Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

4/8/2015
02:45 PM
Connect Directly
Twitter
RSS
E-Mail
100%
0%

Russian Hackers Breached White House Via US State Department

Attackers who recently breached the US State Department compromised an unclassified White House system by sending spearphishing messages from a hijacked State Department email account, officials say.

Attackers compromised an unclassified White House system in October by sending spearphishing messages from a hijacked US State Department email account, US officials say. Though unclassified, the system did include some sensitive communications in the executive office, including President Obama's schedule.

Although officials will not confirm that the Russian government is behind the attack, investigators have said the code contains indications that point to Russian sources. The State Department has known of such actors compromising their unclassified email systems over the past year, but seems to be having trouble permanently ousting them from the network.

“Once an attacker gets into your systems it can be notoriously difficult to get them out, particularly when your network and internal security controls allow the attacker to move around on your network without being noticed," says Dwayne Melancon, CTO of Tripwire. "That appears to be the case here, which could be the result of an outwardly focused security approach. If you assume the enemy is ‘out there’ you stop noticing their activities when they get ‘in here.’"

"Additionally, many organizations lack a baseline understanding of what is ‘normal’ on their internal network and systems," he says, "making it difficult to tell which systems you can trust, which systems you can't and -- more importantly -- how to stop the attack and prevent future compromises."

[Everything you need to know about today’s IT security challenges – but were afraid to ask. Register with Discount Code DRBLOG to save $100 for this special one-day event, Dark Reading's Cyber Security Crash Course at Interop on Wednesday, April 29.]

The attackers first capitalized on the trust between two government agencies to spearphish into the White House. Then they sidled through the White House network, looking for intriguing data, like the president's schedule.

"Monitoring and alerting on the first indicators of lateral movement can be the difference between detecting an attacker within a few days or a few months," says Greg Foss, senior security research engineer of LogRhythm. "Monitoring endpoints, segmenting networks, laying traps, creating baselines of what is normal and then digging into the ‘abnormal,’ all are effective strategies for reducing the mean- time-to-detect and respond to an intruder.”

In recent years, the go-to assumptions were that Russian hackers were financially motivated criminals and Chinese hackers were directly sponsored by the nation-state, but those patterns are changing. At a Senate hearing Feb. 26, Director of National Intelligence James Clapper said cryptically, "I cannot go into detail here, but the Russian cyber threat is more severe than we had previously assessed."

“While Russia and other eastern European countries are generally known for cyber-crime, it might be revealed that this breach was state-sponsored rather than run by a criminal organization," says Dave Pack, director, LogRhythm Labs. "Developing offensive cyber capabilities is a natural progression for most countries to augment their intelligence and espionage capabilities with. The same cyber capabilities employed by the US, China, and other world powers, will be built up and utilized by most developed countries in the coming years. We might be seeing a cyber arms race in development.”

“The White House and all national security agencies should assume that Russia, China, North Korea, Iran and others want to infiltrate U.S. computer networks and hosts with the aim of stealing important information," says Muddu Sudhakar, CEO of Caspida. "We should assume by now that other countries have replicated NSA’s capabilities and have similar organizations that are constantly attacking US interests. We need the next level of cyber defense, which will prove early breach detection proactively and in real time, while operating continuously 24/7. We are in a new age of cyber attacks, and as such, need to drastically improve our security measures.”

"If the White House or the State Dept can't keep our foreign hackers with the infinite resources at their disposal...what chance does the average company have?" says Jeremiah Grossman, founder and iCEO of WhiteHat Security. "Not to mention the everyday person. Secondarily, whatever new legislation the White House or Congress is planning, does it have any chance of preventing this kind of incident from happening again?"

Sara Peters is Senior Editor at Dark Reading and formerly the editor-in-chief of Enterprise Efficiency. Prior that she was senior editor for the Computer Security Institute, writing and speaking about virtualization, identity management, cybersecurity law, and a myriad ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Marilyn Cohodas
50%
50%
Marilyn Cohodas,
User Rank: Strategist
4/9/2015 | 11:01:58 AM
Re: Fallen behind?
My guess that there has been more going on that we just haven't gotten wind of...
Whoopty
50%
50%
Whoopty,
User Rank: Ninja
4/9/2015 | 9:51:40 AM
Fallen behind?
I wonder if US cyber-security has rested on its laurels a bit in recent years, as it seems bizarre that so many attacks are getting through without any obvious repurcussion.

Then again, as has been shown with the NSA revelations, intelligent agencies can do a lot of stuff behind the scenes without us ever knowing, so this could well the case that these sorts of attacks happen all the time both ways and this is simply being dredged up to finagle some political support for legislative or administrative changes. 
SgS125
100%
0%
SgS125,
User Rank: Ninja
4/9/2015 | 9:38:13 AM
can you imagine?
Can you imagine what the other side must be thinking?

Here we as a country have been snooping, attacking, planting malware, and intercepting their traffic for years and we seem upset when we find them doing the same things.

How ever will we stop them we ask?

It's simple, you can't.  You can't stop our own agencies from spying on us and you can't stop nation states from this continued silent cyberwar.

It's always a good read but it will never be something new we did not expect to find.

We ask how to protect our networks with more tools and products but really can you ever think that we will get ahead of this wave of cyber warfare?

 

We can try to keep out the criminals and kiddies and insiders and fraudsters, but when it comes to nations, good luck!

 

 

 
Mobile Banking Malware Up 50% in First Half of 2019
Kelly Sheridan, Staff Editor, Dark Reading,  1/17/2020
Exploits Released for As-Yet Unpatched Critical Citrix Flaw
Jai Vijayan, Contributing Writer,  1/13/2020
Microsoft to Officially End Support for Windows 7, Server 2008
Kelly Sheridan, Staff Editor, Dark Reading,  1/13/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
The Year in Security: 2019
This Tech Digest provides a wrap up and overview of the year's top cybersecurity news stories. It was a year of new twists on old threats, with fears of another WannaCry-type worm and of a possible botnet army of Wi-Fi routers. But 2019 also underscored the risk of firmware and trusted security tools harboring dangerous holes that cybercriminals and nation-state hackers could readily abuse. Read more.
Flash Poll
[Just Released] How Enterprises are Attacking the Cybersecurity Problem
[Just Released] How Enterprises are Attacking the Cybersecurity Problem
Organizations have invested in a sweeping array of security technologies to address challenges associated with the growing number of cybersecurity attacks. However, the complexity involved in managing these technologies is emerging as a major problem. Read this report to find out what your peers biggest security challenges are and the technologies they are using to address them.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-7227
PUBLISHED: 2020-01-18
Westermo MRD-315 1.7.3 and 1.7.4 devices have an information disclosure vulnerability that allows an authenticated remote attacker to retrieve the source code of different functions of the web application via requests that lack certain mandatory parameters. This affects ifaces-diag.asp, system.asp, ...
CVE-2019-15625
PUBLISHED: 2020-01-18
A memory usage vulnerability exists in Trend Micro Password Manager 3.8 that could allow an attacker with access and permissions to the victim's memory processes to extract sensitive information.
CVE-2019-19696
PUBLISHED: 2020-01-18
A RootCA vulnerability found in Trend Micro Password Manager for Windows and macOS exists where the localhost.key of RootCA.crt might be improperly accessed by an unauthorized party and could be used to create malicious self-signed SSL certificates, allowing an attacker to misdirect a user to phishi...
CVE-2019-19697
PUBLISHED: 2020-01-18
An arbitrary code execution vulnerability exists in the Trend Micro Security 2019 (v15) consumer family of products which could allow an attacker to gain elevated privileges and tamper with protected services by disabling or otherwise preventing them to start. An attacker must already have administr...
CVE-2019-20357
PUBLISHED: 2020-01-18
A Persistent Arbitrary Code Execution vulnerability exists in the Trend Micro Security 2020 (v160 and 2019 (v15) consumer familiy of products which could potentially allow an attacker the ability to create a malicious program to escalate privileges and attain persistence on a vulnerable system.