Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Subscribe
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Subscribe
    Home Cybersecurity
    • Cybersecurity

    US-CERT Finds Russian Hackers Spent Months Inside Targeted Systems

    Written by

    Wayne Rash
    Published March 17, 2018
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      A report from the U.S. Computer Emergency Readiness Team (US-CERT) provides a detailed look at how alleged Russian attackers planned and executed a long-term cyber-attack against unprepared energy installations. 

      The attacks started by compromising a partner and then using the partner’s IT systems to stage an attack on the ultimate-power generation stations. 

      “DHS and FBI characterize this activity as a multi-stage intrusion campaign by Russian government cyber actors who targeted small commercial facilities’ networks where they staged malware, conducted spear phishing, and gained remote access into energy sector networks,” the report explains. 

      The US-CERT report said that once the hackers gained access, “the Russian government cyber actors conducted network reconnaissance, moved laterally, and collected information pertaining to Industrial Control Systems (ICS).” 

      The report includes a step-by-step description of the hackers’ activities, including the specific methods, the specific IP addresses of their servers and repositories and complete indicators of compromise (IOC) details. 

      As is the case with many state-sponsored attacks, the alleged Russian hackers started with a poorly defended contractor to gain access to the ultimate target’s network. They used phishing emails from legitimate accounts, loaded malware and credential-gathering exploits on watering-hole domains and they examined information in the public domain that would reveal important details about the target. 

      For example, in one case, a member of a target organization’s staff was pictured at work on the company human resources page. A close look at the background of the photo revealed information on the industrial control system in use, as well as an image of a computer screen that revealed the specific control software in use, including its revision level. 

      Other information used by the hackers included publicly available email addresses and the names of senior staff members. This information was used to create credible phishing emails. 

      Once inside the partner’s system, the hackers set it up as a staging area for the attack on the ultimate target. The steps included creating repositories for software, creating fake accounts, and conducting surveillance. 

      Once the hackers gained access to their ultimate target, the goal in this case was to conduct surveillance so that the hackers could gather information on the software in use, the credentials being used, and the control processes being used. This information was exfiltrated to remote servers using SMB protocol. Once the surveillance was complete, the hackers launched a series of processes designed to cover their tracks. 

      Unfortunately, it probably wasn’t as much of a challenge as it should have been to break into the control systems described by US-CERT. “These networks are insecure by design,” said Phil Neray, vice president of industrial cyber-security at CyberX. “They’ve relied on outdated notions like air-gapping. We’ve found that in a lot of air gapped networks, there are connections to the internet.” 

      Much of the problem is also due to obsolete equipment and unsupported operating systems. “Organizations are reticent to change existing systems because they perform their original functions reliably,” explained Ray DeMeo, co-founder and COO of Virsec. But the conditions around them have changed, and they’re remaining unprotected. 

      The result is that the systems can’t be patched and run applications that may not be able to work properly if the operating system is updated. DeMeo suggested that the industrial systems be patterned after the security in the financial industry. “Wall street wouldn’t survive if they didn’t have the security they do,” he said. 

      Neray suggested that ICS networks adopt practices such as continuous monitoring of activities on the network, including workstation activities such as creating users, changing permissions or changing the registry, both of which were common activities conducted by the hackers. 

      DeMeo also suggested that a long term fix would be to include security readiness in an organization as part of the annual audit and that it be disclosed to stockholders. He also suggested that insurance premiums be tied to security readiness. Those actions would encourage companies to make themselves more secure because it would affect their bottom line. 

      On a more immediate basis, US-CERT included a list of best practices at the end of its report, along with a detailed list of detection and prevention measures. Those best practices include: 

      • Blocking all versions of SMB protocols, as well as TCP ports 139 and 445 and UDP port 137.
      • Blocking Web-based distributed authoring and versioning (WebDAV) protocol on border gateway devices.
      • Monitor VPNs for abnormal activity.
      • Segmenting critical networks and systems from business systems.
      • Using only PowerShell v. 5 with advanced logging.
      • Blocking external access for admin accounts.
      • Implementing two-factor authentication.

      US-CERT also included a complete set of YARA rules for use with that open-source malware pattern-matching utility, along with instructions on using YARA for malware detection. 

      “You should assume that you’re being targeted if you have something of value,” DeMeo said. “You have to assume that they’re already in your system. The question is how do you get them out?” 

      The answer is that you will need to hire an industrial security firm to find out what the hackers have done, and find ways to remove them and their back doors from your systems. 

      Then Neray said you need to make sure your new systems don’t have the same problems by specifying systems that can be updated and software that’s not tied to a specific configuration of Windows or another operating system. 

      “Three out of four industrial sites are running unsupported versions of Windows,” Neray said. Clearly that has to change.

      Wayne Rash
      Wayne Rash
      https://www.eweek.com/author/wayne-rash/
      Wayne Rash is a content writer and editor with a 35-year history covering technology. He’s a frequent speaker on business, technology issues and enterprise computing. He is the author of five books, including his most recent, "Politics on the Nets." Rash is a former Executive Editor of eWEEK and a former analyst in the eWEEK Test Center. He was also an analyst in the InfoWorld Test Center and editor of InternetWeek. He's a retired naval officer, a former principal at American Management Systems and a long-time columnist for Byte Magazine.

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.