Obama, Feds outline technical, spear phishing details, sanctions vs. Russia over cyber attacks

1483054200 ris attacks

The Obama administration along with the Department of Homeland Security and Federal Bureau of Investigation have released the technical details behind ongoing cyber attacks from Russian intelligence groups.

Obama on Thursday outlined a series of sanctions on Russia’s two intelligence services and officers for an ongoing hacking campaign on U.S. targets. The White House also said 35 Russian intelligence were ejected and two compounds in the U.S. were shut down.

ADVERTISEMENT

The details of the sanctions can be found in the statement and executive order, which outlines the groups involved. The sanctions come after months of hacking allegations against Russia during the U.S. election cycle.

While the sanctions will garner most of the attention, the analysis from the DHS and FBI is what security, business and technology leaders should read. By releasing the details, U.S. public and private firms will be able to better defend future attacks.

In a statement, President Obama said:

The Department of Homeland Security and the Federal Bureau of Investigation are releasing declassified technical information on Russian civilian and military intelligence service cyber activity, to help network defenders in the United States and abroad identify, detect, and disrupt Russia’s global campaign of malicious cyber activities.

According to the joint analysis report from the DHS and FBI, Russian military intelligence services used spear phishing to probe networks tied to the U.S. election. The U.S. government lumped the activity under the moniker Grizzly Steppe.

Spear phishing refers to fraudulent email that targets a group with the aim of gathering access to confidential data.

Tech Pro Research: How risk analytics can help your organization plug security holes | Template: Information security incident reporting policy | Security awareness and training policy | Special Report: Cyberwar and the Future of Cybersecurity | Governments and nation states are now officially training for cyberwarfare: An inside look | Cybercrime and cyberwar: A spotter’s guide to the groups that are out to get you

Now the report doesn’t directly attribute the attacks to Russia or any other countries, but does note technical indicators point to Russia.

According to the DHS and FBI, spear phishing was used against government organizations, infrastructure entities, think tanks, political groups and corporations. The report noted that Russian actors “masqueraded as third parties, hiding behind false online personas designed to cause the victim to misattribute the source of the attack.”

Here’s the flow chart of two attacks in the summer of 2015 and spring 2016.

ris-attacks.png

Among the core takeaways:

  • Spear fishing campaigns used web links to code that is executed and can avoid defenses.
  • Domains in the campaigns mimic targeted organizations.
  • Command and control nodes harvest credentials.
  • These attacks most recently appeared in November after the U.S. election.

The report also provided a signature that can be used to comb networks.

ris-signature.png

What’s a network admin to do? The report said:

DHS recommends that network administrators review the IP addresses, file hashes, and Yara signature provided and add the IPs to their watchlist to determine whether malicious activity has been observed within their organizations. The review of network perimeter netflow or firewall logs will assist in determining whether your network has experienced suspicious activity.

When reviewing network perimeter logs for the IP addresses, organizations may find numerous instances of these IPs attempting to connect to their systems. Upon reviewing the traffic from these IPs, some traffic may correspond to malicious activity, and some may correspond to legitimate activity. Some traffic that may appear legitimate is actually malicious, such as vulnerability scanning or browsing of legitimate public facing services (e.g., HTTP, HTTPS, FTP). Connections from these IPs may be performing vulnerability scans attempting to identify websites that are vulnerable to cross-site scripting (XSS) or Structured Query Language (SQL) injection attacks. If scanning identified vulnerable sites, attempts to exploit the vulnerabilities may be experienced.

In the end, the report recommends that groups use cybersecurity best practices including training, risk analysis, scanning and patching and incident response.

(via PCMag)

ADVERTISEMENT

ADVERTISEMENT
Just in:
AVPN Charts Path Forward at 2024 Global Conference // Lee Chong Wei Shows Up On Chinese Hot cultural Talk Show “SHEDE Wisdom Talents”, Talking About “Crossing The Hill” // Astana International Exchange Connects with Regional Markets Through Tabadul Hub // CBN Targets User Accounts // New Dynamics in Cryptocurrency Security: ZUHYX Builds the Strongest Fund Protection System // Etihad Airways Announces Paris Service with A380 // UAE President, Spanish Prime Minister Hold Phone Talks // Andertoons by Mark Anderson for Thu, 25 Apr 2024 // PolyU forms global partnership with ZEISS Vision Care to expand impact and accelerate market penetration of patented myopia control technology // NetApp’s 2024 Cloud Complexity Report Reveals AI Disrupt or Die Era Unfolding Globally // Booming Region Fuels Innovation Surge // UAE Scrutinizes Report on Racial Discrimination Treaty // Lai & Turner Law Firm PLLC Welcomes Eric Strocen as Director of Family Law Division // Telecom Giant Du Eyes Crypto Integration for FinTech Platform // UAE and Ecuador Set Course for Economic Pact // Cairo Recognizes Arab World’s Creative Luminaries at Award Ceremony // ESG Achievement Awards 2023/2024 is Open for Application, Celebrating Innovative Sustainable Practices and Responsible Risk Management // Election Commission Has A Dismal Record On Acting Against Modi’s Breaches Of Poll Code // Dubai Gears Up for Second FinTech Summit as Funding Surges // Central Bank of Nigeria Debunks Rumors of Crypto Account Freeze //