The Russian Foreign Intelligence Service (SVR), also identified as Advanced Persistent Threat 29 (APT 29), has been found exploiting a critical vulnerability in JetBrains TeamCity software on a global scale since September 2023. This alarming revelation comes from a joint assessment by notable entities including the U.S. Federal Bureau of Investigation (FBI), the U.S. Cybersecurity & Infrastructure Security Agency (CISA), and the U.K.'s National Cyber Security Centre (NCSC).
"Russian Foreign Intelligence Service (SVR) cyber actors are utilizing CVE-2023-42793 to target servers hosting TeamCity software, presenting a substantial risk to organizations worldwide," stated representatives from the involved agencies. The vulnerability allows malicious actors to gain direct access to software development environments, potentially leading to severe supply chain attacks. By compromising a TeamCity server, hackers can retrieve sensitive information such as source code and signing certificates, thus undermining the entire software development lifecycle.
"Russian Foreign Intelligence Service (SVR) cyber actors are utilizing CVE-2023-42793 to target servers hosting TeamCity software, presenting a substantial risk to organizations worldwide,"
Historically, the SVR's tactics have included high-profile compromises like the SolarWinds incident in 2020. However, presently, the victim profile appears more opportunistic, with fewer targets identified. "While the SVR has exploited this vulnerability, the current indications suggest that they have not yet engaged in similar large-scale operations as previously seen," noted cybersecurity analysts.
"While the SVR has exploited this vulnerability, the current indications suggest that they have not yet engaged in similar large-scale operations as previously seen,"

Despite the relatively limited scope at this time, security experts warn that the SVR has been seen escalating their privileges and spreading laterally within compromised networks. "This access enables them to deploy additional backdoors and cement long-term presence within the network environment," said a senior cybersecurity officer.
"This access enables them to deploy additional backdoors and cement long-term presence within the network environment,"
In a bid to empower organizations in safeguarding their systems, the authoring agencies have disseminated detailed indicators of compromise (IOCs). "We are providing actionable intelligence to help companies identify potential compromises and secure their networks proactively," said the NCSC spokesperson. The emphasis lies on urgency; organizations that have not promptly applied patches or workarounds for the vulnerabilities are advised to act swiftly.
"We are providing actionable intelligence to help companies identify potential compromises and secure their networks proactively,"
"If organizations confirm a breach, they should adhere to established incident response protocols and report their findings to the FBI and CISA,"
The SVR's operations are not new; they represent a longer trend of persistent cyber activities targeting both public and private sectors. "Since 2013, we've witnessed a methodical targeting strategy aimed at harvesting confidential information globally," said a cybersecurity expert from CISA. This pattern reflects a broader objective of collecting foreign intelligence on politics, economics, and military operations.
"Since 2013, we've witnessed a methodical targeting strategy aimed at harvesting confidential information globally,"

Over the past decade, reports related to the SVR primarily highlighted their spear phishing campaigns, targeting a diverse range of entities, including governmental bodies and educational institutions. "Political intelligence has been a paramount priority for the SVR, encompassing not only foreign policy but also internal governance and political processes," highlighted a government analyst, referencing past U.S. government reports regarding SVR activities.
"Political intelligence has been a paramount priority for the SVR, encompassing not only foreign policy but also internal governance and political processes,"
The SVR continues to refine its methods, as seen in recent campaigns focused on diplomatic agencies. For instance, in 2023, joint reports by Poland’s Military Counterintelligence Service and CERT.PL detailed specific techniques used to compromise embassies across dozens of countries.
In summary, the malicious use of the JetBrains TeamCity CVE by the SVR serves as a stark reminder of the evolving cybersecurity threat landscape. Authorities stress the need for vigorous and sustained cybersecurity measures to counteract these sophisticated operations. Organizations must be vigilant and proactive in their defense strategies, especially as the cyber threat posed by foreign intelligence agencies grows more complex and pervasive.


