Cyberattack Damages SATCOM Terminals: How an Interruption in Satellite Communication Brought Down Internet, Communications and Power Generation

On February 24th, between the hours of 5 a.m and 9 a.m, tens of thousands of KT-SAT SATCOM terminals suddenly stopped working in several European countries, notably Ukraine and Germany [1]. Resulting in the loss of internet for tens of thousands of people and the disconnection of 5,800 wind turbines in Germany. This outage occurred at the same time Russia launched its full-scale invasion of Ukraine [4]. Investigation into the outage has revealed that it is the result of a cyber attack, launched by unidentified hackers. It is currently not known whether they were backed by the Russian state, which has repeatedly rejected allegations that it participates in cyberattacks [1].

Back-Up, What are SATCOM Terminals? What Does SATCOM Even Mean?

SATCOM stands for satellite communication, meaning that a SATCOM terminal is a device used to communicate with satellites. They have a wide range of uses, from applications in emergency communication devices that allow vessels to send distress calls to providing basic access to the Internet [6]. SATCOM networks are used for communication in a large number of industries, including aviation, media, and military and defense. It’s estimated that about eight million Americans rely on SATCOM networks for internet access [5]. Similarly, Viasat’s KA-SAT network and its terminals (the ones that were attacked) provide high-speed satellite internet coverage to Europe and the Mediterranean, and developmentally, the Ukrainian military is recorded to be using this type of satellite terminal [3]. Over the past several years, Ukraine’s military and security services have purchased communications systems that run over Viasat’s network and government contracts have been reviewed to show that the KA-SAT network has provided internet connectivity to the Ukrainian military and police units [1].

KA-SAT coverage over Europe and the Mediterranean Basin (different colors show frequency reuse).
Image Source: https://en.wikipedia.org/wiki/KA-SAT

The Attack and Its Consequences

From what is publically known so far, the attack:

  • Began on February 24th, between 5 a.m and 9.am [1].
  • Was launched by unidentified hackers, accordingly the Russian government has denied any involvement [1].
  • Has disabled tens of thousands of modems that communicate with Viasat’s KA-SAT satellite, kicking out internet connectivity to tens of thousands in the affected area [1].
  • Has disconnected the operations of 5,800 wind turbines (which utilize SATCOM modems) owned by the German company Enercon.  [2].
  • Has affected Ukrainian military communications such that the attack has been acknowledged as “a huge loss for them in terms of communications in the very beginning of war” [3].
  • Was a result of a misconfiguration in the “management section” of the satellite network that had allowed the hackers to gain remote access into the modems, knocking them offline. [1].
  • Has damaged the modems to the extent that most of the affected devices were rendered inoperable and would need to be reprogrammed either by a technician on site or at a repair depot and that some would have to be swapped out. Notably, more than two weeks later some still remain offline [1].

A graph showing Viasat network connectivity data at the time of the attack.
Image Source: https://www.zdnet.com/article/viasat-confirms-cyberattack-causing-outages-across-europe/

Why Should I Care? How Does This Relate To Cybersecurity?

Within the realm of cyberattacks and cyberwarfare, the scope and effect of recent attacks have been limited to targeting private companies [11], government websites, and infrastructure [12]. While these attacks have been devastating (and costly), up until recently, larger-scale systems such as SATCOM networks have been relatively safe. However, the recent Viasat attack has shown that satellite communications networks are not only vulnerable to but already have been targeted by cyberattacks, with a sizable level of success. The utility and value that these networks provide cannot be overstated, particularly regarding military usage. A successful attack could render a communications blackout for an entire army and distress calls could be blocked or power generation depots could be shut down, darkening entire cities.

Not only does the current risk regarding these large networks include the devastating costs of a successful attack but also in the widespread and international nature of these types of networks. The KA-SAT network alone covers broad areas of Europe and the Mediterranean [1]. The attack on the 24th was harmful enough. Imagine that a more destructive attack was to be successfully launched, the damage would not only be disastrous but also far-reaching. With such dire possible consequences, cybersecurity regarding satellite communication is as vital as ever.

While some SATCOM networks are currently vulnerable, all hope is not lost. a joint CISA-FBI advisory issued on the 17th urged SATCOM network providers and critical infrastructure organizations that rely on these networks to reinforce their cybersecurity defenses due to an increased possibility of cyberattack [5]. The advisory outlines defensive actions for both SATCOM providers and their customers to take amid investigations into the Viasat attack [10]. Those that were attacked are taking action as well. Viasat and Enercon are taking steps to repair their systems:

  • Enercon reports that it is working with the operators of the affected wind farms to set up alternative ways to regain remote control of the turbines. There was no risk to the turbines as they continued to operate on “auto mode,” the company said [2].
  • Viasat is working with distributors to restore service for those fixed broadband users in Europe impacted by this event, with a priority focus on critical infrastructure and humanitarian assistance [5].

A Hopeful Conclusion

Ultimately, the attack on the 24th was not permanently damaging and has not caused an immediate loss of life (outside of any casualties caused by the interruption of military communications in Ukraine). While the temporary halt of internet connectivity, communications, and wind power generation control was shocking, the affected systems are in repair. Not only has the attack raised eyebrows regarding SATCOM security but it has also triggered a response involving steps to reinforce the digital security of these networks so that future (potentially more harmful) attacks can be prevented.

References:

  1. https://www.reuters.com/world/europe/exclusive-us-spy-agency-probes-sabotage-satellite-internet-during-russian-2022-03-11/
  2. https://www.reuters.com/business/energy/satellite-outage-knocks-out-control-enercon-wind-turbines-2022-02-28/
  3. https://www.reuters.com/world/satellite-outage-caused-huge-loss-communications-wars-outset-ukrainian-official-2022-03-15/
  4. https://www.reversemode.com/2022/03/satcom-terminals-under-attack-in-europe.html
  5. https://techcrunch.com/2022/03/18/cisa-fbi-satellite-networks/
  6. https://www.goincognito.co/info-massive-cyber-attack-in-europe/
  7. https://www.zdnet.com/article/viasat-confirms-cyberattack-causing-outages-across-europe/
  8. https://www.zdnet.com/article/cisa-and-fbi-warn-over-threats-to-satellite-communications-networks/
  9. https://www.reuters.com/business/aerospace-defense/satellite-firm-viasat-probes-suspected-cyberattack-ukraine-elsewhere-2022-02-28/
  10. https://www.cisa.gov/uscert/ncas/alerts/aa22-076a
  11. https://www.itworldcanada.com/article/cyber-security-today-march-2-2022-toyota-and-aon-deal-with-cyber-attacks-updates-on-axis-and-nvidia-attacks-and-more/474804
  12. https://www.csis.org/programs/strategic-technologies-program/significant-cyber-incidents

Another Russian Cyber Attack!

(7)

While it is true that this attack was carried out while being funded by the Russian government, it was an attack that occurred back in May 2021 while only just recently being reported on so it would have little to do with the recent political conflicts involving Russia. The FBI and the CISA (Cybersecurity and Infrastructure Security Agency) have released information that this attack essentially used flawed MFA (Multifactor Authentication) settings as an entry point where they then utilized an already known vulnerability PrintNightmare (1).  The victim of this crime is an undisclosed non government organization and it is unclear exactly what information has been exfiltrated, but it is clear that the attackers had access to cloud documents and email accounts.


What is PrintNightmare?

Microsoft put out a report that covered the severity and details of this vulnerability on July 1st 2021. The vulnerability employs the Windows Print Spooler program which when acting as intended, is used to manage all print jobs as they are received by the computer. When this program is exploited, the program improperly performs privileged file operations which grants attackers the opportunity to execute arbitrary code. RCE or remote code executions is a serious issue when it comes to vulnerabilities as it essentially grants bad actors system privileges which would allow free reign to view data, delete data or even install programs which they would not have been able to otherwise (2). It is because of this issue that Microsoft had rated this exploit a 8.8/10 in the common vulnerability scoring system (CVSS)(3).


How was the attack done?

Usually MFA is an important part of making sure that intruders stay out of accounts they are not supposed to access. This attack on the other hand made use of Cisco’s Duo MFA system which had a default configuration allowing inactive accounts to be reactivated without the need of being authenticated (4). Because of this oversight, all that the attackers had to do was (5):

  • Find an inactive account that has a poor password.
  • Brute force the weak password, then reactivate the account (skipping having the account verified).
  • Implement the PrintNightmare exploit to escalate their permissions.
  • Use these system permissions to completely disable MFA for all the accounts

At this point the attackers were well inside the network and could continue to create accounts to snoop on data stored on the cloud server and within the other users’ emails.


Takeaways

It is clear that there were many flaws that went wrong for this attack to had been carried out; from the faulty default settings of Duo MFA, the NGO’s failure to understand the settings related to their own network’s security, or even Microsoft for having been relatively slow when implementing a fix for the known exploit. But the simplest flaw, and one that any of us could be responsible for, is creating a weak password. Without finding an account that had a relatively simple password that the attackers could guess, there would not have been an entry point for the attack (5). Making a complex password that is hard to crack is not only beneficial for your own security but as this example showed, when all else fails, having a good password is also beneficial for everyone on the shared network. 

Here is a video that goes over some things to consider when making a good password:

(6)

Sources:

(1) https://thehackernews.com/2022/03/fbi-cisa-warn-of-russian-hackers.html

(2) https://nakedsecurity.sophos.com/2021/06/30/printnightmare-the-zero-day-hole-in-windows-heres-what-to-do/

(3) https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-34527

(4) https://www.cisa.gov/uscert/ncas/alerts/aa22-074a

(5) https://nakedsecurity.sophos.com/2022/03/16/russian-actors-bypass-2fa-story-what-happened-and-how-to-avoid-it/

(6) https://www.youtube.com/watch?v=pMPhBEoVulQ&t=102s

(7) https://www.ft.com/content/0aa7a6e0-ca52-11e9-af46-b09e8bfe60c0

Artificial Intelligence-Enhanced Drone in Modern Warfare

During the ongoing war between Russia and Ukraine, there are photographs showing what appears to be KUB-BLA, a type of Russian “Suicide” drone that boast the ability of self-flying and facial recognizing the target by artificial intelligence [1]. It raises concern about the possibility that AI will play a greater role in making lethal decisions and how autonomous drone might alter war’s course.

Self-flying drone

Self-navigation drones get pre-defined GPS coordinates about departure and destination points, with the capability to find the most optimal way and get there without manual control thanks to AI-enabled computer vision advances. Various in-built elements of a self-flying drone include computerized programming, propulsion and navigation systems, GPS, sensors and cameras, programmable controllers, as well as equipment to automate the flight [2].

Computer Vision

Computer vision has a primary role in detecting the various types of objects to analyse and record information on the ground while flying in midair [3]. Onboard image processing and a drone neural network are used to detect, classify, and track objects while the drone travels. The neural network in drones is capable of detecting various types of objects like vehicles, buildings, trees, objects on or near the surface of the water, as well as diverse terrain. Additionally, it can identify living creatures with high degrees of accuracy. Using computer vision, the drone maps out its surroundings in 3D to support its maneuvering and avoiding collisions with obstacles. 

Drone’s computer vision

Deep Machine Learning in Object Detection & Drone Navigation

Despite GPS navigation and computer vision, it is not enough to solve the problem of collision avoidance. To make the drone learn how to avoid objects at high speeds and recognize a variety of objects, from static to in motion, deep learning algorithms must be used to train it with a large amount of data. A wide variety of entities are labeled to make sure drone can detect and decide its direction and control to fly safely avoiding the obstacles in the path.

How devastate is “Suicide” drone?

According to the producing company ZALA Aero, a subsidiary of the Russian arm company Kalashnikov, each KUB-BLA is equipped with 3-kilo explosive that would detonate when the drone drops into the target. The blast is powerful enough to obliterate human body or destroy a vehicle.

Drone explosion – Source: movie Angel Has Fallen

The drone’s computer vision uses an intelligent facial recognition to identify the target midair, while being trained with machine learning algorithm to dodge incoming attack and calculate the optimal course. The drone is highly effective in detecting and chasing the target to ensure a positive hit.

AI-drone with Facial Recognition

Capable of reaching highest speed of 130 km/hr for 30 minutes after launch, it is almost impossible for a ground target to escape. It is unknown if KUB-BLA can be used in a drone swarm attack.

Reference

[1] https://www.wired.com/story/ai-drones-russia-ukraine/

[2] https://medium.com/vsinghbisen/how-ai-based-drone-works-artificial-intelligence-drone-use-cases-7f3d44b8abe3

[3] https://www.wevolver.com/article/artificial-intelligence-in-drone-technology/

All Your Base (Should) Belong to You

With the adoption of cloud computing, developers are now able to cut costs when it comes to servers. Cloud computing can be more beneficial than on premise servers since companies only pay for what they need while a third party deals with the maintenance of the server (1). However, following a study done by Check Point Research, they were able to find over 2000 databases in Google Firebase alone that were left exposed and at risk (2).


Firebase
The Google Firebase logo (3).

Google Firebase is a cloud-hosted database mainly used for developing mobile and web apps. It utilizes Firebase Realtime Database which is an API that allows developers to push updates to application data across multiple platforms at the same time (3). Problems can arise when these databases are left misconfigured by developers.


The logo used by VirusTotal (4).

VirusTotal is a tool where developers can upload URLs, IP addresses, domains, and files to check for data breaches and test how malicious something is. Submissions are shared to VirusTotal’s security community, which is comprised of people that work in the fields of antivirus, security, and malware. These people give their critiques and can vote on whether submitted files and URLs are malicious or not (5).

The Breach

Over the span of three months, Check Point Research utilized VirusTotal by searching for Firebase URLs. First, they skimmed VirusTotal for any URLs in Android application PacKages (APKs) that contained “.firebaseio.com”. Then they added “/.json” to the end of the URLs that they found in order to see if they were able to read them. Among the databases that they were able to read, they filtered for keywords, such as “password”, and were able to find many databases with sensitive user information (5). These databases ranged from applications for dating to healthcare applications.

The database for an accounting application designed for businesses. The addresses, bank balances, cash balances, emails, and more for more than 80,000 companies were found to be exposed by the people at Check Point Research (5).

Rest assured, the good people over at Check Point Research notified the companies after their discovery!

What Can be Done?

Make sure to lock up!

As hard of a mistake it seems to be, the 2000 compromised databases found by Check Point Research were either left in test mode, which allows for all reads and writes to your database, or had exposed credentials (2). By leaving your database in test mode, the not so good people (AKA attackers) can not just read sensitive information, but also write to your database. By writing in malicious code, the safety of your database and the users of your application can be compromised.

There is no denying the benefits and ease of use that comes with cloud computing. Many start-up companies can enter the market through the use of this technology. However, as we all know, no matter how great the security, the greatest point of weakness is often the user. With how fast technology evolves, it is easy to miss key steps in security one may not have had to be aware of before. Having cloud misconfigurations leaves the door open for attackers so it is critical that more awareness is brought to this issue and that the proper standards of practice are in place to guard against such issues from happening.

Sources:

  1. https://www.cleo.com/blog/knowledge-base-on-premise-vs-cloud
  2. https://www.darkreading.com/application-security/mobile-app-developers-leave-behind-2-100-open-databases
  3. https://en.wikipedia.org/wiki/Firebase
  4. https://www.virustotal.com/gui/home/search
  5. https://blog.checkpoint.com/2022/03/15/stop-neglecting-your-cloud-security-features-check-point-research-found-thousands-of-open-cloud-databases-exposing-data-in-the-wild/

All My Apes Gone

All my apes are gone from Know your meme

With the NFT market being worth more than $10 billion, it has definitely gained the attention of a lot of people. From NFTs being talked about on the news, to celebrities, public figures and giant companies supporting or even starting NFT projects, it would make sense why hackers and malicious actors have decided to exploit the weaknesses in the system. And in this post, I would like to talk about some ways people have exploited these weaknesses in the system.

Before I start, you should know how NFTs or Non Fungible Tokens work, and since there is a lot that goes on with NFTs, I can not explain everything so I would direct you to this link: Click here

OpenSea email Scam

OpenSea email phishing email from PCrisk

For this attack, unsuspecting users receive an email claiming to be from OpenSea, and if they were to click the link it would lead them to a fraudulent website, and ask them to connect their wallet, it would then ask them sign the “Approve All” transaction, which would then let the attacker initiate transactions from their wallet. With that, they are then able to sell the NFTs in the victims’ wallet to themselves for 0 ETH, or way lower than what they are worth.

According to OpenSea, 17 users fell victim to this attack, and the attacker made stole numerous “valuable” assets such as: 3 Bored Ape Yacht Club, 2 Clonex, 17 Azuki, and 631 ETH. Everything is estimated to cost at least $1.7 million

Phishing attacks are the most common types of attacks used for stealing NFTs.

LandMine NFTs

This is also another method hackers have used to drain peoples wallets, by airdropping an NFT into a persons wallet, and if they choose to sell the NFT or transfer it, the NFT drains the victim’s wallet.

The way this works is that initially, the smart contract of the malicious NFT is a wallet draining contract, but it would not have permissions to do anything until the user interacts with it. But once the user interacts with it, then it is going to have the permissions to interact with the users wallet, and then draining it.

If you receive an airdropped NFT that you do not trust, NFT traders advice that you just hide it, where it is still in the wallet, but it is not on your main page.

Conclusion

As you can see from the methods used above, even if you are using a “Web3” platform, you can still fall victim to different cyberattacks, and the ways to protect yourself from such attacks are similar to the “Old internet” solutions such as:

  • Do not click on suspicious links
  • Only give permissions to systems that you trust
  • If you do not trust something, test it in an isolated environment, in this case a “burner wallet”
  • If something feels too good to be true, then it probably is.

Sources:

https://theopendao.medium.com/opensea-phishing-attack-19-february-2022-and-the-opendaos-response-4f71aa80578c

https://blockworks.co/opensea-scammers-went-phishing-and-caught-over-250-nfts-from-17-users/
Crypto airdrop wallet scams

Game company Ubisoft hit with ‘cyber security incident’.

Photo by Sigmund on Unsplash

“Incident”

The French game company Ubisoft, which titles include the popular video game series Far Cry and The Prince of Persia, confirmed that it had suffered a ‘cyber security incident’ [1] that was first reported by The Verge on March 10, and confirmed by Ubisoft on March 11 [2].

Ubisoft is a gaming company that has been around since the late 1980’s, growing to feature a collection of major video game franchises including Just Dance to a myriad of Tom Clancy and Assassin’s Creed titles [3].  

Same actors?

According to the Verge, a leaked screenshot from the Telegram channel hosted by the hacker group LAPSUS$ shared the group’s reaction to the said incident’s article, possibly implying their connection to the cyber attack, although neither confirming nor denying it. The official statement from Ubisoft confirmed the incident, which they claim caused a “temporary disruption to some of our games, systems, and service,”[1] yet attesting that no player information was exposed as a result, however they issued a company wide mandate requiring their employees to change their passwords. 

LAPSUS$ has been in the news quite frequently following a string of ransomware attacks on companies such as the major chip maker NVIDIA, and tech conglomerate Samsung. Confidential information such as private source code, employee records, and personal information were stolen and then threatened with public leaking, unless certain ideological demands were met [4]. 

Thoughts

With little information being provided officially from Ubisoft of the actual attackers, it is only speculation at this moment as to what happened, and by whom. The company-wide password reset mandate could possibly point to a scenario where a weak and/or duplicate password was used by an individual employee, or some sort of social engineering or phishing attempt was used to acquire login information. The fact that the LAPSUS$ group has also not claimed direct responsibility, whereas they did with the NVIDIA and Samsung ransomware attacks[4], it is possible the hackers didn’t completely accomplish all they had hoped to. For example, a successful ransomware attack would be acquiring relevant enough data in order to extort the company into complying to their demands and/or financial compensation.

When a company is attacked, and the personal information of its company is released, there is not much one can personally do at that point. Even though customers and their data may not be the main target, rather a demand for change in company policies or practices, as was the case with the LAPSUS$ vs. NVIDIA incident, our personal information can easily become collateral damage in these situations. I believe it is best to give these companies as little personal information as possible when purchasing or using their products, which these days seems almost impossible, especially if requiring a credit card and billing address to purchase something. 

As someone who has been a victim of a company’s customer data being leaked, I can personally attest to the insane increase in the amount of phishing emails and unauthorized login attempts to many other online services that shared the same email. It was a great reminder to never use the same password, and shows just how vulnerable we all are with giving our information to companies, knowing nothing of their security practices.

Photo by Towfiqu barbhuiya on Unsplash

Sources

  1. https://news.ubisoft.com/en-gb/article/3tSsBh25mhHhlbGSy1xbRw/ubisoft-cyber-security-incident-update
  2. https://www.theverge.com/2022/3/11/22972768/ubisoft-cyber-security-incident-hack
  3. https://en.wikipedia.org/wiki/Ubisoft#Games
  4. https://blog.checkpoint.com/2022/03/07/lapsus-ransomware-gang-uses-stolen-source-code-to-disguise-malware-files-as-trustworthy-check-point-customers-remain-protected/

Germany’s Cyber Security Authority Warns Against Using Anti-Virus Software From Kaspersky

On March 15, 2022, Germany’s cyber security authority, the Federal Office for Information Security (BSI), has warned against using anti-virus software from Russian headquartered company Kaspersky.

The BSI recommends replacing applications from the portfolio of anti-virus software from Kaspersky with alternative products.

https://www.bsi.bund.de/DE/Service-Navi/Presse/Pressemitteilungen/Presse2022/220315_Kaspersky-Warnung.html

Who is Kaspersky?

Kaspersky is a major multinational cybersecurity and anti-virus provider; however, since it is based in Moscow, Russia, the BSI has expressed concerns that it may be utilized by the Kremlin.

A Russian IT manufacturer can carry out offensive operations itself, be forced to attack target systems against his will, or be spied on as a victim of a cyber operation without his knowledge or misused as a tool for attacks against its own customers.

https://www.bsi.bund.de/DE/Service-Navi/Presse/Pressemitteilungen/Presse2022/220315_Kaspersky-Warnung.html

Concern about the neutrality of Kaspersky has been expressed before. In fact, in 2017, former U.S. President Donald Trump banned the use of Kaspersky services within the U.S. government.

Reactions

The controversy over Kaspersky has even prompted the German professional football club Eintracht Frankfurt to end a sponsorship deal with the company. The German football club’s CEO Axel Hellmann is quoted as saying:

We have always made it clear that we are attaching the continuation of the partnership with Kaspersky to facts and attitude and not to nationalities. With the warning of the BSI, the facts and thus the confidence in the protection capability of Kaspersky’s products and services has changed significantly. We have informed the management of Kaspersky that we will terminate the sponsorship contract with immediate effect.

https://klub.eintracht.de/news/eintracht-beendet-partnerschaft-mit-kaspersky-140013

Kaspersky’s Response

Eugene Kaspersky, CEO of Kaspersky, denies any allegations of connections with the Russian government and says the BSI’s statement is political rather than based on evidence and facts.

Sources:

  • https://www.bsi.bund.de/DE/Service-Navi/Presse/Pressemitteilungen/Presse2022/220315_Kaspersky-Warnung.html
  • https://www.bbc.com/news/technology-60738208
  • https://www.bloomberg.com/news/articles/2022-03-15/germany-warns-kaspersky-software-risks-being-exploited-by-russia
  • https://www.reuters.com/article/us-usa-cyber-kaspersky-idUSKBN1E62V4
  • https://klub.eintracht.de/news/eintracht-beendet-partnerschaft-mit-kaspersky-140013

Russia issues its own TLS certificate to bypass sanctions

In response to Russia’s invasion of Ukraine, many Western countries have imposed sanctions prohibiting companies from conducting business in Russia, including public third-party certificate authorities (CA), which issue Digital Certificates and manage the public keys and credentials for data encryption for the end user. One of such Digital Certificates is the Transport Layer Security (TLS), which plays an integral role in validating website domains to ensure security.

With the sanction preventing certificate renewal for Russian websites, websites with expired TLS certificates are blocked by browsers. In an attempt to solve the website access problems, Russia has created its own TLS certificate authority.

How TLS certificates work?

How TLS works (Source: DigiCert)

TLS, also known as SSL or digital certificates, is the foundation of secure networks and the successor technology of the commonly known Secure Sockets Layer (SSL). TLS is a cryptographic protocol that provides end-to-end security of data sent over the Internet. It is most known for its use in securing HTTPS web browsing and is visible as the padlock symbol in the address bar. Aside from web browsing, it is also used in applications such as email, messaging, and voice over IP.

TLS Handshake (Source: CloudFlare)

A TLS handshake is the process that initiates a communication session with TLS encryption. During a TLS handshake, the client and the server exchange messages to acknowledge each other, verify each other, establish the encryption algorithms they will use, and agree on session keys. This can be summarized as the following steps:

  1. Specify which version of TLS is in use
  2. Decide on which cipher suites to use, which is a set of encryption algorithms such as  RSA key exchange algorithm
  3. Authenticate the identity of the server via the server’s public key and the TLS certificate authority’s digital signature
  4. Generate session keys to use symmetric encryption

TLS typically relies on trusted third-party CA to establish the certificates, the top 3 of which are IdenTrust, DigiCert and Sectigo. With some of these companies withdrawing businesses from Russia and sanctions causing these companies unable to receive payments from Russia, the country is now facing website access issues as these websites are now unable to renew their certificates, and hence, being blocked by web browsers.

Russia’s Domestic TLS

Announcing the availability of domestic certificates (Gosuslugi)

The Russian government envisions a solution of generating TLS certificates on their own to websites in the country: “It will replace the foreign security certificate if it is revoked or expires. The Ministry of Digital Development will provide a free domestic analogue. The service is provided to legal entities – site owners upon request within 5 working days,” explains the Russian public services portal, Gosuslugi (translated).

Risks and Limitations

However, this plan comes with many limitations. The TLS certificates require the validation from web browsers, meaning that browsers are free to reject websites they deem not trust-worthy. Additionally, the process of adding certificate issuers to a “whitelist” takes several months at the minimum, leaving Russian domestic TLS being rejected by major Western browsers at the moment. The only web browsers that are accepting Russia’s domestic TLS are Yandex and Atom browser, both of which are based in Russia.

This also creates a significant privacy threat to the Russian residents – Mike Parkin, researcher and senior technical engineer at Vulcan Cyber, tells CSO News “While it’s unlikely that the major browsers will ever accept the new Russian CA, it may be a problem for those users in Russia. They will have to rely on their CA, which is sanctioned by a government that is not well known for respecting user privacy or taking a strong stand against cybercriminals.”

Bottom Line

This action of Russian government prompted many to wonder if this is a step towards the Russian “sovereign internet”, where the nation completely disconnect from global Internet.  “This would happen under a 2019 Law on Sovereign Internet. According to Russia’s legislation, disconnecting Russian internet infrastructure from the global internet would be a defensive move, although this leaves a wide room for interpretation,” according to a Flashpoint post.

Sources:

https://www.globalsign.com/en/ssl-information-center/what-are-certification-authorities-trust-hierarchies

https://www.digicert.com/tls-ssl/tls-ssl-certificates

https://www.internetsociety.org/deploy360/tls/basics/

https://www.cloudflare.com/en-ca/learning/ssl/what-happens-in-a-tls-handshake/

https://www.bleepingcomputer.com/news/security/russia-creates-its-own-tls-certificate-authority-to-bypass-sanctions/

https://www.csoonline.com/article/3653315/traffic-interception-and-mitm-attacks-among-security-risks-of-russian-tls-certs.html

https://www.flashpoint-intel.com/blog/ukraine-russia-war/russian-runet-sovereign-internet/

NetWalker and the rise of RaaS

Ransomware-as-a-service, or RaaS, is a business model in which developers sell ransomware to a network of affiliates who may lack the resources or experience to create their own malware. Profits are then split between the two groups. Although such services are typically accessed via the dark web, they operate similarly to legitimate software services, with marketing campaigns, help forums, and kits that allow even those with little technical knowledge to pose a serious threat. Bitcoin is the preferred method of payment, making criminal behavior even more difficult to track.[1] 

Direct ransomware operations vs the RaaS model.

RaaS coupled with more sophisticated extortion strategies are credited with the proliferation of ransomware attacks in recent years. Not only are the number of reported attacks on the rise, but the average ransom payment has increased (up approximately 82% from 2018 to 2020).[2] According to Cybersecurity Ventures, it is estimated that ransomware attacks occurred once every 11 seconds in 2021.

Businesses of any size are at risk. While smaller businesses tend to have weaker security measures in place, larger businesses may be more willing to pay higher ransoms to minimize downtime.

NetWalker’s Notoriety

NetWalker, formerly called Mailto, was established by the cybercrime group Circus Spider in 2019 and transitioned to a closed-access RaaS model in 2020, meaning affiliates were screened before being granted access to customize the ransomware as they saw fit. In particular, NetWalker selected hacker gangs who specialized in high-precision network attacks against larger companies rather than mass-distribution methods targeting smaller entities.[3] The group’s activity was at its peak in early 2020, attacking immigration agencies, schools, law enforcement centers, and hospitals.

NetWalker’s success can be attributed to the utilization of double-extortion techniques, leaking samples of the victim’s data and threatening to release more if their demands were not met.[4] Healthcare facilities were particularly vulnerable, due to understaffed IT departments overwhelmed in the early days of the pandemic. Universities specializing in medical research also became prime targets.

The Case

In January 2021, Sebastien Vachon-Desjardins, a former Canadian government employee, was arrested for his alleged involvement in the NetWalker ransomware attacks from April-December 2020. Canadian authorities seized approximately $28.1 million worth of bitcoin and $790,000 CAD, as well as 20 terabytes of data leading to the identification of 17 compromised Canadian companies.[5] Around the same time, the Bulgarian national police force disabled part of NetWalker’s payment infrastructure that doubled as the group’s leak site.[4]

The NetWalker leaks site has since been taken down. Image Credits: TechCrunch (screenshot).

Earlier this year, Vachon-Desjardins pled guilty to charges of participation in a criminal organization and unauthorized use of computer data. He has recently been extradited to the US and is now awaiting further charges.[6, 7]

Despite the increase in ransomware attacks, effective enforcement for cybercrime remains low for the simple reason that the law often does not cover situations in which the perpetrator originates in a different jurisdiction as the victim. The apprehension of Vachon-Desjardins proves that strong international collaboration is a vital tool in combating and deterring future attacks.

References:

  1. https://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/ransomware-as-a-service-enabler-of-widespread-attacks
  2. https://www.pandasecurity.com/en/mediacenter/security/ransomware-statistics/#ransom
  3. https://www.varonis.com/blog/netwalker-ransomware
  4. https://threatpost.com/netwalker-ransomware-suspect-charged/163405/
  5. https://www.newswire.ca/news-releases/successful-collaboration-between-the-rcmp-and-the-fbi-leads-to-guilty-plea-and-forfeiture-of-over-34-million-in-assets-865266069.html
  6. https://www.infosecurity-magazine.com/news/netwalker-suspect-extradited-to-us/
  7. https://techcrunch.com/2022/03/11/netwalker-extradited-bitcoin-seized/


War censorship exposes Putin’s leaky internet controls

President Vladimir Putin was attempting to make Russia’s internet a strong tool of surveillance and social control, similar to China’s so-called Great Firewall, long before waging war on Ukraine.

As a result, Russian investigative journalist Andrei Soldatov was frightened when Western tech corporations began breaking relations with Russia following its invasion. He’d spent years exposing Russian censorship and concerned that well-intentioned measures to aid Ukraine might instead boost Putin’s propaganda war by isolating Russians from the free flow of information. The Kremlin quickly took up the baton, limiting both Facebook and Twitter to the point where they are essentially unavailable on the Russian internet. Putin has also restricted access to both Western and independent news outlets in the country, and a new law makes it illegal to transmit material that opposes the government’s position. The Kremlin also stated that access to Instagram would be restricted. The network monitor NetBlocks discovered network data revealing the social network was banned in Russia across numerous users by early Monday.

The government has had minimal success in preventing the use of software known as virtual private networks, or VPNs, which allows users to circumvent content restrictions. Putin’s attempts to limit the use of other censorship-eluding software are similarly misguided. This puts internet bandwidth and related firms that are sympathetic to Ukraine’s predicament in a difficult position. On one, they are under public pressure to punish the Russian government, and on the other, they are under economic pressure to curtail services at a time when bills are likely to go unpaid.

Microsoft, on the other hand, hasn’t announced if it will stop offering cloud services in the nation, while suspending all new product and service sales. Cogent, a major “backbone” provider for internet traffic located in the United States, has severed direct connections within Russia but maintained open pipes via subsidiaries of Russian network providers at exchanges physically outside the country. There has been no discernible decrease in connection from outside providers. All internet providers in Russia are required by law to install hundreds of so-called middleboxes, which are router-like devices managed and remotely controlled by officials that may ban particular websites and services. In any case, the framework, which additionally lets the FSB security administration spy on Russian residents, is a general strainer contrasted with China’s Great Firewall. Andrew Sullivan, leader of the charitable Internet Society, said there’s no proof it can effectively disengage Russia from the more extensive web.

ProtonVPN, which Droz says has been creative in tracking down ways of avoiding Russian impeding, reports timing tenfold the number of day-to-day information exchanges than before the conflict. VPN administrations followed by analysts at Top10VPN.com observed Facebook and Twitter downloads flooding multiple times higher than normal.

Russia’s elites are believed to be big VPN users. No one expects them to disconnect.

Sources:

https://abcnews.go.com/Business/wireStory/war-censorship-exposes-putins-leaky-internet-controls-83425364

https://www.g2.com/articles/internet-censorship

https://exit.al/en/wp-content/uploads/sites/3/2016/12/skype_censorship.jpg