raphael Satter
WASHINGTON (Reuters) – U.S. officials say that Russian hackers are targeting servers hosting outdated versions of software made by the Czech tech company JetBrains for potential SolarWinds-style espionage operations.
In a statement, the U.S. National Security Agency, the FBI and the cyber watchdog agency CISA accused the hackers, sometimes known as Cozy Bear or APT29, of trying to hijack the servers in a bid to access software developers’ source code, something that could potentially allow them to tamper with its compilation or deployment.
A similar technique was used to doctor software made by the U.S. software firm SolarWinds, the statement noted. That cyberespionage campaign led to a wave of serious breaches across the government that were discovered in 2019.
In a statement, Prague-based JetBrains said it had fixed the vulnerability affecting its TeamCity collaborative software building tool in September and had been contacting its customers since in the hope of “motivating them to update.”
It said fewer than 2% of TeamCity instances still used unpatched software.
Programs like TeamCity – which help manage other companies’ software building process – can potentially make for ideal springboards for hackers looking to break into many different targets at once.
Securing that kind of sweeping access has been a key priority for APT29, which is alleged by Western officials and private cybersecurity companies to act on behalf of Russia’s foreign intelligence agency, the SVR, and is generally considered one of the country’s elite hacking groups.
The U.S. statement said the U.S. and its allies had identified “a few dozen compromised companies” in the United States, Europe, Asia, and Australia. It said the companies had little in common except that they had outdated and vulnerable versions of JetBrains exposed to the internet, suggesting the hacks were “opportunistic in nature and not necessarily a targeted attack.”
It urged companies to update their software.
The statement was co-signed by Britain’s National Cyber Security Centre as well as Poland’s Military Counterintelligence Service and its Computer Emergency Response Team.
(Reporting by Raphael Satter; Editing by Jonathan Oatis and Daniel Wallis)