{"id":19023,"date":"2022-05-12T06:10:12","date_gmt":"2022-05-12T14:10:12","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2022\/05\/12\/news-12756\/"},"modified":"2022-05-12T06:10:12","modified_gmt":"2022-05-12T14:10:12","slug":"news-12756","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2022\/05\/12\/news-12756\/","title":{"rendered":"Cyberattacks on SATCOM networks attributed to Russian threat actors"},"content":{"rendered":"<p><strong>Credit to Author: Pieter Arntz| Date: Thu, 12 May 2022 13:22:00 +0000<\/strong><\/p>\n<p>The Cybersecurity &amp; Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) have updated their joint cybersecurity advisory, <a href=\"https:\/\/www.cisa.gov\/uscert\/ncas\/alerts\/aa22-076a\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Strengthening Cybersecurity of SATCOM Network Providers and Customers<\/a>, originally released March 17, 2022, with US government attribution to Russian state-sponsored malicious cyberactors.<\/p>\n<h2>Critical infrastructure<\/h2>\n<p>When we touched on the subject a few months ago, we explained why we think <a href=\"https:\/\/blog.malwarebytes.com\/vital-infrastructure\/2022\/03\/satellites-are-critical-infrastructure-and-need-to-be-cybersecured\/\">satellites are critical infrastructure<\/a>. Commercial satellites provide us with the ability to establish services like Internet access, television, GPS, and scientific information about the weather and other processes in the atmosphere and on the surface.<\/p>\n<p>On March 17, 2022, the Cybersecurity &amp; Infrastructure Security Agency (CISA) published an\u00a0<a href=\"https:\/\/www.cisa.gov\/uscert\/ncas\/alerts\/aa22-076a\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">alert<\/a>\u00a0in conjunction with the Federal Bureau of Investigation (FBI) which warned of possible threats to US and international satellite communication (SATCOM) networks.<\/p>\n<p>Along with that alert came a&nbsp;<a href=\"https:\/\/www.cisa.gov\/uscert\/sites\/default\/files\/publications\/AA22-076_Strengthening_Cybersecurity_of_SATCOM_Network_Providers_and_Customers.pdf\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">report<\/a>&nbsp;that provided mitigation strategies for SATCOM providers and their customers. And, as part of CISA\u2019s&nbsp;<a href=\"https:\/\/www.cisa.gov\/shields-up\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Shields Up<\/a>&nbsp;initiative, all organizations are being asked to significantly lower their threshold for reporting and sharing indications of malicious cyberactivity.<\/p>\n<h2>Spill over<\/h2>\n<p>The United States believes Russia launched cyberattacks in late February against commercial satellite communications networks to disrupt Ukrainian command and control during the Russia invasion, and those actions had spillover impacts into other European countries.<\/p>\n<p>In the months leading up to and after Russia\u2019s invasion began, Ukraine experienced a series of disruptive cyber operations, including website defacements, <a href=\"https:\/\/blog.malwarebytes.com\/security-world\/2022\/04\/ukraine-government-and-pro-ukrainian-sites-hit-by-ddos-attacks\/\">distributed denial-of-service (DDoS) attacks<\/a>, and cyberattacks to delete data from computers belonging to government and private entities.<\/p>\n<p>For example, the United States has assessed that Russian military cyber operators have deployed multiple families of destructive wiper malware, like <a href=\"https:\/\/blog.malwarebytes.com\/threat-intelligence\/2022\/03\/hermeticwiper-a-detailed-analysis-of-the-destructive-malware-that-targeted-ukraine\/\">HermeticWiper<\/a>, on Ukrainian Government and private sector networks.<\/p>\n<p>Now, the US is sharing publicly its assessment that Russia launched cyberattacks in late February against commercial satellite communications networks to disrupt Ukrainian command and control during the invasion, and those actions had spillover impacts into other European countries.<\/p>\n<h2>Defense<\/h2>\n<p>In order to uphold the rules-based international order in cyberspace, the US and its allies and partners are taking steps to defend against Russia\u2019s actions. The US government has developed new mechanisms to help Ukraine identify cyberthreats and recover from cyberincidents.<\/p>\n<p>CISA has exchanged technical information on cybersecurity threats related to Russia\u2019s further invasion of Ukraine with key partners, including Ukraine.<\/p>\n<h2>Mitigation guidance<\/h2>\n<p>On March 17, 2022 CISA issued an <a href=\"https:\/\/www.cisa.gov\/uscert\/sites\/default\/files\/publications\/AA22-076_Strengthening_Cybersecurity_of_SATCOM_Network_Providers_and_Customers.pdf\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">alert<\/a> providing technical details and mitigation guidance on possible threats to US and international SATCOM networks. A quick recap:<\/p>\n<ul>\n<li>Use secure methods for authentication.<\/li>\n<li>Enforce principle of least privilege through authorization policies.<\/li>\n<li>Review existing trust relationships with IT service providers.<\/li>\n<li>Implement independent encryption across all communications links leased from, or provided by, your SATCOM provider.<\/li>\n<li>Strengthen the security of operating systems, software, and firmware, including vulnerability and patch management.<\/li>\n<li>Monitor network logs for suspicious activity and unauthorized or unusual login attempts.<\/li>\n<li>Create, maintain, and exercise a cyberincident response plan, resilience plan, and continuity of operations plan so that critical functions and operations can be kept running if technology systems\u2014including SATCOM networks\u2014are disrupted or need to be taken offline.<\/li>\n<\/ul>\n<p>Stay safe, everyone!<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/vital-infrastructure\/2022\/05\/cyberattacks-on-satcom-networks-attributed-to-russian-threat-actors\/\">Cyberattacks on SATCOM networks attributed to Russian threat actors<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/vital-infrastructure\/2022\/05\/cyberattacks-on-satcom-networks-attributed-to-russian-threat-actors\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Pieter Arntz| Date: Thu, 12 May 2022 13:22:00 +0000<\/strong><\/p>\n<p>CISA and the FBI are sharing information about the US attribution of cyberattacks on SATCOM networks that targeted Ukraine but spilled over into other European countries.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/vital-infrastructure\/2022\/05\/cyberattacks-on-satcom-networks-attributed-to-russian-threat-actors\/\">Cyberattacks on SATCOM networks attributed to Russian threat actors<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[23583,6627,25145,4175,251,25511,8642,21437],"class_list":["post-19023","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-cisa","tag-fbi","tag-hermeticwiper","tag-infrastructure","tag-russia","tag-satcom","tag-ukraine","tag-vital-infrastructure"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/19023","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=19023"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/19023\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=19023"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=19023"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=19023"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}