Persistent attacks target critical infrastructure, US-CERT says
- By Lauren C. Williams
- Oct 24, 2017
Attacks have been targeting domain controllers and file and email servers of critical infrastructure systems and government networks over the past five months or more, according to an alert on advanced persistent threat activity from the U.S. Computer Emergency Readiness Team.
The FBI and the Department of Homeland Security, which conducted the analysis, determined the attacks are part of an ongoing "multi-stage intrusion campaign." Attackers used spearphishing emails from compromised attacks to penetrate "low security and small networks to gain access and move laterally to networks of major, high value asset owners within the energy sector," U.S. CERT said in its Oct. 20 alert.
Attackers typically gain access through peripheral third-party organizations such as suppliers that tend to have less secure networks. Those networks then become "pivot points and malware repositories" for threat actors when attacking the intended victims. Once the intended victim's networks have been accessed, attackers implant remote control software on the systems with a focus on "identifying and browsing file servers," CERT wrote in its alert.
Networks spanning the manufacturing, aviation, nuclear and water sectors were affected.
The analysis corroborated a Symantec's Dragonfly 2.0 report released in September. The report found that a sophisticated hacking group, Dragonfly 2.0, was behind potentially disruptive cyberattacks on energy sectors in Europe and North America in recent years.
DHS and Symantec previously said that the attacks weren't a public safety hazard and that a worst-case scenario would be if an attacker "successfully disrupted or destroyed systems that manage critical energy infrastructure."
A June report from Dragos Inc. not mentioned in the U.S. CERT alert found a similar malware threat targeting industrial control systems. That analysis showed that the malware dubbed CrashOverride was an improvement on previous frameworks developed by Dragonfly and BlackEnergy 2.
This article was first posted to FCW, a sibling site to GCN.
Lauren C. Williams is a staff writer at FCW covering defense and cybersecurity.
Prior to joining FCW, Williams was the tech reporter for ThinkProgress, where she covered everything from internet culture to national security issues. In past positions, Williams covered health care, politics and crime for various publications, including The Seattle Times.
Williams graduated with a master's in journalism from the University of Maryland, College Park and a bachelor's in dietetics from the University of Delaware. She can be contacted at email@example.com, or follow her on Twitter @lalaurenista.
Click here for previous articles by Wiliams.