Western Energy Companies Under Sabotage Threat 86
An anonymous reader writes In a post published Monday, Symantec writes that western countries including the U.S., Spain, France, Italy, Germany, Turkey, and Poland are currently the victims of an ongoing cyberespionage campaign. The group behind the operation, called Dragonfly by Symantec, originally targeted aviation and defense companies as early as 2011, but in early 2013, they shifted their focus to energy firms. They use a variety of malware tools, including remote access trojans (RATs) and operate during Eastern European business hours. Symantec compares them to Stuxnet except that "Dragonfly appears to have a much broader focus with espionage and persistent access as its current objective with sabotage as an optional capability if required."
Dragonfly by Symantec (Score:5, Funny)
I read The group behind the operation, called Dragonfly by Symantec as that Symantec had a group called Dragonfly, and they were performing the espionage.
And my thought processes didn't toss that out as being unreasonable.
Re:Dragonfly by Symantec (Score:4, Insightful)
I read it the same way. A well placed comma would go a long way...
Or a properly placed quotation:
The group behind the operation, called "Dragonfly" by Symantec
Re: (Score:2)
Re: (Score:1)
That anti-malware companies have been the source of malware is a constant rumor. Ever since the Internet was opened to the public. And, before.
I remember the days when sneaker-net was used even among Macs on the first AppleTalk networks at the company that I worked at. One network kept getting viruses. A consultant was called in to find and eliminate the virus. This happened several times before they discovered the source of the virus was a 3.5" floppy disk that the virus-busting consultant gave to an
Dragonfly by Symantec... hey, that could sell! (Score:2)
you know it's working by the buzz your production machinery makes on the other side of the office wall. well, almost more or a roar....
Re:How is this any different than any other day? (Score:5, Insightful)
Bingo. (Score:1)
I work for a "western energy company."
We have dozens of sites, and a half dozen huge ones as they're power stations.
We have 3 network techs and 2 security people that are constantly traveling hundreds of miles to reach them all. But somehow we have 5 Sharepoint people... (God I hate management)
Re: (Score:2)
Staff numbers could be cut, fewer real experts would be needed.
The networks are not hardened or unique to a plant or site. Too much consumer grade software and networking open to the outside world was used.
This is not news, was not unexpected and is an ongoing issue due to cost cuts and staffing
Attribution (Score:4, Interesting)
"...the group mostly worked between Monday and Friday, with activity mainly concentrated in a nine-hour period that corresponded to a 9am to 6pm working day in the UTC +4 time zone."
Which government has working days like that? Is it the Russians?
Re: (Score:3, Informative)
Re: (Score:3)
No, it would not... Government bureaucracy so rigid that we can have much better guesses than that. We should be able to eliminate most countries in this range, and their enemies to accommodate false-flag ops, and subtract according to capability. You get a short-list and then you just wait for the smoking gun.
Re: (Score:2)
It is also reasonable to assume that any government sanctioned, or even criminal/mafia types would use just that type of info to hide their own involvement. Location and time are really pretty useless.
Re: (Score:2)
Who is using code, paying for code, where it is uploaded or controlled from can be well covered from a list of nations.
So many groups in gov, mil, the private cyber security contracting sector sector have really been pushing stories like this for the past decades.
The tame press, AC's, academics and sock puppets then drum up the need for expensive products and new cyber laws
Re: (Score:3)
"The International situation is desperate, as usual"
-- Tom Robbins
Re: (Score:3)
Iran? If they start work at 8:00.
Re: (Score:2)
Iran? If they start work at 8:00.
Iran 46 Saturday-Thursday 8 and 6hours Thursdays
- https://en.wikipedia.org/wiki/... [wikipedia.org]
Well well well!
Israel: Sunday-Thursday, 8.5h
Russia: Monday-Friday, 8h
United Arab Emirates: Sunday-Thursday, 8h
Saudi Arabia: Sunday-Thursday, 10h
China: Monday-Friday, hours unlisted.
So the short-list got shorter. Here I was thinking everybody worked the same days.
Usual business hours in Russia:
Banks 8am or 9am-5pm or 6pm Mon-Fri
Offices 8am or 9am-5pm or 6pm Mon-Fri
- http://www.lonelyplanet.com/ru... [lonelyplanet.com]
Russia has no shortage of enemies who might false-flag them, but the short-list is still manageable. Dragonfly probably won't be able to move much without being attributed.
Thr
Re: (Score:3)
That brings us to means. Who has the capability to launch a campaign of this scope and duration? Anybody can launch a cyberattack, but relatively few countries have the resources to
Re: (Score:2)
Lots of software gets tested, lost, sold, re built and re tested in the wild by many different groups.
A nation state would have real staff, real experts and real connections to the power sector to test all they like without any code needing a live test.
Why show your hand even if you need to test live? Why risk your skilled tight code floating around for
Re: (Score:2)
A better question is "which hackers have working days like that"? Why would anyone expect criminals to work 9-to-5 jobs? I'd expect something more along the line of noon-to-hey-let's-go-get-piss-drunk-and-sleep-in-until-noon.
Re: (Score:3)
No, there is no 'easy' solution to security and people like you are why it's harder than it should be. Security is an ongoing process, not something you just install. The minute you forget about that little detail is the minute that you get pawned.
That's the easy part.
Re: (Score:2)
No it hasn't. It gets lots of code audits, which eliminate buffer overflows and the like, but does nothing to prevent properly operating malicious software. You want "trusted" computing for security against internal threats, and OpenBSD doesn't do it. Something like RHEL with SELinux properly configured and working, would offer better resilience to the kinds of attacks in question.
OpenBSD was no more immun
No airgap? (Score:4, Interesting)
Re: (Score:3)
Re: (Score:3)
Worst case, replace the keyboard with something like the Optimus Maximus keyboard with the keys changing characters every time a password is asked.
What really is needed are what we had before everything got linked to the Internet. We need separate networks. Examples of this would be SIPRnet, NIPRNet, and GRU's equivalents.
Yes, this network can be hacked, but it adds an additional barrier -- one has to hack the network (which likely will be designed with this in mind from the ground up), forge access as a
Re: (Score:2)
Oh good! Now all I need to do is find a way to insert my hacked keyboard into the bunch from your order, and I can pwn your airgapped network in short order.
Once my malware is in, of course it'll spread over the insecure (no updates for systems on an air-gapped network) private network. From there, it could just cause everything t
Re:No airgap? (Score:5, Insightful)
I've done a couple of projects with engineering companies including one at a power plant. From what I've seen, the thing that tends to lead from air gapping to lack of airgapping is support.
The engineering companies don't have the IT infrastructure experience or skills in their engineering practice. They hired me to do basic stuff like SAN setup, switch configuration, VMware, etc.
The engineering company is required to provide support for their subsystem for a period of a couple of years and this includes everything IT related. Their office is hundreds of miles from the plant so problems with the IT environment require them to fly someone out. This is expensive, the guy who goes out has limited troubleshooting and they turn to me.
But they don't want to pay for my services on site, so ultimately they end up ungapping the environment so it can be supported with less cost. They have some security -- VPN only and possibly other restrictions which limit VPN connectivity, but they break the air gap.
They could maintain the air gap, but it would cost money -- support and travel costs, etc.
Ideally the engineering company would make IT systems part of their practice, but I think a lot of engineers have an "I'm an engineer" mentality which makes them they're good at everything, so they see this as unnecessary. They could negotiate with the plant to engage their IT resources, but that would cost them money.
Re: (Score:3)
Re:No airgap? (Score:5, Funny)
I am an engineer, but I agree with your assessment - I feel fully qualified to act as a doctor. None of my patients have complained, but if by chance one were to survive and make a fuss, I feel sufficiently competent as a lawyer that I'm sure I'd be okay.
Re: (Score:2)
Ultimately, it's a profit problem. Increased costs == lower profits (at least in the short term). Possibly over the long term, a security breach could cost more than the cost of an airgapped solution.
Alternatively, if the
Re: (Score:3)
Re: (Score:2)
These systems aren't just ignorantly plugged-in to an internet connection. But still, you NEED to be able to input data to them, including software updates, and you NEED to get data out, like real-time status updates sent to grid operators. Having someone typing-in every bit of data won't work, and connecting it to internet-connected syste
Welcome to the future! (Score:3)
People no longer have an expectation of privacy, according to Mark Zuckerberg.
Corporations are people, according to recent laws.
Ergo please stop whining, what goes around comes around, much like an enrichment centrifuge PLC : ).
Re: (Score:1)
Corporations are people, according to recent laws.
Only if you consider 1819 to be "recent."
https://en.wikipedia.org/wiki/... [wikipedia.org]
Re: (Score:2)
Solar panels/wind turbines/batteries (Score:2)
Comment removed (Score:3)
Re:perhaps a slice of crow for the US? (Score:5, Interesting)
In the current case, it would appear that Russia doesn't accept the U.S. argument that civilian infrastructure should be off-limits. Whether the U.S. can complain here or not is debatable. The U.S. has targeted civilian infrastructure during conventional operations; they knocked out the power in Serbia during actions in Kosovo, for example. So the Russians could easily argue- and not without merit- that if it's OK to take out the power in Serbia using a stealth bomber and a conventional bomb, it ought to be OK to turn out the lights in the U.S. using a logic bomb.
Re: (Score:2)
The Iranian nuclear plant is a power plant. But of course you are actually referring to the nuclear enrichment facilities which can be dual purpose civilian/military.
Re: (Score:2)
The Iranians had documents from AK Khan on how to construct the fissible core of the weapon including blueprints. They've claimed they didn't request them and that they had no intention of using them but the fact remains they had plans for constructing a weapon. There have also been other documents that were provided by intelligence agencies such as the persian powerpoint presentation on how to build a reentry vehicle for an ICBM.
The evidence is hardly non-existent.
Re: (Score:2)
Dresden. Hamburg. Hiroshima. Nagasaki.
Numerous other cities in both Germany and Japan.
Step back to the 1800s, and we have Sherman's Neckties between Atlanta and Savannah (civilian railroads torn up by Union troops in Sherman's Army).
And that's just the USA.
Coventry.
Nanking.
Too many others to count....
Re: (Score:2)
The only reason the US doesn't bomb power plants is because this is counter to US interests. The US doesn't need to bomb the power plant to accomplish their objectives, and it is one less mess to deal with once they move into the decade-long mop-up before we give up and pull out.
If the US were dealing with an adversary where it actually could lose the war, the power plants would be gone in the first night. They're trivial to disrupt. Bridges, road junctions, you name it would all be on the target list.
Re: (Score:2)
Your summary is just absolutely AWFUL. Obviously, no Canadian pipelines were damaged... Instead the CIA had a Canadian company sabotage their own SCADA software, knowing that the Soviet KGB was going to steal their pipeline control systems, with that software on it.
Secondly, it's a story from a single source, unconfirmed, that has been disputed by others. So it may actually hav
It's the Russians (Score:4, Insightful)
- UTC+4 is one time-zone east of moscow;
- it shifted to energy supplying firms with the beginning of the crisis in Ukraine (where Russia's gas delivieries are considered as the its only trump)
- it's either Russia or China in general
Re: (Score:2)
Decentralized power ? (Score:2)
TBH I'd be more worried... (Score:3)
... about the ones Symantec doesn't know about. :)
Also, I don't remember Symantec doing anything useful since like, forever. I remember them for purchasing Norton Utilities and turning them into a bloated mess. Should we trust them on this, or is their marketing department manufacturing a threat?
Why is the UK missing? (Score:2)
Re: (Score:2)
MI6 warned the UK gov and was privately able to secure the power sector over a very long time.
GCHQ was working with the power sector over a very time.
The UK power sector is air gapped with unionized staff at each site unreachable by most modern internet code floating around.
All the other nations listed rebuilt their power sectors with a series of open internet connections. Very few top staff member with laptops could complete their tasks off site via the internet at a lower cost.
The only aspec
remote access trojans (RATs) (Score:2)
autoplay.
DRAGONFLY (Score:2)
NSA operations are spelt with capitals.
Oh, you mean western countries including the U.S., Spain, France, Italy, Germany, Turkey, and Poland are currently the victims of an ongoing cyberespionage campaign, launched by somebody apart from the NSA as well?