briefly.co
Open in
urlscan Pro
54.237.159.171
Public Scan
URL:
https://briefly.co/anchor/privacy_professionals/story/why-the-private-sector-is-key-to-stopping-russian-hacking-gro...
Submission: On December 10 via api from GB — Scanned from GB
Submission: On December 10 via api from GB — Scanned from GB
Form analysis
0 forms found in the DOMText Content
TodayBrowse Sign upLog in Click any sentence to highlight it. Sign up / Log in to save. Welcome to Briefly your tl;dr for the Internet You can use Briefly to save content for yourself and to share across your social networks, including Twitter and LinkedIn. Your highlights contribute to organized feeds, curated by real people like you who care about the same topics. Together we can build a better newsfeed! More about Briefly. Welcome to Briefly your tl;dr for the Internet. About Briefly Highlight and share articles Build a better feed for yourself and others Dark Reading Why the Private Sector Is Key to Stopping Russian Hacking Group APT29 Problem with this article? Report As the Russian cyber threat heats up, it is becoming clearer that the protection of US and European national interests is increasingly in the hands of civilians at IT and software companies. American and European IT businesses that on the surface have nothing to do with the government are unwittingly serving as stepping-stones for enemy state cyberattacks and espionage campaigns. If these attacks are successful, they could not only have devastating effects on government and military secrets but also jeopardize trust in the software supply chain that is increasingly at the heart of the modern economy. During recent months, my company, along with other large companies, including Microsoft, have seen the Russian hacking group APT29 - blamed for the massive SolarWinds cyberattack and the 2015 infiltration of the Democratic National Committee - quietly trying to gain access to large IT companies, mainly those that offer cloud-based software services to businesses and government organizations. The threat of damage looms large, especially because the agile and deep-pocketed group shows no signs of stopping. APT29 will continue to target individual workers at software supply chain companies, mainly through phishing campaigns, and use hard-to-detect, unique tools to turn these service providers into proxies for carrying out espionage attacks against sensitive targets like military or government agencies. APT29 is not interested in Microsoft or other IT companies themselves, or even in their direct customers, which offer customized cloud software products. Rather, they intend to use them as proxies to attack subscribers and users further down the chain, which may include defense companies, government agencies, or contractors with valuable or classified information. Governments, contractors, and corporations increasingly rely on cloud services, partly for the flexibility they allow for services from multiple software vendors. In a recent case we mitigated at a cloud-based software company, APT29 did not attempt to take or otherwise compromise any data from the large software company itself. Rather, the hackers attempted to find which individuals in the software company hold information about or are connected to customers that are the ultimate targets. They initially reached these employees through phishing campaigns, and then were able to use a unique tool to take over and use their legitimate network connections as proxies to potentially reach the ultimate targets but remain undetected. The tool, which we discovered, does not siphon off information, but rather just allows the hackers to use accounts and connections as proxies to reach other targets. This targeting of certain employees, based on their potential connections to eventual targets, is a unique and new approach for APT29. It's a tedious process that the hackers carried out over time, perhaps for nearly a year, undetected inside the software supplier. Although this was the same group that the US government has blamed for the SolarWinds attack, this attack, from what we saw, was quite different. In this case, the hackers sought out possible connections only to certain customers of the software company rather than simply targeting everyone through a malicious software update as happened in the SolarWinds attack. The fine-tuned nature of the attacks points to the operatives receiving guidance and other intelligence beforehand from their handlers. Once the cyberattackers are inside software service providers, they gain not just the access but also the knowledge needed to carry out sophisticated phishing attacks on valuable targets that are connected to the software suppliers. It is easy to see how those working at the targets themselves would open up emails, and even download attachments that look like they come from their software service providers. Ultimately, this can lead to malware on the networks of government organizations and defense companies that allows the attackers ongoing access to valuable or classified information. This shows that no matter how well protected the end targets may think they are, there is increasingly a backdoor via their software supplier or anyone they have digital connections with. Because these actors are relying mainly on phishing to get into the software suppliers and the actual targets further down the chain, there is no easy technological solution, like patching a list of vulnerabilities. All of this means it is largely up to humans inside private-sector companies to prevent such attacks through the usual, although often ignored, methods, like using multifactor authentication and teaching employees to recognize phishing attempts. Our intelligence indicates that APT29 and other state actors will continue to target software supply chain companies, especially those that serve the military, defense, or key technology sectors in the US and Europe. The growing cloud computing sector is expected to be worth $1.25 trillion by 2028, and is vital to managing everything from infrastructure to supply chains to online banking. If not well secured, the software supply chain will continue to pose an enormous risk to national security and the economy. Continue Continue More in Privacy professionals * UK urged to review lobbying rules after former privacy chief joins law firm * Planned Parenthood LA Breach Compromises 400,000 Patients' Data * The infrastructure law just gave a boost to controversial driver-monitoring AI tech companies * Indonesian Court Allows Internet Blocking During Unrest, Tightening Law Enforcement Control Over Users' Communications and Data * Malware Attack, Mitigation Techniques and Malware Analysis * Virtual Worlds, Real People: Human Rights in the Metaverse * Researchers Explore Microsoft Outlook Phishing Techniques * Opinion | We Need Less Talk and More Action From Congress on Tech * Canadian Ransomware Arrest Is a Meaningful Flex, Experts Say * Computer Networking Part Two: What is The Internet Invite AboutPrivacyTerms of UseSupportBlogFor content owners PrivacyLegalSupportFor content owners … Cookie Control Close Icon THIS SITE USES COOKIES TO STORE INFORMATION ON YOUR COMPUTER. Some of these cookies are essential, while others help us to improve your experience by providing insights into how the site is being used. I AcceptI Do Not Accept -------------------------------------------------------------------------------- NECESSARY COOKIES Necessary cookies enable core functionality such as page navigation and access to secure areas. The website cannot function properly without these cookies, and can only be disabled by changing your browser preferences. -------------------------------------------------------------------------------- ANALYTICAL COOKIES Analytical cookies help us to improve our website by collecting and reporting information on its usage. Show vendors within this category Analytical CookiesOnOff -------------------------------------------------------------------------------- About this tool(Opens in a new window)External Link Icon Cookie Control