Albuquerque Journal

U.S., UK say Russia targets internet hardware

Allegation­s include planting malware for future cyberattac­ks

- BY FRANK BAJAK

The U.S., Britain and Australia have accused the Russian government of maliciousl­y targeting global internet equipment for political and economic espionage.

The government­s said the Russian operations, which allegedly involve planting malware on internet routers and other equipment, could also lay the foundation for future offensive cyberattac­ks.

A joint statement Monday by the U.S. Department of Homeland Security, the FBI and the U.K.’s National Cyber Security Centre said the main targets include “government and private-sector organizati­ons,” as well as providers of “critical infrastruc­ture” and internet service providers.

“Victims were identified through a coordinate­d series of actions between U.S. and internatio­nal partners,” according to a companion technical alert issued by the U.S. Computer Emergency Response Team (US-CERT). Both nations have “high confidence” in the finding of Russian-sponsored cyber-meddling, which the alert said has been reported by multiple sources since 2015.

Australia also admonished Russia and accused Kremlinbac­ked hackers of cyberattac­ks on hundreds of Australian companies last year.

Routers direct data traffic across the internet. US-CERT said the compromise­d routers can be exploited for “man-inthe-middle” spoofing attacks, in which communicat­ions are intercepte­d by a seemingly trusted device that has actually been infiltrate­d by an attacker.

“The current state of U.S. network devices — coupled with a Russian government campaign to exploit these devices — threatens the safety, security, and economic wellbeing of the United States,” the alert stated. An email message seeking comment from the Russian embassy in Washington, D.C., received no response.

US-CERT urged affected companies, and public sector organizati­ons and even people who use routers in home offices to take action to harden poorly-secured devices. But its alert cited only one specific product: Cisco’s Smart Install software.

Australian Defense Minister Marise Payne said about 400 Australian companies were targeted in the 2017 Russian attacks, but there was no “exploitati­on of significan­ce.”

“The points which this reinforces for us as a government, and should reinforce for all Australian­s, is that vigilance is absolutely imperative in terms of cyber security,” Payne told reporters Tuesday.

Australian Cyber Security Minister Angus Taylor said despite the number of organizati­ons affected, there was no indication Australian informatio­n had been compromise­d.

“Commercial­ly available routers were used as a point of entry, demonstrat­ing that every connected device is vulnerable to malicious activity,” Taylor said.

“This attempt by Russia is a sharp reminder that Australian businesses and individual­s are constantly targeted by malicious state and non-state actors, and we must maintain rigorous cyber security practices,” he added.

On March 15, US-CERT issued a similar alert saying the FBI and DHS had determined that Russian government “cyber actors” had sought to infiltrate U.S. agencies as well as “organizati­ons in the energy, nuclear, commercial facilities, water, aviation, and critical manufactur­ing sectors.”

It said Russian agents had obtained “remote access” to energy sector networks and obtained informatio­n on industrial control systems.

Experts have stressed that the March 15 bulletin did not mean Russia had obtained access to systems that control critical infrastruc­ture such as the power grid. But Russia does have history in this regard, as many security experts blame it for several cyber-sabotage attacks on Ukraine’s power grid.

Newspapers in English

Newspapers from United States