{"id":18314,"date":"2022-02-18T10:45:06","date_gmt":"2022-02-18T18:45:06","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2022\/02\/18\/news-12047\/"},"modified":"2022-02-18T10:45:06","modified_gmt":"2022-02-18T18:45:06","slug":"news-12047","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2022\/02\/18\/news-12047\/","title":{"rendered":"US Agencies Say Russian Hackers Compromised Defense Contractors"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/620d9afad88b0a9fa5094bd6\/master\/pass\/Security-Russia-FBI-Hack-974960822.jpg\"\/><\/p>\n<p><strong>Credit to Author: Dan Goodin, Ars Technica| Date: Thu, 17 Feb 2022 21:05:00 +0000<\/strong><\/p>\n<p class=\"BylineWrapper-iiTsTb hAGfXd byline bylines__byline\" data-testid=\"BylineWrapper\" itemprop=\"author\" itemtype=\"http:\/\/schema.org\/Person\"><span itemprop=\"name\" class=\"BylineNamesWrapper-dbkCxf erRIa-D\"><span data-testid=\"BylineName\" class=\"BylineName-cKXFOb UCAzg byline__name\"><a class=\"BaseWrap-sc-TURhJ BaseText-fFzBQt BaseLink-gZQqBA BylineLink-eZnyPI eTiIvU mEZDb fNdcwQ bKZMMS byline__name-link button\" href=\"\/author\/dan-goodin-ars-technica\">Dan Goodin, Ars Technica<\/a><\/span><\/span><\/p>\n<p>To revist this article, visit My Profile, then <a href=\"\/account\/saved\">View saved stories<\/a>.<\/p>\n<p>To revist this article, visit My Profile, then <a href=\"\/account\/saved\">View saved stories<\/a>.<\/p>\n<p><span class=\"lead-in-text-callout\">Hackers backed by<\/span> the Russian government have breached the networks of multiple US defense contractors in a sustained campaign that has revealed sensitive information about US weapons-development communications infrastructure, the federal government said on Wednesday.<\/p>\n<p class=\"paywall\">This story originally appeared on <a data-offer-url=\"https:\/\/arstechnica.com\/information-technology\/2022\/02\/us-says-russian-state-hackers-lurked-in-defense-contractor-networks-for-months\/\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/arstechnica.com\/information-technology\/2022\/02\/us-says-russian-state-hackers-lurked-in-defense-contractor-networks-for-months\/&quot;}\" href=\"https:\/\/arstechnica.com\/information-technology\/2022\/02\/us-says-russian-state-hackers-lurked-in-defense-contractor-networks-for-months\/\" rel=\"nofollow noopener\" target=\"_blank\">Ars Technica<\/a>, a trusted source for technology news, tech policy analysis, reviews, and more. Ars is owned by WIRED&#x27;s parent company, Cond\u00e9 Nast.<\/p>\n<p class=\"paywall\">The campaign began no later than January 2020 and has continued through this month, according to a <a data-offer-url=\"https:\/\/www.cisa.gov\/uscert\/ncas\/alerts\/aa22-047a\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.cisa.gov\/uscert\/ncas\/alerts\/aa22-047a&quot;}\" href=\"https:\/\/www.cisa.gov\/uscert\/ncas\/alerts\/aa22-047a\" rel=\"nofollow noopener\" target=\"_blank\">joint advisory<\/a> by the FBI, the National Security Agency, and the Cybersecurity and Infrastructure Security Agency. The <a href=\"https:\/\/www.wired.com\/tag\/hackers\/\">hackers<\/a> have been targeting and successfully hacking cleared defense contractors, or CDCs, which support contracts for the US Department of Defense and intelligence community.<\/p>\n<p class=\"paywall\">\u201cDuring this two-year period, these actors have maintained persistent access to multiple CDC networks, in some cases for at least six months,\u201d officials wrote in the advisory. \u201cIn instances when the actors have successfully obtained access, the FBI, NSA, and CISA have noted regular and recurring exfiltration of emails and data. For example, during a compromise in 2021, threat actors exfiltrated hundreds of documents related to the company\u2019s products, relationships with other countries, and internal personnel and legal matters.\u201d<\/p>\n<p class=\"paywall\">The exfiltrated documents included unclassified CDC-proprietary and export-controlled information. This information gives the <a href=\"https:\/\/www.wired.com\/tag\/russia\/\">Russian government<\/a> \u201csignificant insight\u201d into US weapons-platforms development and deployment timelines, plans for communications infrastructure, and specific technologies being used by the US government and military. The documents also include unclassified emails among employees and their government customers discussing proprietary details about technological and scientific research.<\/p>\n<p class=\"paywall\">The advisory said:<\/p>\n<p class=\"paywall\"><em>These continued intrusions have enabled the actors to acquire sensitive, unclassified information, as well as CDC-proprietary and export-controlled technology. The acquired information provides significant insight into U.S. weapons platforms development and deployment timelines, vehicle specifications, and plans for communications infrastructure and information technology. By acquiring proprietary internal documents and email communications, adversaries may be able to adjust their own military plans and priorities, hasten technological development efforts, inform foreign policymakers of U.S. intentions, and target potential sources for recruitment. Given the sensitivity of information widely available on unclassified CDC networks, the FBI, NSA, and CISA anticipate that Russian state-sponsored cyber actors will continue to target CDCs for U.S. defense information in the near future. These agencies encourage all CDCs to apply the recommended mitigations in this advisory, regardless of evidence of compromise.<\/em><\/p>\n<p class=\"paywall\">The hackers have used a variety of methods to breach their targets. The methods include harvesting network passwords through <a href=\"https:\/\/www.wired.com\/tag\/phishing\/\">spear phishing<\/a>, <a href=\"https:\/\/www.wired.com\/tag\/data-breaches\/\">data breaches<\/a>, cracking techniques, and exploitation of unpatched <a href=\"https:\/\/www.wired.com\/tag\/vulnerabilities\/\">software vulnerabilities<\/a>. After gaining a toehold in a targeted network, the threat actors escalate their system rights by mapping the Active Directory and connecting to domain controllers. From there, they\u2019re able to exfiltrate credentials for all other accounts and create new accounts.<\/p>\n<p class=\"paywall\">The hackers make use of virtual private servers to encrypt their communications and hide their identities, the advisory added. They also use \u201csmall office and home office (SOHO) devices, as operational nodes to evade detection.\u201d In 2018, Russia was caught <a data-offer-url=\"https:\/\/arstechnica.com\/information-technology\/2018\/05\/fbi-seizes-server-russia-allegedly-used-to-infect-500000-consumer-routers\/\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/arstechnica.com\/information-technology\/2018\/05\/fbi-seizes-server-russia-allegedly-used-to-infect-500000-consumer-routers\/&quot;}\" href=\"https:\/\/arstechnica.com\/information-technology\/2018\/05\/fbi-seizes-server-russia-allegedly-used-to-infect-500000-consumer-routers\/\" rel=\"nofollow noopener\" target=\"_blank\">infecting more than 500,000 consumer routers<\/a> so the devices could be used to infect the networks they were attached to, exfiltrate passwords, and manipulate traffic passing through the compromised device.<\/p>\n<p class=\"paywall\">These techniques and others appear to have succeeded.<\/p>\n<p class=\"paywall\">\u201cIn multiple instances, the threat actors maintained persistent access for at least six months,\u201d the joint advisory stated. \u201cAlthough the actors have used a variety of malware to maintain persistence, the FBI, NSA, and CISA have also observed intrusions that did not rely on malware or other persistence mechanisms. In these cases, it is likely the threat actors relied on possession of legitimate credentials for persistence, enabling them to pivot to other accounts, as needed, to maintain access to the compromised environments.\u201d<\/p>\n<p class=\"paywall\">The advisory contains a list of technical indicators admins can use to determine if their networks have been compromised in the campaign. It goes on to urge all CDCs to investigate suspicious activity in their enterprise and cloud environments.<\/p>\n<p class=\"paywall\"><em>This story originally appeared on<\/em> <a data-offer-url=\"https:\/\/arstechnica.com\/information-technology\/2022\/02\/us-says-russian-state-hackers-lurked-in-defense-contractor-networks-for-months\/\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/arstechnica.com\/information-technology\/2022\/02\/us-says-russian-state-hackers-lurked-in-defense-contractor-networks-for-months\/&quot;}\" href=\"https:\/\/arstechnica.com\/information-technology\/2022\/02\/us-says-russian-state-hackers-lurked-in-defense-contractor-networks-for-months\/\" rel=\"nofollow noopener\" target=\"_blank\"><em>Ars Technica<\/em><\/a><em>.<\/em><\/p>\n<p><a href=\"https:\/\/www.wired.com\/story\/us-says-russian-hackers-compromised-defense-contractors\" target=\"bwo\" >https:\/\/www.wired.com\/category\/security\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/620d9afad88b0a9fa5094bd6\/master\/pass\/Security-Russia-FBI-Hack-974960822.jpg\"\/><\/p>\n<p><strong>Credit to Author: Dan Goodin, Ars Technica| Date: Thu, 17 Feb 2022 21:05:00 +0000<\/strong><\/p>\n<p>Kremlin-backed cyber actors lurked in the networks for months, obtaining sensitive documents related to weapons and infrastructure development.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10607],"tags":[714,21358],"class_list":["post-18314","post","type-post","status-publish","format-standard","hentry","category-security","category-wired","tag-security","tag-security-cyberattacks-and-hacks"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/18314","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=18314"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/18314\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=18314"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=18314"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=18314"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}