Thursday, 21 August 2014

HACKED US: U.S. Nuclear agency hacked—Foreign Governments are Suspected

HACKED US:

U.S. Nuclear agency hacked—Foreign Governments are Suspected

21 AUG 2014
An internal report at the Nuclear Regulatory Commission (NRC) has revealed that the agency had been hacked three times in the last three years by unspecified foreigners and a third unknown person or group, but what was stolen remains unknown, the Government Executive reports.
U.S. Nuclear agency hacked—Foreign Governments are Suspected
One incident involved emails sent to about 215 NRC employees in "a logon-credential harvesting attempt," according to an Inspector General report Nextgov obtained through an open-records request.
However, it is still unclear whether the foreigners have any ties to a specific government, with former FBI cyber official Shawn Henry arguing that the attack may even be incidental and not related to the NRC at all, since automated malware might “not specifically [targeted] NRC, but rather any computer that might inadvertently deploy the malware.”. He also said that the intruders could have been "foreign, but not necessarily tied to a nation state.An overseas individual could be using, perhaps, malware bought off the online black market.
The phishing emails asked personnel to verify their user accounts by clicking a link and logging in. The link really did was to take the victims to "a cloud-based Google spreadsheet."
A dozen NRC personnel took the bait and clicked the link. The IG Cyber Crime Unit was able to "track the person who set up the spreadsheet to a foreign country," the report states, without identifying the nation.
It is unknown what the NRC employees actually put on the spreadsheet, said commission spokesman David McIntyre. "Based on the mere fact of clicking on the link, NRC cleaned their systems and changed their user profiles," he said. 
As the overseer of the U.S. nuclear power industry, NRC maintains records of value to overseas aggressors, including databases detailing the location and condition of nuclear reactors. Plants that handle weapons-grade materials submit information about their inventories to one such system, according to a 2000 IG report on efforts to protect critical infrastructure systems.  
So it is pretty clear that this kind of hacks in such big organizations are making U.S National Security a child-toy.
According to the new report, hackers also attacked commission employees with targeted spear phishing emails that linked to malicious software. A URL embedded in the emails connected to "a cloud-based Microsoft Skydrive storage site," which stored the malware, investigators wrote. "There was one incident of compromise and the investigation tracked the sender to a foreign country." Again, the country is not named in the report. 
In another case, intruders broke into the personal email account of an NRC employee and sent malware to 16 other personnel in the employee's contact list. A PDF attachment in the email contained a JavaScript security vulnerability. One of the employees who received the message became infected by opening the attachment, McIntyre said. 
To trace the origins of the attack, investigators subpoenaed an Internet service provider for records regarding the day the initial victim's email account was hacked.
"But the ISP had no log records for that date that were relevant to this incident, since the logs had been destroyed," McIntyre said. It was not possible identify the offender without the logs, the IG assessment states.It might be that the hackers used some paid VPNs which offer its customers log delete policy for better anonymity.
The inspector general in 2010 initiated the report to document possible NRC computer breaches. IG staff tallied 17 compromises or attempted compromises before closing the investigation in November 2013. That is probably gonna happen this year too.
McIntyre said that the commission always take their computer networks security seriously. To prevent this kind of attack every NRC employee is required to complete annual cyber training that deals with phishing, spear-phishing and other attempts to obtain illicit entry into agency networks.

"The NRC’s computer security office detects and thwarts the vast majority of such attempts, through a strong firewall and reporting by NRC employees," he said. "The few attempts documented in the OIG cyber crimes unit report as gaining some access to NRC networks were detected and appropriate measures were taken."
 The investigators have suspected the Foreign Governments for this hack.

"An organization like the NRC would be a target for nation states seeking information on vulnerabilities in critical infrastructure," said Richard Bejtlich, chief security strategist for cybersecurity company FireEye. A variety of countries, for instance, would be interested in the results of the commission's safety audits, which typically are kept private, he said.
"Clearly, the spearphishing is a technique that we've seen the Chinese and the Russians use before," said Adam Segal, director of the digital and cyberspace policy program at the Council on Foreign Relations. "Using the general logic, a nation state is going to be more interested in the NRC than you would imagine common criminals would be."

Federal systems are constantly probed by hackers, but those intrusions are not always successful.

No comments:

Post a Comment