Last weekend, Cybersecurity and Infrastructure Security Agency Director Christopher Krebs issued a statement warning about elevated malicious Internet activity from state-sponsored actors in Iran. The notice corresponded to new warnings from private security research firms, including Recorded Future, of a surge in preparatory activity over the past three months by APT33, a threat group connected to the Iranian government and Iranian Revolutionary Guard Corps (IRGC, Iran's military).
In an interview with Ars, Krebs explained that the reason for the warning went beyond that "regional activity"—attacks on Saudi Arabian companies and other organizations in the Persian Gulf and South Asia.
"Over the course of the last couple of weeks, and in particular last week I'd say, [the activity] became specifically directed," he said. A "sense of the community"—reports from US intelligence and other agencies, as well as private sector cybersecurity vendors—showed a significant leap in spear-phishing attacks connected to infrastructure associated with APT33 against targets in the US over the past week, Krebs said. "So you combine that increase in activity with a historic intentionality and demonstrated ability, after previous destructive campaigns, and it was time to make a statement and say, 'Hey look, everybody, this is heating up. And politically it is also heating up… We need to step up our game.'"
Watching out for phishes
CISA is a very new agency within DHS created last year by Congress and charged with taking on domestic cybersecurity and critical infrastructure security activities. Formed out of the Department of Homeland Security's National Protection and Programs Directorate and the US Computer Emergency Readiness Team, CISA has a wide mandate that includes efforts to coordinate protection of the security of US election systems and to help federal, state, and local agencies better secure themselves against other information security and infrastructure risks.
But CISA's role is, outside of the federal government, largely advisory. The agency has cybersecurity advisors who work with major industry groups associated with critical infrastructure, of which election infrastructure is just a small part. As Krebs put it, the agency (including its US CERT component) is an "integrator" of information from multiple sources, including the Office of the Director of National Intelligence and the components of the intelligence community and private information security partners.
While Krebs' statement warned of wiper attacks, he noted, "We haven't seen any malicious payloads yet, but my primary concern was that this is more than just an uptick—this is a dramatic increase in activity." Previous spikes in activity have been associated with attacks, Krebs continued, "whether you're talking about data deletion attacks, wiper attacks, or classic ransomware. And there has also been a pretty dramatic increase in ransomware activity in the US—now, I'm not attributing that to Iran, but the bigger trend I think, and this is kind of my sense of the community, is that ransomware attacks are on the rise."
Both the Iranian malicious activities and ransomware attacks are largely dependent on exploiting the same sorts of security issues. Both rely largely on the same tactics: malicious attachments, stolen credentials, or brute-force credential attacks to gain a foothold on targeted networks, usually using readily available malware as a foothold to use those credentials to then move across a network.
When asked if the recent ransomware attacks on cities across the US (including three recent attacks in Florida with dramatically larger ransom demands) were indicative of a new, more targeted set of campaigns against US local governments, Krebs said that the attacks were likely not targeted—at least not initially.
"I still think these [ransomware campaigns] are fairly expansive efforts, where [the attackers] are initially scanning, looking for certain vulnerabilities, and when they find one that's when they start to target," he said. "Again, I'm not sure we have the information right now saying they were specifically targeted. There was probably a down-select on the bigger target that they had pulled a little extra on it based on what they found in initial scanning. But I think you're right in that we're seeing a change in the M.O.—they're going for the higher payout."
Those bigger payouts are in turn helping ransomware operators to further develop their capabilities, Krebs explained. "That money is going back into the business model to increase the sophistication and the capabilities—these guys aren't just saying, 'Boom, I'm done,' and moving the arrow. These guys are investing in themselves; they're building their capabilities. They're highly sophisticated operations with things customer service. It's really, truly turning into a line of business."
We're going to need a bigger boat
That surging threat is, in many ways, just as big a threat as a state actor—if not larger—as more state and local agencies are affected. "That's where I think we've got a lot to do—work in the federal government, to state, local governments, and work in Congress," Krebs said. "What are we going to do here to make it harder for the bad guys to be successful? How are we going to shore up these systems, and do it in a way that is reasonable to the people that actually own the network to do it with their own resources with help from the federal government? So, we aRead More – Source