Russia behind attacks on US critical industries

LASER_oneXM

Level 37
Thread author
Verified
Top Poster
Well-known
Forum Veteran
Feb 4, 2016
2,516
15,625
3,578
53
Germany / Poland
In July 2017, The New York Times reported that hackers had been infiltrating the networks of nuclear power stations and energy facilities in the US and elsewhere by targeting employees, such as control engineers.

Hackers used man-in-the-middle attacks and emails with fake resumes in Microsoft Word that deployed malicious code to steal a user’s credentials and get into other machines. At the time, it wasn’t disclosed whether the attack was the result of cyberespionage meant to steal top secret industry information, or simply to destroy the infrastructure.
According to the alert, the Russian government is behind a number of cyberattacks and breaches that actively targeted US government agencies and critical energy, nuclear, commercial facilities, water, aviation and manufacturing sectors. The threat actors “staged malware, conducted spear phishing, and gained remote access into energy sector networks,” said the report.

It appears the campaign had two types of victims: staging targets and intended targets. Staging targets were third parties with weaker networks used to store malware and serve as middle-men in attacks on the final, intended targets.

“After obtaining access, the Russian government cyber actors conducted network reconnaissance, moved laterally and collected information pertaining to industrial control systems,” the report said.

The DHS and FBI hope malicious activity will be reduced and risks identified faster by thoroughly describing the indicators of compromise, as well as a variety of tactics, techniques and procedures (TTPs) used in compromising the networks, such as spear-phishing emails, watering-hole domains, credential gathering, open-source and network reconnaissance and host-based exploitation.