The official Website of Bernd Pulch. Since 2009 providing critical insights and political Satire on lawfare, media control, and political reality. Avoid fake sites.
Become a Patron! True Information is the most valuable resource and we ask you to give back.
IR-ALERT-H-16-043-01AP Cyber-attack Against Ukrainian Critical Infrastructure
Page Count: 17 pages Date: March 7, 2016 Restriction: For Official Use Only, TLP: Green Originating Organization: Department of Homeland Security, National Cybersecurity and Communications Integration Center File Type: pdf File Size: 377,931 bytes File Hash (SHA-256): 9207B47EF264A33335357A7FD5ACCE908D6D0963D73327EF97DEF84AB6F431C7
This alert update is a follow-up to the original NCCIC/ICS-CERT Alert titled IR-ALERT-H-16-043-01P Ukrainian Power Outage Event that was published February 12, 2016, on the US-CERT secure Portal library.
โโโ Begin Update A Part 1 of 2 โโโ
On December 23, 2015, Ukrainian power companies (Oblenergos) experienced an unprecedented cyber-attack causing power outages,which impactedover 225,000 customers in Ukraine. These attacks were conducted by remote cyber-attackers who, leveraging legitimate credentials obtained via unknown means, remotely operated breakers to disconnect power. While power has been restored, all the impacted Oblenergos continue to run under constrained operations. In addition, three other organizations, some from other critical infrastructure sectors, were also intruded upon but did not experienceoperational impacts. There have been public reports that indicate BlackEnergy (BE) malware was responsible for the attack. However,National Cybersecurity and Communications Integration Center (NCCIC)/Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) does not have sufficient supporting evidenceto confirm the role of BE but continues to conduct further analysis. If BE played a role, it was most likely in the reconnaissance and preparatoryphases, not during the actual attack. Many malware implants could have conducted this activity.
This incident highlights the urgent need for critical infrastructure owners and operators across all sectors to implement enhanced cyber measures that reduce risks from the following types of adversary techniques:
โข Theft of legitimate user credentials to enable access masquerading as approved users, โข Leveraging legitimate remote access pathways (VPNs), โข The remote operation of human-machine interface (HMI) via company installed remote access software (such as RDP, TeamViewer or rlogin) โข The use of destructive malware such as KillDisk to disable industrial control systems (ICSs) and corporate network systems โข Firmware overwrites that disable/destroy field equipment โข Unauthorized scheduled disconnects of uninterruptable power supplies (UPS) to devices to deny their availability โข The delivery of malware via spear-phishing emails and the use of malicious Microsoft Office attachments โข Use of Telephone Denial of Service (TDoS) to disrupt operations and restoration.
This report is being shared for situational awareness and network defense purposes. ICS-CERT strongly encourages organizations across all sectors to review and employ the mitigation strategies and detection mechanisms contained within this report.
DETAILS
An interagency team composed of representatives from the NCCIC/ICS-CERT, U.S. Computer Emergency Readiness Team (US-CERT), Department of Energy,Federal Bureau of Investigation, and the North American Electric Reliability Corporationtraveled to Ukraine to collaborate and gain more insight. The Ukrainian government worked closely and openly with the U.S. team and shared information to help prevent future cyber-attacks.
The following account of events is based on the interagency teamโs interviews with operations and information technology staff and leadership at six Ukrainian organizations with first-hand experience of the event. The team was not able to independently review technical evidence of the cyber-attack; however, a significant number of independent reports from the teamโs interviews, as well as documentary findings, corroborate the events as outlined below.
Through interviews with impacted entities, the team learned that power outages Ukraine experienced on December 23, 2015, were caused by remote cyber-attacks at three regional electric power distribution companies (Oblenergos), impacting approximately 225,000 customers. While power has been restored, all the impacted Oblenergos continue to run under constrained operations. In addition, three other organizations, some from other critical infrastructure sectors, were also intruded upon but did not experience operational impacts.
The team assesses that the attacks against the Oblenergos demonstrated some Tactics, Techniques, and Procedures (TTPs) that,while previously known, have not been previously observedin an actual cyber-attack. The cyber-attacks were reportedly synchronized and coordinated, probably following extensive reconnaissance of the victim networks.
After gaining a foothold in the victim networks, attackers acquired legitimate credentials and leveraged valid remote access pathways to conduct their attack.The physical impact events of the cyber-attacks launched within 30 minutes of each other, impacting multiple central and regional facilities. Over 50 regional substations experienced malicious remote operation of their breakers conducted by multiple external humans. This was done using either existing remote administration tools at the operating system level or remote ICS client software via virtual private network (VPN) connections.
All three impacted companies indicated that the actors wiped some systems by executing the KillDisk malware at the conclusion of the cyber-attack. The KillDisk malware erases selected files on target systems and corrupts the master boot record, rendering systems inoperable. It was further reported that in at least one instance, Windows-based HMIs embedded in remote terminal units were also overwritten with KillDisk. The actors also rendered Serial-to-Ethernet devices at substations inoperable by corrupting their firmware. In addition, the actors interrupted power to some data centers through scheduled power outages on server UPS via the remote management interface. The team assesses that these actions were done in an attempt to interfere with expected restoration efforts.
Initial intrusion appears to have been through malware,which was delivered via spear-phishing emails with malicious Microsoft Office attachments.While it has not been confirmed with technical artifacts, it is probable that the two events are related. While the cyber-attack has been widely attributed to BE in the open press, any remote access trojan could have been used in these attacks, and none of BEโs unique capabilities were leveraged. At this time,no definitive link can be drawn between the outage and the presence of the BEmalware, however analysis is ongoing.
Received: from SRV-EXMB01.kbp.ua (10.1.1.63) by SRV-EXMB01.kbp.ua (10.1.1.63) with Microsoft SMTP Server (TLS) id 15.0.712.22 via Mailbox Transport; Wed, 4 Mar 2015 18:59:59 +0000 Received: from SRV-EXCA02.kbp.ua (10.1.1.75) by srv-exmb01.kbp.ua (10.1.1.63) with Microsoft SMTP Server (TLS) id 15.0.712.22; Wed, 4 Mar 2015 18:59:57 +0000 Received: from [subdomain].[domain].[tld] (X.X.X.X) by SRV-EXCA02.kbp.ua (10.1.1.76) with Microsoft SMTP Server id 15.0.712.22 via Frontend Transport; Wed, 4 Mar 2015 18:59:57 +0000 X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: A0CeBACIVfdU/0P4lQXOEgECAgE X-IPAS-Result: A0CeBACIVfdU/0P4lQXOEgECAgE X-IronPort-AV: E=Sophos;i=โ5.09,689,1418083200โณ; d=โppsโ32,48?mfโ32,48?exeโ32,48,96?scanโ32,48,96,32,96,48,208,245,217โณ;a=โ574775โณ Received: from mail.baggins.biz ([XXX.XXX.XXX.XXX]) by [subdomain].[domain].[tld] with SMTP; 04 Mar 2015 18:59:53 +0000
Become a Patron! True Information is the most valuable resource and we ask you to give back.
Damaging Cyber Attacks Possible but Not Likely Against the US Energy Sector
Page Count: 8 pages Date: January 27, 2016 Restriction: For Official Use Only Originating Organization: Department of Homeland Security, Office of Intelligence and Analysis File Type: pdf File Size: 480,997 bytes File Hash (SHA-256): 9ED3BCA80DAAA980D8D92127D3CA4FF6FDBDB89E3D00B5412278733EA99C2EC9
(U//FOUO) This Assessment establishes a baseline analysis of cyber threats to the US energy sector based on comprehensive FY 2014 incident reporting data compiled by ICS-CERT, as well as reporting by the Intelligence Community (IC), private sector cybersecurity industry, and open source media between early 2011 and January 2016. This Assessment is designed to help close gaps between the private sectorโs and the ICโs understanding of current cyber threats facing the US energy sector. Critical infrastructure owners and operators can use this analysis to better understand cyber threats facing the US energy sector and help focus defensive strategies and operations to mitigate these threats. The Assessment does not include an in-depth analysis of foreign cyber doctrines or nation-state red lines for conducting cyber attacks against the United States. The information cutoff date for this Assessment is January 2016.
(U) Key Judgments
(U//FOUO) We assess the threat of a damaging or disruptive cyber attack against the US energy sector is low. We judge advanced persistent threat (APT) nation-state cyber actors are targeting US energy sector enterprise networks primarily to conduct cyber espionage. The APT activity directed against sector industrial control system (ICS) networks probably is focused on acquiring and maintaining persistent access to facilitate the introduction of malware, and likely is part of nation-state contingency planning that would only be implemented to conduct a damaging or disruptive attack in the event of hostilities with the United States.
(U//FOUO) We assess the majority of malicious activity occurring against the US energy sector is low-level cybercrime that is likely opportunistic in nature rather than specifically aimed at the sector, is financially or ideologically motivated, and is not meant to be destructive.
(U//FOUO) We assess that imprecise use of the term โcyber attackโ in open source media reporting and throughout the private sector has led to misperceptions about the cyber threat to the US energy sector.
โฆ
(U//FOUO) Advanced Persistent Threat Actors Not Likely To Conduct Damaging or Disruptive Attack
(U//FOUO) We assess the threat of a damaging or disruptive cyber attack against the US energy sector is low. We judge APT nation-state cyber actors are targeting US energy sector enterprise networks primarily to conduct cyber espionage. The APT activity directed against sector ICS networks probably is focused on acquiring and maintaining persistent access to facilitate the introduction of malware, and likely is part of nation-state contingency planning that would only be implemented to conduct a damaging or disruptive attack in the event of hostilities with the United States.
โฆ
(U//FOUO) Misperceptions about Cyber Threats in the Energy Sector
(U//FOUO) We assess imprecise use of the term โcyber attackโ in open source media reporting and throughout the private sector has led to misperceptions about the cyber threat to the US energy sector. The term โcyber attackโ is frequently used to refer to any cyber incident directed against the US energy sector. This overuse of the term โcyber attackโ creates an unnecessarily alarmist general view of the threat to the sector. โCyber attackโโwhich should denote intent to cause denial, disruption, destruction, or other negative effectsโis frequently used in the private sector to describe cyber espionage, and even low-level, untargeted incidents of cybercrime. Overuse of the term โcyber attack,โ risks โalarm fatigue,โ which could lead to longer response times or to missing important incidents.
Dhs Office, Dhs Michigan, Dhs Phone Number, Dhs Link, Dhs Live, Dhs Near Me, Dhs To Usd, Dhs Office Locator, Dhs Skokie, Dhs Child Care, Dhs Application, Dhs Adrian Mi, Dhs Assistance, Dhs Authorization, Dhs Application Online, Dhs Address, Dhs Apply Online, Dhs Allegan Mi, Dhs Ann Arbor, Dhs Apply, Dhs Battle Creek Mi, Dhs Bay City Mi, Dhs Billing, Dhs Building, Dhs Bridge Card, Dhs Benefits, Dhs Battle Creek Michigan, Dhs Big Rapids, Dhs Baldwin Mi, Dhs Background Check Michigan, Dhs Child Care, Dhs Clearance, Dhs Champs, Dhs Child Care Provider, Dhs Caseworker Lookup, Dhs Clio Rd, Dhs Caro Mi, Dhs Clio Road, Dhs Customer Service, Dhs Conner, Dhs Detroit, Dhs Daycare, Dhs Dearborn, Dhs Diecast, Dhs Directory, Dhs Department, Dhs Daycare Help, Dhs Disability, Dhs Dental, Dhs Definition, Dhs Emergency, Mdhhs Ems, Dhs Employment Verification Form, Mdhhs Email, Dhs Emergency Services, Dhs Email Address, Mdhhs Employee Directory, Dhs Equipment, Dhs Employment, Dhs Ebt, Dhs Flint Mi, Dhs Food Stamps, Dhs Flint, Dhs Forms, Dhs Fax Number, Dhs Fast, Dhs Food Assistance, Dhs Form 3200, Dhs Flint Michigan Clio Road, Dhs Form 3503, Dhs Greydale, Dhs Grand Rapids, Dhs Grand River Warren, Dhs Genesee County, Dhs Gladwin Mi, Dhs Greenfield, Dhs Gratiot 7 Mile, Dhs Gr Mi, Dhs Greenfield Joy, Dhs Gaylord Mi, Dhs Hours, Dhs Howell Mi, Dhs Holland Mi, Dhs Hillsdale Mi, Dhs Hartford Mi, Dhs Harrison Mi, Dhs Holland, Dhs Hastings Mi, Dhs Hart Mi, Dhs Home Health Care, Dhs Inkster, Dhs Ib Bio, Dhs In Pontiac Mi, Dhs Ibilling, Dhs In Lansing, Dhs In Detroit, Dhs In Redford Mi, Dhs In Michigan, Dhs In Taylor, Dhs Illinois, Dhs Jobs, Dhs Jackson Mi, Dhs Jobs In Michigan, Dhs Joy Road And Greenfield, Dhs Joy Rd, Dhs Joy, Dhs Job Opportunities, Dhs Jobs Mi, Dhs Job Openings, Dhs Jay Ok, Dhs Kalamazoo Mi, Dhs Kent County, Dhs Kalkaska, Dhs Kelly, Dhs Kalamazoo Login, Dhs Key Club, Dhs Klamath Falls Oregon, Dhs Knoxville, Dhs Kansas, Dhs Kentucky, Dhs Login, Dhs Lansing Mi, Dhs Lapeer Mi, Dhs Lansing Michigan, Dhs Locations, Dhs Lappin, Dhs Live, Dhs Logo, Dhs Lappin And Gratiot, Dhs Lansing Fax Number, Dhs Michigan, Dhs Management, Dhs Monroe Mi, Dhs Macomb, Dhs Medicaid, Dhs Muskegon Mi, Dhs Midland Mi, Dhs Main Office, Dhs Mt Clemens, Dhs Monroe Michigan, Dhs Near Me, Dhs Number, Dhs Number Lansing Mi, Dhs Novi Mi, Dhs Number On Lappin, Dhs News, Dhs New Hire Form, Dhs Novi, Dhs Near Me Hours, Dhs Nhs, Dhs Office, Dhs Oakland County, Dhs Office Detroit, Dhs Oregon, Dhs Okc, Dhs Online, Dhs Office Pontiac Mi, Dhs Office On Conners, Dhs Office On Lappin, Dhs Office On Plymouth, Dhs Phone Number, Dhs Pontiac, Dhs Port Huron Mi, Dhs Port Huron Michigan, Dhs Provider Login, Dhs Provider Payment Schedule 2017, Dhs Payment Dates 2017, Dhs Plymouth, Dhs Provider, Dhs Police, Dhs Questions, Dhs Questionnaire, Dhs Quincy Illinois, Dhs Quote, Dhs Questions And Answers, Dhs Qmb Program, Dhs Qhsr, Dhs Questionnaire Pdf, Dhs Quarterly Reports, Dhs Quincy, Dhs Rent Assistance, Dhs Redford, Dhs Royal Oak, Dhs Redetermination Application Michigan, Dhs Rochester Hills Mi, Dhs Ri, Dhs Reed City Mi, Dhs Royal Oak Mi, Dhs Rogers City Mi, Dhs Redetermination Form Medical, Dhs Sign In, Dhs Shampoo, Dhs Sandusky Mi, Dhs Ser, Dhs Saginaw Mi, Dhs Stanton Mi, Dhs Secretary, Dhs Services, Dhs Sterling Heights, Dhs Southfield Mi, Dhs Taylor Mi, Dhs To Usd, Mdhhs Training, Mdhhs Taylor, Dhs Traverse City, Dhs Twitter, Dhs Trip, Mdhhs Tb, Mdhhs Twitter, Mdhhs Third Party Liability, Dhs Union St, Dhs Unemployment, Dhs Unearned Income Notice, Dhs Uscis, Dhs Usa, Dhs Uscis Login, Dhs Uniform, Dhs Utah, Dhs Utility Assistance Michigan, Dhs Uscis Genealogy, Dhs Van Buren, Dhs Verification Of Assets, Dhs Van Dyke, Dhs Verification In Process, Dhs Vinelink, Dhs Verification Of Employment, Dhs Vine, Dhs Voice, Dhs Virginia, Dhs Va 20598, Dhs Website, Dhs Warren, Dhs Washtenaw County, Dhs Wayne County, Dhs Worker, Dhs Warren And Conner, Dhs Warren And Grand River, Dhs Wayne County Mi, Dhs Wayne County Number, Dhs Wic, Dhs X6006, Dhs Xc, Dhs X4002, Dhs X6002, Dhs X3002, Dhs X6007, Dhs X6006 Review, Dhs X Ray, Dhs X3002 Review, Dhs X5002, Dhs Ypsilanti Mi Hours, Dhs Ypsilanti Michigan, Dhs Ypsi, Dhs Ypsilanti, Dhs Ypsilanti Mi, Dhs Ypsilanti Hours, Dhs Yearbook, Dhs Yellville Ar, Dhs Youtube, Dhs Ypsilanti Mi Phone Number, Dhs Zinc Shampoo, Dhs Zinc Shampoo Walgreens, Dhs Zinc, Dhs Zinc Shampoo 16 Oz, Dhs Zinc Shampoo Target, Dhs Zinc Shampoo Cvs, Dhs Zinc Shampoo Review, Dhs Zip Code, Dhs Zambia, Dhs Zinc Body Wash, Cyber Attack Map, Cyber Attack 2017, Cyber Attack On Electrical Grid, Cyber Attack 2016, Cyber Attack Definition, Cyber Attack Statistics 2016, Cyber Attack Types, Cyber Attack Statistics, Cyber Attack News, Cyber Attack May 2017, Cyber Attack Articles, Cyber Attack Act Of War, Cyber Attack Ap Style, Cyber Attack Attribution, Cyber Attack April 2017, Cyber Attack Ap, Cyber Attack America, Cyber Attack Amazon, Cyber Attack Associated Press, Cyber Attack Airlines, Cyber Attack By North Korea, Cyber Attack Bank Of America, Cyber Attack Book, Cyber Attack Bitcoin, Cyber Attack Britain, Cyber Attack Bank, Cyber Attack Business, Cyber Attack British, Cyber Attack By Russia, Cyber Attack British Health Facilities, Cyber Attack Costs, Cyber Attack Consequences, Cyber Attack Case Study, Cyber Attack Cases, Cyber Attack Cry, Cyber Attack Chain, Cyber Attack Comcast, Cyber Attack Causes Physical Damage, Cyber Attack Cartoon, Cyber Attack China, Cyber Attack Definition, Cyber Attack Data, Cyber Attack Defense, Cyber Attack Detection, Cyber Attack Database, Cyber Attack Documentary, Cyber Attack Dallas, Cyber Attack Define, Cyber Attack Dictionary, Cyber Attack Ddos, Cyber Attack Examples, Cyber Attack Estonia, Cyber Attack Electrical Grid, Cyber Attack Effects, Cyber Attack Europe, Cyber Attack England, Cyber Attack Election, Cyber Attack Essay, Cyber Attack Ecmc, Cyber Attack Events, Cyber Attack Facts, Cyber Attack From North Korea, Cyber Attack Fedex, Cyber Attack Friday, Cyber Attack Fbi, Cyber Attack Florida, Cyber Attack France, Cyber Attack Future, Cyber Attack Facebook, Cyber Attack Fox, Cyber Attack Google, Cyber Attack Graph, Cyber Attack Government, Cyber Attack Grid, Cyber Attack Gif, Cyber Attack Graphic, Cyber Attack Groups, Cyber Attack Georgia, Cyber Attack Global Map, Cyber Attack Going On Now, Cyber Attack Healthcare, Cyber Attack Headlines, Cyber Attack Hospital, Cyber Attack Hyphen, Cyber Attack History, Cyber Attack Heat Map, Cyber Attack Homeland Security, Cyber Attack Hits Fedex, Cyber Attack Hostage, Cyber Attack Hero, Cyber Attack Insurance, Cyber Attack Images, Cyber Attack In Spanish, Cyber Attack Iran, Cyber Attack Icon, Cyber Attack In Usa, Cyber Attack In The Us, Cyber Attack Infrastructure, Cyber Attack International Law, Cyber Attack Insurance Coverage, Cyber Attack June 2017, Cyber Attack Jobs, Cyber Attack June 14 2017, Cyber Attack Japan, Cyber Attack June 13 2017, Cyber Attack Jokes, Cyber Attack June, Cyber Attack James Paget Hospital, Cyber Attack Jordan, Cyber Attack Jamaica, Cyber Attack Kill Chain, Cyber Attack Korea, Cyber Attack Killswitch, Cyber Attack Kansas, Cyber Attack Kaspersky, Cyber Attack Kaiser Permanente, Cyber Attack Kya Hai, Cyber Attack Kenya, Cyber Attack Kuwait, Cyber Attack Kings Mill Hospital, Cyber Attack Lifecycle, Cyber Attack Live Map, Cyber Attack Last Week, Cyber Attack List, Cyber Attack Laws, Cyber Attack London, Cyber Attack Live, Cyber Attack Losses, Cyber Attack Lifecycle Mitre, Cyber Attack Last Friday, Cyber Attack Map, Cyber Attack May 2017, Cyber Attack Map Norse, Cyber Attack Meaning, Cyber Attack Movie, Cyber Attack Methods, Cyber Attack Monitor, Cyber Attack Map Live, Cyber Attack Merriam Webster, Cyber Attack Meme, Cyber Attack News, Cyber Attack North Korea, Cyber Attack News Today, Cyber Attack Names, Cyber Attack Notification, Cyber Attack News 2016, Cyber Attack Netflix, Cyber Attack Now, Cyber Attack Nhs, Cyber Attack North Korea Missile, Cyber Attack On Electrical Grid, Cyber Attack Or Cyber-attack, Cyber Attack On North Korea, Cyber Attack On Us Power Grid, Cyber Attack On Us, Cyber Attack On Iran, Cyber Attack On Sony, Cyber Attack On Target, Cyber Attack On Healthcare, Cyber Attack On Usa, Cyber Attack Power Grid, Cyber Attack Prevention, Cyber Attack Phases, Cyber Attack Policy, Cyber Attack Pictures, Cyber Attack Phishing, Cyber Attack Prediction, Cyber Attack Protection, Cyber Attack Pdf, Cyber Attack Prevention Plan, Cyber Attack Quotes, Cyber Attack Qatar, Cyber Attack Questions, Cyber Attack Quora, Cyber Attack Queens Hospital Romford, Cyber Attack Qld Health, Cyber Attack Queensland Health, Cyber Attack Queensland, Cyber Attack Queens Hospital Burton, Cyber Attack Quiz, Cyber Attack Ransomware, Cyber Attack Response Plan, Cyber Attack Report, Cyber Attack Ransom, Cyber Attack Russia, Cyber Attack Recovery, Cyber Attack Right Now, Cyber Attack Real Time, Cyber Attack Recent, Cyber Attack Risks, Cyber Attack Statistics 2016, Cyber Attack Statistics, Cyber Attack Statistics 2017, Cyber Attack Stories, Cyber Attack Simulation, Cyber Attack Scenario, Cyber Attack Surface, Cyber Attack Statistics By Country, Cyber Attack Synonym, Cyber Attack Statistics 2015, Cyber Attack Types, Cyber Attack Trends, Cyber Attack Today, Cyber Attack Target, Cyber Attack Today 2017, Cyber Attack Timeline, Cyber Attack Threats, Cyber Attack Tools, Cyber Attack This Week, Cyber Attack Tracker, Cyber Attack Us Power Grid, Cyber Attack Us, Cyber Attack Uk, Cyber Attack Ukraine, Cyber Attack Usa, Cyber Attack Usa Today, Cyber Attack Usa 2017, Cyber Attack Us Companies, Cyber Attack Utilities, Cyber Attack Underway, Cyber Attack Vectors, Cyber Attack Visualization, Cyber Attack Vs Data Breach, Cyber Attack Video, Cyber Attack Virus, Cyber Attack Vs Cyber Attack, Cyber Attack Vulnerability, Cyber Attack Verizon, Cyber Attack Viewer, Cyber Attack Video Youtube, Cyber Attack Wanna Cry, Cyber Attack Wiki, Cyber Attack Website, Cyber Attack World Map, Cyber Attack Wells Fargo, Cyber Attack Wanna, Cyber Attack Worm, Cyber Attack Washington Post, Cyber Attack Wisconsin, Cyber Attack Whaling, Cyber Attack Xbox, Cyber Attack Xp, Cyber Attack Xp Patch, Cyber Attack Xp Only, Cyber Attack Xbox Live, Cyber Attack Team Xbox, Cyber Attack On Xbox And Playstation, Cat Cyber Attack Team Xbox, Cyber Sub Zero X Ray Attack, Xbox Cyber Attack Christmas, Cyber Attack Yahoo, Cyber Attack Youtube, Cyber Attack Yesterday, Cyber Attack Yorkshire, Cyber Attack York Hospital, Cyber Attack York, Cyber Attack Yeovil Hospital, Cyber Attack York Nhs, Cyber Attack Yesterday Hindi, Cyber Attack Uk, Cyber Attack Zomato, Cyber Attack Zee News, Cyber Attack Zero Day, Cyber Attack Zoho, Cyber Attack Zeus, Cyber Attack Ziggo, Cyber Zombie Attack, Cyber Attack New Zealand, Cyberbully Zombie Attack, Zappos Cyber Attack, Us Energy Information Administration, Us Energy Consumption, Us Energy Sources, Us Energy Independence, Us Energy Policy, Us Energy Corp, Us Energy Revolution, Us Energy Development Corporation, Us Energy Crisis, Us Energy Department, Us Energy Administration, Us Energy Association, Us Energy Advisors, Us Energy And Employment Report, Us Energy Assets, Us Energy And Commerce Committee, Us Energy And Employment Report 2016, Us Energy And Environment, Us Energy Agencies, Us Energy Arlington Tx, Us Energy By Source, Us Energy Budget, Us Energy Bill, Us Energy Boom, Us Energy Buffalo Ny, Us Energy Brokers, Us Energy By Type, Us Energy Board, Us Energy Balance, Us Energy Consumption, Us Energy Corp, Us Energy Crisis, Us Energy Consumption 2016, Us Energy Consumption By Sector, Us Energy Company, Us Energy Consumption Per Capita, Us Energy Consumption Per Year, Us Energy Crisis 1970s, Us Energy Corporation, Us Energy Development Corporation, Us Energy Department, Us Energy Demand, Us Energy Distribution, Us Energy Dependence, Us Energy Development, Us Energy Drink Market, Us Energy Demand Projections, Us Energy Data, Us Energy Drilling, Us Energy Exports, Us Energy Etf, Us Energy Efficiency, Us Energy Employment, Us Energy Exploration, Us Energy Efficiency Statistics, Us Energy Efficiency Market Size, Us Energy Engineers, Us Energy Employment Report, Us Energy Expenditures, Us Energy From Coal, Us Energy Facts, Us Energy From Renewable Sources, Us Energy Flow, Us Energy Future, Us Energy Flow 2016, Us Energy From Solar, Us Energy From Wind, Us Energy Forms, Us Energy Flow 2015, Us Energy Grid, Us Energy Generation, Us Energy Group, Us Energy Generation By Source, Us Energy Generation 2016, Us Energy Graph, Us Energy Genesis, Us Energy Generation Capacity, Us Energy Guide, Us Energy Gov, Us Energy History, Us Energy Holdings Llc, Us Energy Holdings, Us Energy High Yield, Us Energy High Yield Bond, Us Energy High Yield Index, Us Energy Heat Controls, Us Energy History Timeline, Us Energy High Yield Etf, Us Energy Hedge Funds, Us Energy Information Administration, Us Energy Independence, Us Energy Imports, Us Energy Industry, Us Energy Infrastructure, Us Energy Intensity, Us Energy Independence 2016, Us Energy Index, Us Energy Independence 2017, Us Energy Imports By Country, Us Energy Jobs, Us Energy Junk Bonds, Us Energy Junk Debt Sell-off Spreads, Us Energy Job Creation, Us Energy Jayson, Us Energy Job Losses, Us Japan Energy Cooperation, Us Renewable Energy Jobs, Us Wind Energy Jobs, Us Energy Association Jobs, Us Energy K1, Us Kinetic Energy Weapons, Us Kwh Energy Consumption, Us Kazakhstan Energy Partnership, Us Energy Louisville Ky, Us Energy Russell Ks, Us Energy Management Keswick, What Is Kinetic Energy, Us Energy Partners Russell Ks, Us Energy Cost Per Kwh, Us Energy Lighting, Us Energy Llc, Us Energy Laws, Us Energy Loan Program, Us Energy Login, Us Energy Logistics, Us Energy Lighting Inc, Us Energy Label, Us Energy Legislation, Us Energy Lp, Us Energy Mix, Us Energy Map, Us Energy Market, Us Energy Mix 2016, Us Energy Management, Us Energy Market Size, Us Energy Management Inc, Us Energy Minneapolis, Us Energy Market Share, Us Energy Mix 2017, Us Energy News, Us Energy Needs, Us Energy News Daily Digest, Us Energy New York, Us Energy Ny, Us Energy Natural Gas, Us Energy News Today, Us Energy News Articles, Us Energy Net Exporter, Us Energy Needs Per Year, Us Energy Oil And Gas, Us Energy Outlook, Us Energy Output, Us Energy Outlook 2016, Us Energy Organization, Us Energy Off The Grid, Us Energy Oil, Us Energy Overview, Us Energy Overview And Key Statistics, Us Energy Of Department, Us Energy Production, Us Energy Policy, Us Energy Production 2016, Us Energy Production By Source 2016, Us Energy Pie Chart, Us Energy Policy 2017, Us Energy Policy Timeline, Us Energy Partners, Us Energy Profile, Us Energy Plan, Us Energy Quads, Us Quadrennial Energy Review, Us Quadrennial Energy Review 2015, Us Energy Consumption Quadrillion Btu, Us Energy Stock Quote, Us Department Of Energy Q Clearance, Us Doe Quadrennial Energy Review, Energy Quest Usa, Us Energy Revolution, Us Energy Recovery, Us Energy Resources, Us Energy Reserves, Us Energy Report, Us Energy Renewable Percentage, Us Energy Regulations, Us Energy Recovery Glassdoor, Us Energy Rural Valley Pa, Us Energy Resources Llc, Us Energy Sources, Us Energy Subsidies 2016, Us Energy Secretary, Us Energy Sciences, Us Energy Subsidies, Us Energy Services, Us Energy Statistics, Us Energy Sources Over Time, Us Energy Sector, Us Energy Sources 2016, Us Energy Tax Credit, Us Energy Trends, Us Energy Tour, Us Energy Types, Us Energy Trade Balance, Us Energy Transition, Us Energy Technologies, Us Energy Tour Greeley, Us Energy Trump, Us Energy Use, Us Energy Use Per Capita, Us Energy Use By Sector, Us Energy Usage Per Year, Us Energy Use By Type, Us Energy Use Compared To World, Us Energy Use 2016, Us Energy Use Chart, Us Energy Use Pie Chart, Us Energy Use Vs World, Us Energy Vidalia Ga, Us Energy Vortex Locations, Us Energy Vct, Us Energy Vortex Map, Us Venture Energy, Us Energy Consumption Vs World, Us Energy Rural Valley Pa, Us Energy Solutions Virginia Beach, Us Energy Production Vs Consumption, Us Energy Genesis Vi, Us Energy Waste, Us Energy Wiki, Us Energy Weapons, Us Energy Windows & Doors Inc, Us Energy Waste Statistics, Us Energy Windows And Doors, Us Energy Windows Las Vegas, Us Energy Website, Us Energy Windows, Bold Like Us Energy X Plus, Us Figure Skating Xcel Energy, Blu Bold Like Us Energy X, Us Energy Yatesboro Pa, Us Yearly Energy Consumption, Us Energy New York, Us Energy High Yield, Us Energy High Yield Bond, Us Energy High Yield Index, Us Energy High Yield Etf, Us Energy High Yield Spread, Us Energy High Yield Bond Index, Us Energy Imports By Year, Us Energy Zones, Us Energy Zone Map, Us Energy Climate Zones, Us Solar Energy Zones, Us Energy Star Zones, Us Department Of Energy’s Zip-code Insulation Program, Us Doe Zero Energy, Us Department Of Energy Zip Code
Become a Patron! True Information is the most valuable resource and we ask you to give back.
The U.S. should brace itself for more attacks like one on the U.S. Office of Personnel Managementโin which millions of sensitive government records were stolen, the director of the National Security Agency warned on Wednesday
The U.S. government last week said that two cyberattacks on the agency compromised more than 21 million Social Security numbers, 1.1 million fingerprint records, and 19.7 million forms with data that could include a personโs mental-health history.
โI donโt expect this to be a one-off,โ said Navy Adm. Mike Rogers, who heads the NSA and the U.S. militaryโs Cyber Command.
The incident is causing the government to review cybersecurity policies, he added. โAs we are working through the aftermath of OPM,โ Adm. Rogers said one of the questions is โwhat is the right vision for the way forward in how we are going to deal with things like this.โ
Cyber Command, though responsible for protecting Defense Department networks, wasn’t charged with defending the Office of Personnel Managementโs system, he added.
Director of National Intelligence James Clapper last month said China is suspected to be behind the hack.
Adm. Rogers likened the hacking of U.S. government records to last yearโs attack on Sony Pictures Entertainment, which revealed sensitive company information. He said such events required a governments and companies to step back and review procedures.
Adm. Rogers was speaking at the London Stock Exchange as part of an outreach effort to the financial sector to raise awareness of cybersecurity threats.
โWe are in a world now where, despite your best efforts, you must prepare and assume that you will be penetrated,โ he told the group. โIt is not about if you will be penetrated, but when,โ he said.
David Omand, the former head of the U.K. Government Communications Headquarters, said at the event that the average cost of a breach on U.S. companies is around $20 million. U.K. figures suggest a lower cost, though he said those may be too conservative.
Adm. Rogers said companies and the government needed to work together to protect networks. โCyber to me is the ultimate partnership. There is no single entity out there that is going to say: โdonโt worry, Iโve got this.โโ
Become a Patron! True Information is the most valuable resource and we ask you to give back.
Malicious Cyber Actors Target US Universities and Colleges
5 pages
For Official Use Only
January 16, 2015
(U//FOUO) We assess that the primary cyber threat to US university and college networks is cybercrime and unwitting hosting of malicious activity, likely because the regular turnover of student network users and requirements for accessibility to the networks make the networks difficult to monitor and secure.
(U//FOUO) We assess malicious cyber actors targeting intellectual property and research are the emerging cyber threat facing university and college networks. Cutting-edge research and sensitive US government and cleared defense contractor projects are appealing targets for cyber actors looking to gain access to sensitive research programs and information.
(U//FOUO) University Networks Face Common Cyber Threats
(U//FOUO) Malicious cyber actors have targeted US universities and colleges with typical cybercrime activities, such as spear phishing students and faculty with university-themed messages, creating fake university websites, and infecting computers with malicious software, likely in an attempt to gain access to student and faculty e-mail and bank accounts. We have no indication that cybercriminals target university systems and users more than any other cybercrime victims.
ยป (U//FOUO) According to sensitive DHS reporting, several different types of malware designed to gather personally identifiable information (PII) and exploit computer systems for financial gainโransomware, clickfraud malware, and credential-harvesting malwareโwere found on computer systems of an identified US university in late August 2014. We do not know if PII was compromised or exfiltrated as a result of these infections.
ยป (U//FOUO) In February 2014, unknown cyber actors targeted departments at an identified US university with phishing messages containing malicious links, according to FBI reporting. Computers of recipients that responded were infected with ransomware requiring victims to pay between $50 and $500 to decrypt their computers, according to FBI reporting.
ยป (U//FOUO) In early 2014, malicious cyber actors successfully executed an e-mail phishing attack against 166 employees at an identified US university. The phishing message was embedded with a malicious link to a fraudulent university website that, when accessed, prompted employees to provide PII associated with their financial accounts. The actors successfully compromised the financial accounts of two employees, changing their direct deposit information so that money was delivered to an unspecified US bank, resulting in financial losses for the employees, according to an FBI contact with excellent access.
(U//FOUO) US universities and colleges have extensive computer networks and infrastructure making them ideal targets for unwitting hosting of malicious cyber operations, including denial-of-service (DoS) attacks and undetected storage of malware. As with cybercrime, we have no indication that malicious cyber actors target university and college networks for these activities any more than other networks.
ยป (U//FOUO) In early 2014, an unidentified cyber actor leveraged a supercomputer at an identified US university to initiate a DoS attack against the servers of several identified US businesses that host servers for gaming activities, according to an FBI source with indirect access. The attack used about 98 percent of the universityโs bandwidth.
ยป (U//FOUO) Unidentified cyber actors used a named US universityโs web server as a file repository for distributing malicious tools, according to sensitive DHS reporting. Analysis of the web server confirmed that a number of malicious tools had been uploaded to the system, as of mid-2014.
(U//FOUO) University Networks May Be Target for Cyberespionage
(U//FOUO) While malicious cyber actors looking to exploit university and college networks for PII remain a consistent threat, we assess that the emerging cyber threat facing US university and college networks is cyberespionage actors seeking information and intellectual property. In addition to in-house, cutting-edge research, numerous US universities and colleges are involved in sensitive US government and cleared defense contractor research projects. These associations are very appealing to cyberespionage actors looking to gain access to sensitive research programs to exfiltrate information. University networks, which often have multiple levels of connectivity and accessibility to fuel collaboration, may present an easier target for cyberespionage actors than sensitive government or private industry networks. We have only a few examples of data exfiltration from university networks, but those we have lead us to judge that this activity does target research information and intellectual property.
ยป (U) According to reporting from a US cybersecurity firm, likely Iranian cyber actors, as part of a global espionage campaign, targeted universities in the United States, India, Israel, and South Korea from 2012 to late 2014. The cyber actors targeted research efforts, student information, student housing, and financial aid systems. According to the security firm, the cyber actors reportedly harvested confidential critical infrastructure documents from major educational institutions around the world.
ยป (U) A late-2013 review of the infrastructure associated with a probable foreign cyberespionage campaign indicated broad targeting of university computer systems, including those in the United States, the United Kingdom, and Israel, according to DHS reporting. The unknown actors successfully exfiltrated sensitive research information associated with university-affiliated medical organizations, including passwords and passport images.
Become a Patron! True Information is the most valuable resource and we ask you to give back.
The following bulletins were released in late May by the FBI to private industry partners and discuss attempts by malicious cyber actors to exploit government and private industry networks and employees, including their family members, using targeted campaigns involving false personas on various social media platforms.ย The bulletins were originally posted on the website of The Security Awareness Company.
(U) Law enforcement has become aware that foreign cyber adversaries are utilizing popular social network sites to assess, target and successfully conduct computer network exploitation activities against:
US federal, state and local government and private academic and industry networks
Individual employees of US federal, state and local government and private academic and industries
Family members and personal and/or professional associates of these employees and private citizens with high visibility
It is advised that industry use due diligence to inform and educate their associates on the vulnerabilities associated with the use of social networking sites.
โฆ
(U) The FBI and NCIS believe a group of cyber actors have been using various social networking sites to conduct spear phishing activities since at least 2011. FBI and NCIS investigation to date has uncovered 56 unique Facebook personas, 16 domains, and a group of IP addresses associated with these actors. These personas typically would attempt to befriend specific types of individuals such as government, military, or cleared defense contractor personnel. After establishing an online friendship the actor would send a malicious link (usually through one of the associated domains) to the victim, either through e-mail or in a chat on the social networking site eventually compromising the targetโs computer. While this FLASH specifically deals with Facebook personas, it is believed that many of these personas also maintain a presence on other social networking sites such as LinkedIn, Google +, and Twitter which are just as malicious. This group of cyber actors also has created and maintained multiple malicious Web sites, often spoofing a legitimate Web site and implanting malicious links into the actorโs version of the Web site.
TECHNICAL DETAILS
(U) Based on investigative efforts, the FBI and NCIS believe the following names and Facebook User IDs (FBUID) are associated with fake personas and are involved in spear phishing activities on Facebook and additional social networking sites:
You must be logged in to post a comment.