Close
  • Latest News
  • Artificial Intelligence
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity

    Security Lessons to Learn From Tactics of Indicted Russian Hackers

    By
    Wayne Rash
    -
    July 19, 2018
    Share
    Facebook
    Twitter
    Linkedin
      Russian Infrastructure Attack Campaign

      The indictment filed by Special Counsel Robert Mueller on Friday the 13th reads in places like a crime novel. The story explains step-by-step how a group of Russian operatives who are part of the Internet Research Agency targeted the Democratic Party and the Hillary Clinton campaign, hacked into their computers and then stole vast quantities of data. 

      The breach happened in March of 2016, although the process started three years before that and would soon become the centerpiece of election news as breached emails started appearing on Wikileaks and other websites forming the basis for a series of stories embarrassing to the campaign. 

      But as you read through the indictment, there’s more there than just a theft of emails. There’s also the story of how the data was exfiltrated and transferred out of the U.S. as well as how the Russian operatives tried to cover their tracks. This investigation then led to a second indictment related to the same Russians and their attempts to manipulate social media and to create fake news to influence the 2016 U.S. presidential election.

      As you read through the indictments, you’ll see the same sort of hacking and social engineering activities you’ve heard about many times before including phishing emails, the deciphering of insecure passwords, the misdirection tactics. It’s all there, and it all provides an opportunity for you to protect your organization if you’re willing to learn from the Russian example and use it to deal with the bad guys that attack your organization. 

      If it seems like the tactics are very similar in each indictment, that’s due to the fact that the same people are involved. 

      “Essentially state-sponsored actors are using the same tradecraft as the criminal bad guys,” explained Stu Sjouwerman, CEO of KnowBe4, a security training company. “In Russia they are the same bad guys. The have a choice to go to prison or work for the GRU,” he said. The GRU is Russia’s main military intelligence agency. 

      Sjouwerman said that the Russian bad guys, like other cybercriminals, make it a point to go after the people in an organization. In the case of the hack of the Clinton campaign, the Russians sent a phishing email to campaign chairman John Podesta disguised to look like an official email from Google, asking him to change is Gmail password, and offering a place to click. Podesta clicked. 

      That was all it took to download tens of thousands of email messages. The rest is history. 

      By now you’re telling yourself that you don’t have to worry because you’re not a senior government official and you don’t have a high profile position that would make you an inviting target. But that doesn’t matter. 

      Cyber-criminals will use the same tactics to steal your company’s money or its intellectual property as they used in their attempts to influence the U.S. election. Those bad guys may be after your contacts at some other company which is their real target and you may just be a stepping stone. But whether they’re after your property or your business partners, the result can be serious. 

      So what can you do? Whether your attackers are state sponsored hackers or simply criminals, you can protect against those same tactics. The first one of those is to defend your company and your staff against phishing. “Instead of going after John Podesta, they go after senior managers in accounting,” Sjouwerman explained. 

      The criminals find this information from your website, from LinkedIn and from media reports. They spend the time to research the senior people in your organization so they can successfully impersonate them. Then they either spoof an internal email, or the email of someone the targeted executive trusts. After that, it’s an assault on passwords, on contact information, on payroll information and on your computer infrastructure itself. 

      The bad guys will try to steal your money and your other property through social engineering. But they’ll also install malware bearing surveillance applications, viruses, keyloggers and other cyber-weapons. They will try to get their hands on executive pay stubs and they’ll try to get customer and vendor lists. 

      Here are some steps to take that have been presented before—more than once—but which bear repeating: 

      • Educate your employees about phishing emails, how to spot them, and what to do if they find one. You can help them by providing practice through a test provided for free by KnowBe4. 
      • Insist that your employees use strong, unique passwords for your email system. KnowBe4 also has a free test for breached passwords that uses over a billion compromised credentials harvested from the dark web. 
      • Try to avoid using public webmail services for critical communications, but if you must use them, insist that your employees use multi-factor authentication. But Sjouwerman said that you can’t just use authentication where the site sends a number to a cell phone because those are too easy to spoof. Instead, he said that you should use an app such as Microsoft Authenticator or Google Authenticator where the app generates the code on the phone. 
      • Train your staff to expect attempts to subvert your procedures through actions such as phony requests to transfer money and set up procedures so that they don’t fall for fraud in which someone spoofs a senior executive and asks for information such as an executive’s pay stub, which is an increasingly prevalent type of phishing attack. 

      Another thing to remember is that you can’t assume that the bad guys will always try to exfiltrate data to a foreign location. The Russians, for example, used a server in Arizona as an intermediate step out of the U.S. 

      The attacks are getting more sophisticated and there are limits to how much you can do technically to prevent these attacks, but training and awareness can go a long way in reducing the success of the social engineering that hackers of all sorts depend on.

      Wayne Rash
      https://www.eweek.com/author/wayne-rash/
      Wayne Rash is a freelance writer and editor with a 35-year history covering technology. He’s a frequent speaker on business, technology issues and enterprise computing. He is the author of five books, including his most recent, "Politics on the Nets." Rash is a former Executive Editor of eWEEK and a former analyst in the eWEEK Test Center. He was also an analyst in the InfoWorld Test Center and editor of InternetWeek. He's a retired naval officer, a former principal at American Management Systems and a long-time columnist for Byte Magazine.
      Get the Free Newsletter!
      Subscribe to Daily Tech Insider for top news, trends & analysis
      This email address is invalid.
      Get the Free Newsletter!
      Subscribe to Daily Tech Insider for top news, trends & analysis
      This email address is invalid.

      MOST POPULAR ARTICLES

      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Applications

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      IT Management

      Intuit’s Nhung Ho on AI for the...

      James Maguire - May 13, 2022 0
      I spoke with Nhung Ho, Vice President of AI at Intuit, about adoption of AI in the small and medium-sized business market, and how...
      Read more
      Applications

      Kyndryl’s Nicolas Sekkaki on Handling AI and...

      James Maguire - November 9, 2022 0
      I spoke with Nicolas Sekkaki, Group Practice Leader for Applications, Data and AI at Kyndryl, about how companies can boost both their AI and...
      Read more
      Cloud

      IGEL CEO Jed Ayres on Edge and...

      James Maguire - June 14, 2022 0
      I spoke with Jed Ayres, CEO of IGEL, about the endpoint sector, and an open source OS for the cloud; we also spoke about...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2022 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×