Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Endpoint //

Privacy

3/19/2018
05:10 PM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

Russian APT Compromised Cisco Router in Energy Sector Attacks

DragonFly hacking team that targeted US critical infrastructure compromised a network router as part of its attack campaign against UK energy firms last year.

Yet another nation-state hacking team has been spotted compromising a network router to get to its ultimate targets: this time, it's the infamous Russian APT known as DragonFly 2.0 that was called out by the US federal government last week for hacking into US energy networks.

Researchers from Cylance this month revealed that they recently discovered that the group had hacked a core Cisco router on the network of Vietnam's largest oil-rig manufacturer, a state-owned entity, in order to steal user credentials and ultimately infiltrate energy firms in the UK in March of 2017. The Cisco router that was abused was an "end of life" network device that ultimately gave the attackers an attack vector to target energy firms, according to Cylance. DragonFly used the stolen credentials as phishing lures to attack energy sector entity targets in the UK.

But there are several missing pieces of the attack puzzle, according to Cylance: including just how the router was hacked and how exactly that got the attackers to their targets in the UK.

Kevin Livelli, director of threat intelligence at Cylance, says it's also unclear whether the oil rig manufacturer was a supplier to the UK targets or not. Such a connection might explain how it chose those targets, but Cylance found no such direct connection in its research.

"This is a piece of a larger campaign that we're reporting on here," Livelli says. "We found a decoy document embedded in one of the hashes in malware samples in our continued research into this group. We could tell those decoy documents were being targeted at folks in the energy sector in UK."

If a victim opened the rigged document - a curriculum vitae - he or she was then unknowingly connected to the compromised router, which automatically authenticated them to a malicious SMB server via the user's encrypted credentials. "When the user supplied their credentials, [that] was harvested by the router," he says.

"The router was compromised separately, and then incorporated into the attack," Livelli explains.

The US-CERT and FBI last week made a rare attribution announcement stating that Russia is behind the well-documented DragonFly attack campaigns, and targeted the energy, nuclear, commercial facilities, water, aviation, and critical manufacturing sectors.

Router hacks are rare, but this is the second consecutive revelation this month of a nation-state targeting a router as an attack vector. Researchers at Kaspersky Lab earlier this month reported a nation-state cyber espionage campaign targeting Africa and the Middle East that infects network MikroTik routers in order to snare administrative credentials from its targets and then move laterally within the victim network.

Slingshot, believed to be an English-speaking and sophisticated hacking team, drops a malicious dynamic link library (DLL) on the routers that serves as a downloader for other malware. When a router admin logs into the device, his or her endpoint machine gets infected by the router. Alexey Shulmin, lead malware analyst at Kaspersky Lab, told Dark Reading that router compromises often go unnoticed because router security is a blind spot for most enterprises.

Cylance's Livelli says router hacking typically indicates a sophisticated threat group is behind it, because it allows them to remain under the radar. "The compromise of a core router is deeply concerning because [it] is difficult to detect, to forensically investigate, and difficult to patch and remediate," he says. "We don't have the same suite of tools available to us to analyze and deal with router firmware" as we have with other systems, he says.

CrowdStrike also has seen signs of DragonFly 2.0 – which it calls Berserk Bear – going after routers. "In summer 2017, CrowdStrike observed Berserk Bear - associated with the energy credential-harvesting occurring during that same time period - attempting to access Internet-facing routers," says Adam Meyers, vice president of intelligence at CrowdStrike. "The SMB-harvesting techniques associated with this activity are by now fairly well known and not a strong attribution anchor."

'Not a Vuln'

A Cisco spokesperson said the incident reported by Cylance was tied to legacy routers and not its latest generation of products; the issue isn't a vulnerability in the router but instead requires an attacker to somehow steal a router admin's credentials or gain physical access to the router. Cisco has previously warned, for example, of threats where an attacker gains admin or physical access to a Cisco IOS Classic router and replaces the operating system with a malicious version. 

"While we cannot speculate about specific details in this scenario, our investigations have found that in many cases, admin credentials are accessed by bad actors through compromised authentication servers or social engineering," said a Cisco spokesperson.

Cylance said DragonFly basically used the Cisco router as a vehicle for its attack, which is tied to the mid-July 2017 attacks warned by Britain's National Cyber Security Centre and reported by Motherboard.

Related Content:

 

Interop ITX 2018

Join Dark Reading LIVE for two cybersecurity summits at Interop ITX. Learn from the industry’s most knowledgeable IT security experts. Check out the security track here.

Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Why Cyber-Risk Is a C-Suite Issue
Marc Wilczek, Digital Strategist & CIO Advisor,  11/12/2019
The Cold Truth about Cyber Insurance
Chris Kennedy, CISO & VP Customer Success, AttackIQ,  11/7/2019
Black Hat Q&A: Hacking a '90s Sports Car
Black Hat Staff, ,  11/7/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-5230
PUBLISHED: 2019-11-13
P20 Pro, P20, Mate RS smartphones with versions earlier than Charlotte-AL00A 9.1.0.321(C00E320R1P1T8), versions earlier than Emily-AL00A 9.1.0.321(C00E320R1P1T8), versions earlier than NEO-AL00D NEO-AL00 9.1.0.321(C786E320R1P1T8) have an improper validation vulnerability. The system does not perform...
CVE-2019-5231
PUBLISHED: 2019-11-13
P30 smartphones with versions earlier than ELLE-AL00B 9.1.0.186(C00E180R2P1) have an improper authorization vulnerability. The software incorrectly performs an authorization check when a user attempts to perform certain action. Successful exploit could allow the attacker to update a crafted package.
CVE-2019-5233
PUBLISHED: 2019-11-13
Huawei smartphones with versions earlier than Taurus-AL00B 10.0.0.41(SP2C00E41R3P2) have an improper authentication vulnerability. Successful exploitation may cause the attacker to access specific components.
CVE-2019-5246
PUBLISHED: 2019-11-13
Smartphones with software of ELLE-AL00B 9.1.0.109(C00E106R1P21), 9.1.0.113(C00E110R1P21), 9.1.0.125(C00E120R1P21), 9.1.0.135(C00E130R1P21), 9.1.0.153(C00E150R1P21), 9.1.0.155(C00E150R1P21), 9.1.0.162(C00E160R2P1) have an insufficient verification vulnerability. The system does not verify certain par...
CVE-2010-4177
PUBLISHED: 2019-11-12
mysql-gui-tools (mysql-query-browser and mysql-admin) before 5.0r14+openSUSE-2.3 exposes the password of a user connected to the MySQL server in clear text form via the list of running processes.