Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Operational Security

3/16/2018
10:45 AM
Scott Ferguson
Scott Ferguson
News Analysis-Security Now
50%
50%

FBI & DHS Accuse Russia of Hacking Critical Infrastructure

In a report from US-CERT, the FBI and DHS accuse Russia of trying to hack critical US infrastructure, including nuclear power plants, using an array of attacks. The report follows additional sanctions against the country.

The FBI and the Department of Homeland Security are accusing Russia of attempting to hack into the nation's critical infrastructure, including nuclear power plants, using an array of attacks, and warn businesses and other organizations to be alert for future disruptions.

On Thursday, the US Computer Emergency Readiness Team (US-CERT) issued a warning from the FBI and DHS that charged Russia with not only hacking into government agencies, but also other critical infrastructures, including numerous energy, nuclear, commercial, water and aviation facilities.

It appears the attackers targeted third-party entities in order to reach their main targets, which included various industrial control systems.

(Source: Pixabay)
(Source: Pixabay)

Attackers used a range of methods, including spear-phishing, watering hole attacks, credential gathering, open source and network reconnaissance and host-based exploitation, US-CERT said.

"DHS and FBI characterize this activity as a multi-stage intrusion campaign by Russian government cyber actors who targeted small commercial facilities' networks where they staged malware, conducted spear phishing, and gained remote access into energy sector networks," according to the March 15 alert. "After obtaining access, the Russian government cyber actors conducted network reconnaissance, moved laterally, and collected information pertaining to Industrial Control Systems (ICS)."

The alert notes some of these attacks are related to "Dragonfly," a piece of malware spotted in the wild as far back as 2011, which was re-engineered to target nuclear facilities. Symantec first reported on the attack in September. (See Unknown Document 734998.)

In many cases, those behind the attacks targeted specific organizations, facilities and individuals instead of pursuing more random, opportunistic targets, according to the analysis. Frequently, these attackers studied publicly available information -- such as photos on websites that, when enlarged, showed control system equipment in the background.

The groups behind these attacks then used this information as part of spear phishing campaigns. For example:

Threat actors used email attachments to leverage legitimate Microsoft Office functions for retrieving a document from a remote server using the Server Message Block (SMB) protocol. (An example of this request is: file[:]///Normal.dotm). As part of the standard processes executed by Microsoft Word, this request authenticates the client with the server, sending the user's credential hash to the remote server before retrieving the requested file.

In other cases, attackers used watering hole attacks that targeted legitimate websites and trade publications containing information on process control, ICS and other critical infrastructure. The threat actors altered these sites and added malicious content, usually by changing JavaScript and PHP files. Legitimate users then downloaded this code, giving attackers access.


The fundamentals of network security are being redefined -- don't get left in the dark by a DDoS attack! Join us in Austin from May 14-16 at the fifth annual Big Communications Event. There's still time to register and communications service providers get in free!

Attackers appear to have accessed workstations and servers within the corporate network that contained information about an ICS or supervisory control and data acquisition (SCADA) systems.

By gaining access and information about a SCADA system, an attacker could conceivably shut down or damage systems, in addition to spying on users and data, or taking blueprints and other critical information.

The US-CERT alert was released on the same day the US Treasury Department issued sanctions against five Russian entities and 19 individuals for their roles in interfering in the 2016 US election. It coincided with the time the FBI and DHS detailed exploits concerning attacks on US critical infrastructure.

In addition, the Trump Administration accused Russia of being behind the NotPetya ransomware attack which targeted energy, financial and government centers in the Ukraine. The UK also charged the Russian military with launching that campaign. Now the US has sanctioned Russia for its role in the attack. (See UK Accuses Russia of Launching NotPetya Attacks.)

"This cyber-attack was the most destructive and costly cyber-attack in history," according to the Treasury Department's statement. "The attack resulted in billions of dollars in damage across Europe, Asia and the United States, and significantly disrupted global shipping, trade, and the production of medicines. Additionally, several hospitals in the United States were unable to create electronic records for more than a week."

Related posts:

— Scott Ferguson, Editor, Enterprise Cloud News. Follow him on Twitter @sferguson_LR.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
How Enterprises are Attacking the Cybersecurity Problem
Concerns over supply chain vulnerabilities and attack visibility drove some significant changes in enterprise cybersecurity strategies over the past year. Dark Reading's 2021 Strategic Security Survey showed that many organizations are staying the course regarding the use of a mix of attack prevention and threat detection technologies and practices for dealing with cyber threats.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-41182
PUBLISHED: 2021-10-26
jQuery-UI is the official jQuery user interface library. Prior to version 1.13.0, accepting the value of the `altField` option of the Datepicker widget from untrusted sources may execute untrusted code. The issue is fixed in jQuery UI 1.13.0. Any string value passed to the `altField` option is now t...
CVE-2021-41183
PUBLISHED: 2021-10-26
jQuery-UI is the official jQuery user interface library. Prior to version 1.13.0, accepting the value of various `*Text` options of the Datepicker widget from untrusted sources may execute untrusted code. The issue is fixed in jQuery UI 1.13.0. The values passed to various `*Text` options are now al...
CVE-2021-41184
PUBLISHED: 2021-10-26
jQuery-UI is the official jQuery user interface library. Prior to version 1.13.0, accepting the value of the `of` option of the `.position()` util from untrusted sources may execute untrusted code. The issue is fixed in jQuery UI 1.13.0. Any string value passed to the `of` option is now treated as a...
CVE-2021-41185
PUBLISHED: 2021-10-26
Mycodo is an environmental monitoring and regulation system. An exploit in versions prior to 8.12.7 allows anyone with access to endpoints to download files outside the intended directory. A patch has been applied and a release made. Users should upgrade to version 8.12.7. As a workaround, users may...
CVE-2021-41188
PUBLISHED: 2021-10-26
Shopware is open source e-commerce software. Versions prior to 5.7.6 contain a cross-site scripting vulnerability. This issue is patched in version 5.7.6. Two workarounds are available. Using the security plugin or adding a particular following config to the `.htaccess` file will protect against cro...