Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Operational Security

// // //
3/16/2018
10:45 AM
Scott Ferguson
Scott Ferguson
News Analysis-Security Now

FBI & DHS Accuse Russia of Hacking Critical Infrastructure

In a report from US-CERT, the FBI and DHS accuse Russia of trying to hack critical US infrastructure, including nuclear power plants, using an array of attacks. The report follows additional sanctions against the country.

The FBI and the Department of Homeland Security are accusing Russia of attempting to hack into the nation's critical infrastructure, including nuclear power plants, using an array of attacks, and warn businesses and other organizations to be alert for future disruptions.

On Thursday, the US Computer Emergency Readiness Team (US-CERT) issued a warning from the FBI and DHS that charged Russia with not only hacking into government agencies, but also other critical infrastructures, including numerous energy, nuclear, commercial, water and aviation facilities.

It appears the attackers targeted third-party entities in order to reach their main targets, which included various industrial control systems.

(Source: Pixabay)
(Source: Pixabay)

Attackers used a range of methods, including spear-phishing, watering hole attacks, credential gathering, open source and network reconnaissance and host-based exploitation, US-CERT said.

"DHS and FBI characterize this activity as a multi-stage intrusion campaign by Russian government cyber actors who targeted small commercial facilities' networks where they staged malware, conducted spear phishing, and gained remote access into energy sector networks," according to the March 15 alert. "After obtaining access, the Russian government cyber actors conducted network reconnaissance, moved laterally, and collected information pertaining to Industrial Control Systems (ICS)."

The alert notes some of these attacks are related to "Dragonfly," a piece of malware spotted in the wild as far back as 2011, which was re-engineered to target nuclear facilities. Symantec first reported on the attack in September. (See Unknown Document 734998.)

In many cases, those behind the attacks targeted specific organizations, facilities and individuals instead of pursuing more random, opportunistic targets, according to the analysis. Frequently, these attackers studied publicly available information -- such as photos on websites that, when enlarged, showed control system equipment in the background.

The groups behind these attacks then used this information as part of spear phishing campaigns. For example:

Threat actors used email attachments to leverage legitimate Microsoft Office functions for retrieving a document from a remote server using the Server Message Block (SMB) protocol. (An example of this request is: file[:]///Normal.dotm). As part of the standard processes executed by Microsoft Word, this request authenticates the client with the server, sending the user's credential hash to the remote server before retrieving the requested file.

In other cases, attackers used watering hole attacks that targeted legitimate websites and trade publications containing information on process control, ICS and other critical infrastructure. The threat actors altered these sites and added malicious content, usually by changing JavaScript and PHP files. Legitimate users then downloaded this code, giving attackers access.


The fundamentals of network security are being redefined -- don't get left in the dark by a DDoS attack! Join us in Austin from May 14-16 at the fifth annual Big Communications Event. There's still time to register and communications service providers get in free!

Attackers appear to have accessed workstations and servers within the corporate network that contained information about an ICS or supervisory control and data acquisition (SCADA) systems.

By gaining access and information about a SCADA system, an attacker could conceivably shut down or damage systems, in addition to spying on users and data, or taking blueprints and other critical information.

The US-CERT alert was released on the same day the US Treasury Department issued sanctions against five Russian entities and 19 individuals for their roles in interfering in the 2016 US election. It coincided with the time the FBI and DHS detailed exploits concerning attacks on US critical infrastructure.

In addition, the Trump Administration accused Russia of being behind the NotPetya ransomware attack which targeted energy, financial and government centers in the Ukraine. The UK also charged the Russian military with launching that campaign. Now the US has sanctioned Russia for its role in the attack. (See UK Accuses Russia of Launching NotPetya Attacks.)

"This cyber-attack was the most destructive and costly cyber-attack in history," according to the Treasury Department's statement. "The attack resulted in billions of dollars in damage across Europe, Asia and the United States, and significantly disrupted global shipping, trade, and the production of medicines. Additionally, several hospitals in the United States were unable to create electronic records for more than a week."

Related posts:

— Scott Ferguson, Editor, Enterprise Cloud News. Follow him on Twitter @sferguson_LR.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Everything You Need to Know About DNS Attacks
It's important to understand DNS, potential attacks against it, and the tools and techniques required to defend DNS infrastructure. This report answers all the questions you were afraid to ask. Domain Name Service (DNS) is a critical part of any organization's digital infrastructure, but it's also one of the least understood. DNS is designed to be invisible to business professionals, IT stakeholders, and many security professionals, but DNS's threat surface is large and widely targeted. Attackers are causing a great deal of damage with an array of attacks such as denial of service, DNS cache poisoning, DNS hijackin, DNS tunneling, and DNS dangling. They are using DNS infrastructure to take control of inbound and outbound communications and preventing users from accessing the applications they are looking for. To stop attacks on DNS, security teams need to shore up the organization's security hygiene around DNS infrastructure, implement controls such as DNSSEC, and monitor DNS traffic
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2023-33196
PUBLISHED: 2023-05-26
Craft is a CMS for creating custom digital experiences. Cross site scripting (XSS) can be triggered by review volumes. This issue has been fixed in version 4.4.7.
CVE-2023-33185
PUBLISHED: 2023-05-26
Django-SES is a drop-in mail backend for Django. The django_ses library implements a mail backend for Django using AWS Simple Email Service. The library exports the `SESEventWebhookView class` intended to receive signed requests from AWS to handle email bounces, subscriptions, etc. These requests ar...
CVE-2023-33187
PUBLISHED: 2023-05-26
Highlight is an open source, full-stack monitoring platform. Highlight may record passwords on customer deployments when a password html input is switched to `type="text"` via a javascript "Show Password" button. This differs from the expected behavior which always obfuscates `ty...
CVE-2023-33194
PUBLISHED: 2023-05-26
Craft is a CMS for creating custom digital experiences on the web.The platform does not filter input and encode output in Quick Post validation error message, which can deliver an XSS payload. Old CVE fixed the XSS in label HTML but didn’t fix it when clicking save. This issue was...
CVE-2023-2879
PUBLISHED: 2023-05-26
GDSDB infinite loop in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13 allows denial of service via packet injection or crafted capture file