Russia Attempts to Hack Electric Grid

by Membrane Domain Cybersecurity

Malware associated with a Russian hacking operation, Grizzly Steppe, was found on a Burlington Electric computer. It appears as though Russia was trying to access the power grid; however, the infected computer was not connected to the network.

“Vermonters and all Americans should be both alarmed and outraged that one of the world’s leading thugs, Vladimir Putin, has been attempting to hack our electric grid, which we rely upon to support our quality-of-life, economy, health, and safety,” Vermont Governor Shumlin said in a statement. “This episode should highlight the urgent need for our federal government to vigorously pursue and put an end to this sort of Russian meddling.”

Senator Patrick J. Leahy said, “This is beyond hackers having electronic joy rides — this is now about trying to access utilities to potentially manipulate the grid and shut it down in the middle of winter,” Leahy said in a statement. “That is a direct threat to Vermont and we do not take it lightly.”

Representative Peter Welch said, “It’s systemic, relentless, predatory.They will hack everywhere, even Vermont, in pursuit of opportunities to disrupt our country. We must remain vigilant, which is why I support President Obama’s sanctions against Russia and its attacks on our country and what it stands for.”

According to the Department of Homeland Security:

GRIZZLY STEPPE: Russian Malicious Cyber Activity

Russia’s civilian and military intelligence services engaged in aggressive and sophisticated cyber-enabled operations targeting the U.S. government and its citizens. The U.S. Government refers to this activity as GRIZZLY STEPPE. These cyber operations included spearphishing campaigns targeting government organizations, critical infrastructure entities, think tanks, universities, political organizations, and corporations, and theft of information from these organizations. This stolen information was later publicly released by third parties.

In operations targeting other countries, including U.S. allies and partners, Russian intelligence services (RIS) have undertaken damaging or disruptive cyber-attacks, including on critical infrastructure—in some cases masquerading as third parties or hiding behind false online personas designed to cause the victim to misattribute the source of the attack.

How Do Russian Intelligence Services Operate in Cyberspace?

RIS often uses spearphishing to gain access to targeted systems (see Figure 1 below). In one 2015–16 operation (detailed in our Joint Analysis Report (JAR)), Russian cyber actors conducted a spearphishing campaign to establish presence and persistence on a target network, obtain higher-level privileges, and steal (or “exfiltrate”) information.

These actors tricked recipients into changing their passwords through a fake website that was designed by the Russians cyber actors to appear legitimate. The actors then used those credentials—the username and password—to access the network as if they were legitimate users. They installed other malicious files, moved freely throughout the target network, gathered data and information, and exfiltrated it from the target network. Russian cyber actors continue to conduct spearphishing campaigns, including one launched as recently as November 2016, just days after the U.S. election.

What is the U.S. Government Doing?

The Department of Homeland Security (DHS) and Federal Bureau of Investigation (FBI) released a Joint Analysis Report (JAR), which provides details of the tools and infrastructure used by Russian intelligence services (RIS) to compromise and exploit networks and infrastructure associated with the recent U.S. election, as well as a range of U.S. government, political, and private sector entities. The JAR also arms network defenders with the tools they need to identify, detect, and disrupt Russia’s global campaign of malicious cyber activity. We urge users and administrators to use this information to better protect your networks.

What Is Spearphishing?

Spearphishing is the use of forged emails, texts, and other messages to manipulate users into opening malware or malicious software or clicking on malicious links.

Spearphishing attacks can lead to credential theft (e.g., passwords) or may act as an entry point for threat actors into an organization to steal or manipulate data and disrupt operations.

For more information, see the US CERT Tip on Avoiding Social Engineering and Phishing Attacks.

Screenshot of email that states: Incoming eFax: Elections Outcome could be revised [Facts of Elections Fraud]. Sent by Taylor Fax <securefaxsolutions@gmail.com> on Wednesday, November 9, 2016 at 10:39 To undisclosed-recipients. Attachment: election-headlines-FTE2016.docm (1.1 MB). Preview. eFax Solution. You have received a secure message from eFax Solution Corp. Please open the attachment election-headlines-FTE2016 in this email and enter PIN CODE: 3209. SUBJECT: ELECTIONS OUTCOME CUOLD BE REVISED [FACTS OF ELECTIONS FRAUD]. Please note: if you have trouble opening the message, please try the following 1. In your web browser, delete the temporary internet files and cookies. 2. Close the web browser. 3. Open the election-headlines-FTE2016 file in your secure email. End of screenshot.

Figure 1: Sample of Russian Post-Election Spearphishing

Lifecycle of Successful Spearphishing Operation. Starts on the left in Adversary Space, Russian Intelligence Services. Grizzly Steppe 1.) Leverages Operational Infrastructure (Neutral Space, in the middle) 2.) Crafts email with malicious link 3. ) Sent to Recipient (in Victim Space, on the right) 4.) Clicks on link and enters credentials into Website that looks legitimate (in Neutral Space), 5.) Gathers credentials in operational infrastructure, 6.) Uses credentials to Access Targeted System (in Victim Space) 7.) Install malicious files and 8.) Move through targeted systems and 9.) Gather Data of interested which is 10.) Exfiltrated to Operational Infrastructure (in Neutral Space).

Figure 2: Lifecycle of Successful Spearphishing Operation

What Information is in the JAR?

The JAR includes information on computers, servers, and other devices around the world that RIS uses to conduct command-and-control activity between compromised devices, send spearphishing emails, and steal credentials. The JAR identifies these devices by each one’s Internet Protocol (IP) address, which is a set of numbers that serves as an “address” for each computer and is used to transmit data between computers. Because RIS is using other people’s networks without their owners’ knowledge to hide their malicious activity, the computers at these IP addresses typically also host legitimate websites or other Internet services. In some cases, the cybersecurity community was aware of this infrastructure. In other cases, this information has been newly declassified by the U.S. government. The map in Figure 3 shows the 60 countries in which newly declassified IP addresses are located. The JAR also includes information on how RIS typically conducts their activities. This information can help network defenders understand how this adversary operates and can help identify new activity or disrupt ongoing intrusions by RIS.

Declassified IP Addresses by Country of Registration. United States: 47. Canada, Mexico, India, Iraq, Egypt, Turkey, Greece, Russia, Kazakhstan, Mongolia, Thailand, Cambodia, Malaysia, Indonesia, Vitenam, South Korea, Japan, Taiwan, Ukraine, Sweden, Finaldn, Poland, Slove, UK, Spaine, Italy, Austria, Poland, and Ghana: Less than 10. France: 12. Germany: 14. Netherlands: 20. China: 45.

Figure 3: Declassified Worldwide Infrastructure Co-Opted by Russian Intelligence Services

How You Can Protect Yourself and Your Networks

A commitment to good cybersecurity and best practices is critical to protecting networks and systems. Here are some questions you may want to ask of your organization to help prevent and mitigate against attacks.

  • Backups: Do we backup all critical information? Are the backups stored offline? Have we tested our ability to revert to backups during an incident?
  • Risk Analysis: Have we conducted a cybersecurity risk analysis of the organization?
  • Staff Training: Have we trained staff on cybersecurity best practices?
  • Vulnerability Scanning and Patching: Have we implemented regular scans of our networks and systems? Do we appropriately patch known system vulnerabilities?
  • Application Whitelisting: Do we allow only approved programs to run on our networks?
  • Incident Response: Do we have an incident response plan? Have we practiced it?
  • Business Continuity: Are we able to sustain business operations without access to certain systems? For how long?
  • Penetration Testing: Have we attempted to hack into our own systems to test the security of our systems and our ability to defend against attacks?

What to Do If You See Signs of Malicious Cyber Activity

If you find signs of malicious cyber activity, we encourage you report it to DHS’s National Cybersecurity and Communications Integration Center (NCCICCustomerService@hq.dhs.gov or 888-282-0870) or the FBI through your local field office or the FBI’s Cyber Division (cywatch@ic.fbi.gov or 855-292-3937).

This entry was posted in cybersecurity, Internet and tagged , , , , , , . Bookmark the permalink. Both comments and trackbacks are currently closed.
  • RSS The Membrane Domain

    • Picture Of A Black Hole
      by Daniel Brouse You can not really take a picture of a black hole. No light escapes from a black hole, so you won’t see anything. That is why it is called a black hole; however, theoretical astronomers have attempted to take the first picture. Instead, they try to piece together an image of a […]
    • VPN: Virtual Private Network and Internet Privacy
      by Daniel Brouse and Sidd Mukherjee Your Internet service provider (ISP) knows where you live, your address and billing info. They also know: all the IPs and domain names you visit and when all the content of your unencrypted traffic in and out, as well as, the timing The federal government now allows your ISP […]
    • Climate Change Breaks Multiple Records with Global Impacts
      The World Meteorological Organization (WHO) issued a report that states records for 2016: a record global temperature exceptionally low sea ice unabated sea level rise ocean heat Extreme weather and climate conditions have continued into 2017. “This report confirms that the year 2016 was the warmest on record – a remarkable 1.1 °C above the […]
  • Science experiment with the First Amendment:
    youtu.be/pvNzuqx75LI
    ...

    View on Facebook

    Thousands march for science through Old City ...

    View on Facebook
  • RSS PhilaNet.com

    • March For Science
      by Daniel Brouse PHILADELPHIA, PA — The March For Science protest was held in over 500 cities worldwide. The Trump administration has invented many fake news stories and alternative facts including climate change is a hoax, vaccines are dangerous and the best way to protect the environment is through economic growth. Hundreds of thousands of […]
    • Video Documentary of the History of Roxborough, Philadelphia
      PHILADELPHIA, PA — The Roxborough Manayunk Wissahickon Historical Society will feature guest speaker Nicholas Stamps “Video Documentary of the History of Roxborough, Philadelphia”. The event is free and open to the public. April 26th To be held at: Journey’s Way 403 Rector Street Philadelphia, PA 19128 @ 7 PM Guest Speaker — Mr. Nicholas Stamps […]
  • RSS NASA Image Of The Day

    • SLS Engine Section Test Article Loaded on Barge Pegasus
      A engine section structural qualification test article for NASA's new rocket, the Space Launch System, is loaded onto the barge Pegasus at the agency's Michoud Assembly Facility in New Orleans. The test article now will make its way from Michoud to NASA's Marshall Space Flight Center in Huntsville, Alabama, for structural loads testing.
  • RSS Natural Disasters

    • An error has occurred, which probably means the feed is down. Try again later.
  • Categories

  • Archives

Created by: Daniel Brouse and Sidd
All text, sights and sounds © BROUSE
"You must not steal nor lie nor defraud."