Affichage des articles dont le libellé est Visma. Afficher tous les articles
Affichage des articles dont le libellé est Visma. Afficher tous les articles

lundi 18 février 2019

Chinese and Iranian Hackers Renew Their Attacks on U.S. Companies

By Nicole Perlroth

Geoffrey Berman, the United States attorney for the Southern District of New York, discussing the charges last year against nine Iranians accused of hacking into the systems of hundreds of companies and academic institutions.

SAN FRANCISCO — Businesses and government agencies in the United States have been targeted in aggressive attacks by Iranian and Chinese hackers who security experts believe have been energized by President Trump’s withdrawal from the Iran nuclear deal last year and his trade conflicts with China.
Recent Iranian attacks on American banks, businesses and government agencies have been more extensive than previously reported.
Dozens of corporations and multiple United States agencies have been hit, according to seven people briefed on the episodes who were not authorized to discuss them publicly.
The attacks, attributed to Iran by analysts at the National Security Agency and the private security firm FireEye, prompted an emergency order by the Department of Homeland Security during the government shutdown last month.
The Iranian attacks coincide with a renewed Chinese offensive geared toward stealing trade and military secrets from American military contractors and technology companies, according to nine intelligence officials, private security researchers and lawyers familiar with the attacks who discussed them on the condition of anonymity because of confidentiality agreements.
A summary of an intelligence briefing read to The New York Times said that Boeing, General Electric Aviation and T-Mobile were among the recent targets of Chinese industrial-espionage efforts. 
The companies all declined to discuss the threats, and it is not clear if any of the hacks were successful.
Chinese cyberespionage cooled four years ago after Barack Obama and Xi Jinping reached a deal to stop hacks meant to steal trade secrets.
But the 2015 agreement appears to have been unofficially canceled amid the continuing trade tension between the United States and China, the intelligence officials and private security researchers said. Chinese hacks have returned to earlier levels, although they are now stealthier and more sophisticated.
“Cyber is one of the ways adversaries can attack us and retaliate in effective and nasty ways that are well below the threshold of an armed attack or laws of war,” said Joel Brenner, a former leader of United States counterintelligence under the director of national intelligence.
Federal agencies and private companies are back to where they were five years ago: battling increasingly sophisticated, government-affiliated hackers from China and Iran — in addition to fighting constant efforts out of Russia — who hope to steal trade and military secrets and sow mayhem. 
And it appears the hackers substantially improved their skills during the lull.
Russia is still considered America’s foremost hacking adversary. 
In addition to meddling widely and spreading disinformation during United States elections, Russian hackers are believed to have launched attacks on nuclear plants, the electrical grid and other targets.
Threats from China and Iran never stopped entirely, but Iranian hackers became much less active after the nuclear deal was signed in 2015. 
And for about 18 months, intelligence officials concluded, Beijing backed off its 10-year online effort to steal trade secrets.
But Chinese hackers have resumed carrying out commercially motivated attacks, security researchers and data-protection lawyers said. 
A priority for the hackers, researchers said, is supporting Beijing’s five-year economic plan, which is meant to make China a leader in artificial intelligence and other cutting-edge technologies.
“Some of the recent intelligence collection has been for military purposes or preparing for some future cyber conflict, but a lot of the recent theft is driven by the demands of the five-year plan and other technology strategies,” said Adam Segal, the director of the cyberspace program at the Council on Foreign Relations. 
“They always intended on coming back.”
Officials at the Chinese embassy in Washington did not respond to a request for comment.
Mr. Segal and other Chinese security experts said attacks that once would have been conducted by hackers in China’s People’s Liberation Army are now being run by China’s Ministry of State Security.
These hackers are better at covering their tracks. 
Rather than going at targets directly, they have used a side door of sorts by breaking into the networks of the targets’ suppliers. 
They have also avoided using malware commonly attributed to China, relying instead on encrypting traffic, erasing server logs and other obfuscation tactics.

Two Chinese who are suspected of participating in an extensive hacking campaign to steal data from American companies.

“The fingerprint of Chinese operations today is much different,” said Priscilla Moriuchi, who once ran the National Security Agency’s East Asia and Pacific cyber threats division. 
Her duties there included determining whether Beijing was abiding by the 2015 agreement’s terms. “These groups care about attribution. They don’t want to get caught.”
It is difficult to quantify the number of industrial-espionage attacks, in part because they have been designed mostly to steal strategic trade secrets, not the kind of personal information about customers and employees that companies must disclose. 
Only Airbus has acknowledged in recent weeks that Chinese hackers had penetrated its databases.
Many of the attacks by the Chinese Ministry of State Security have been against strategic targets like internet service providers with access to hundreds of thousands, if not millions, of corporate and government networks.
Last week, Ms. Moriuchi, who is now a threat director at the cybersecurity firm Recorded Future, released a report on a yearlong, stealth campaign by the Chinese to hack internet service providers in Western Europe and the United States and their customers.
The lone hacking target to publicly confront the Chinese was Visma, a Norwegian internet service provider with 850,000 customers. 
The goal of the attack on Visma was to gain broad access to its customers’ intellectual property, strategic plans and emails, including those of an American law firm that handles intellectual property matters for clients in the automotive, biomedical, pharmaceutical and tech sectors, according to Recorded Future.
The Visma attack was harder to trace than earlier incidents, which typically started with so-called spearphishing emails meant to steal personal credentials. 
This assault began with stolen credentials for a third-party software service, Citrix. 
And instead of using malware easily traced to China, the attackers used malware available on the so-called Dark Web that could have come from anywhere. 
They also used the online storage service Dropbox to move stolen emails and files.
Federal agencies are also trying to fend off new Iranian espionage campaigns.
After the Trump administration pulled out of the nuclear deal, Kirstjen Nielsen, the homeland security secretary, testified before Congress that her agency was “anticipating it’s a possibility” that Iran would resort to hacking attacks.

Stuart Davis, a director at a subsidiary of the security firm FireEye, which has attributed a recent wave of cyberattacks to Iranian hackers.

The Iranian attacks, which hit more than a half-dozen federal agencies last month, still caught the department off guard. 
Security researchers said the hacks, which exploited underlying weaknesses in the internet’s backbone, were continuing and were more damaging and widespread than agency officials had acknowledged.
Iranian hackers began their latest wave of attacks in Persian Gulf states last year. 
Since then, they have expanded to 80 targets — including internet service providers, telecommunications companies and government agencies — in 12 European countries and the United States, according to researchers at FireEye, which first reported the attacks last month.
The current hacks are harder to catch than previous Iranian attacks. 
Instead of hitting victims directly, FireEye researchers said, Iranian hackers have been going after the internet’s core routing system, intercepting traffic between so-called domain name registrars. 
Once they intercepted their target’s customer web traffic, they used stolen login credentials to gain access to their victims’ emails. (Domain name registrars hold the keys to hundreds, perhaps thousands, of companies’ websites.)
“They’re taking whole mailboxes of data,” said Benjamin Read, a senior manager of cyberespionage analysis at FireEye. 
Mr. Read said Iranian hackers had targeted police forces, intelligence agencies and foreign ministries, indicating a classic, state-backed espionage campaign rather than a criminal, profit-seeking motive.
There is a long history of Iranian attacks against the United States, and episodes from five years back or longer are just now being made public.
On Wednesday, the Justice Department announced an indictment against a former Air Force intelligence specialist, Monica Witt, on charges of helping Iran with an online espionage campaign. Four members of Iran’s Islamic Revolutionary Guard Corps were also charged with “computer intrusions and aggravated identity theft” directed at members of the United States intelligence community.
Also last week, the Treasury said it was putting sanctions on two Iranian companies, New Horizon Organization and Net Peygard Samavat Company, and several people linked to them. 
Treasury officials said New Horizon set up annual conferences where Iran could recruit and collect intelligence from foreign attendees.
Ms. Witt attended one of the conferences, the indictment says. 
Net Peygard used information she provided to begin a campaign in 2014 to track the online activities of United States government and military personnel, Treasury officials said.
Representatives for Iran’s Mission to the United Nations did not respond to requests for comment.
The recent Iranian attacks have unnerved American officials. 
But after issuing the emergency order about the ones last month, the Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency has largely played them down.
An official with the cybersecurity agency said there was a belief that no information had been stolen and that the attacks had not “materially impacted” operations. 
But Mr. Read of FireEye and others said there had been a noticeable escalation in Iran’s digital espionage.
“If you tell the Iranians you’re going to walk out on the agreement and do everything you can to undermine their government,” said Mr. Brenner, the former counterintelligence official, “you can’t be surprised if they attack our government networks.”

jeudi 7 février 2019

China's global theft of commercial secrets

China hacked Norway's Visma to steal client secrets
By Jack Stubbs

LONDON -- Hackers working on behalf of Chinese intelligence breached the network of Norwegian software firm Visma to steal secrets from its clients, cybersecurity researchers said, in what a company executive described as a potentially catastrophic attack.
The attack was part of what Western countries said in December is a global hacking campaign by China's Ministry of State Security to steal intellectual property and corporate secrets, according to investigators at cybersecurity firm Recorded Future.
China's Ministry of State Security has no publicly available contacts. 
The foreign ministry did not respond to a request for comment.
Visma took the decision to talk publicly about the breach to raise industry awareness about the hacking campaign, which is known as Cloudhopper and targets technology service and software providers in order reach their clients.
Cybersecurity firms and Western governments have warned about Cloudhopper several times since 2017 but have not disclosed the identities of the companies affected.
Reuters reported in December that Hewlett Packard Enterprise Co and IBM were two of the campaign's victims, and Western officials caution in private that there are many more.
At the time IBM said it had no evidence sensitive corporate data had been compromised, and Hewlett Packard Enterprise said it could not comment on the Cloudhopper campaign.
Visma, which reported global revenues of $1.3 billion last year, provides business software products to more than 900,000 companies across Scandinavia and parts of Europe.
The company's operations and security manager, Espen Johansen, said the attack was detected shortly after the hackers accessed Visma's systems and he was confident no client networks were accessed.

"PARANOIA HAT"
"But if I put on my paranoia hat, this could have been catastrophic," he said. 
"If you are a big intelligence agency somewhere in the world and you want to harvest as much information as possible, you of course go for the convergence points, it's a given fact."
"I'm aware that we do have clients which are very interesting for nation states," he said, declining to name any specific customers.
Paul Chichester, director for operations at Britain's National Cyber Security Centre, said the Visma case highlighted the dangers organisations increasingly face from cyber attacks on their supply chains.
"Because organisations are focused on improving their own cyber security, we are seeing an increase in activity targeting supply chains as actors try to find other ways in," he said.
In a report https://www.recordedfuture.com/apt10-cyberespionage-campaign with investigators at cybersecurity firm Rapid7, Recorded Future said the attackers first accessed Visma's network by using a stolen set of login credentials and were operating as part of a hacking group known as APT 10, which Western officials say is behind the Cloudhopper campaign.
The U.S. Department of Justice in December charged two members of APT 10 with hacking U.S. government agencies and dozens of businesses around the world on behalf of China's Ministry of State Security.
Priscilla Moriuchi, director of strategic threat development at Recorded Future and a former intelligence officer at the U.S. National Security Agency, said the hackers' activity inside Visma's network suggested they intended to infiltrate client systems in search of commercially-sensitive information.
"We believe that APT 10 in this case exploited Visma networks to enable secondary operations against Visma's customers, not necessarily to steal Visma's own intellectual property," she said. "Because they caught it so early they were able to discourage and prevent those secondary attacks."