cephurs

gru

Oct 24th, 2020
469
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 4.10 KB | None | 0 0
  1. https://www.washingtonpost.com/national-security/us-sanctions-russian-lab-malware/2020/10/23/03f8631c-1564-11eb-ba42-ec6a580836ed_story.htmlNational Security
  2. Foreign Policy
  3. Justice
  4. Military
  5. National Security
  6. U.S. sanctions Russian lab that built what experts say is potentially the world’s deadliest hacking tool
  7. An oil tanker takes on cargo at Saudi Aramco's Ras Tanura oil refinery and oil terminal on May 21, 2018.
  8. An oil tanker takes on cargo at Saudi Aramco's Ras Tanura oil refinery and oil terminal on May 21, 2018. (Ahmed Jadallah/Reuters)
  9. By
  10. Ellen Nakashima
  11. Oct. 23, 2020 at 4:04 p.m. MDT
  12. The United States on Friday sanctioned a Russian government lab that built what experts say is potentially the world’s deadliest hacking tool — malware designed to disrupt industrial control safety systems that protect human life.
  13.  
  14. The Treasury Department’s designation of an institute of the State Research Center of the Russian Federation marks the first time the United States has sanctioned hackers for targeting industrial control systems, analysts said.
  15.  
  16. “The Russian Government continues to engage in dangerous cyber activities aimed at the United States and our allies,” Treasury Secretary Steven T. Mnuchin said in a statement. “This Administration will continue to aggressively defend the critical infrastructure of the United States from anyone attempting to disrupt it.”
  17.  
  18. Potentially deadly malware linked to a Russian lab by Mandiant
  19.  
  20. The lab — the Central Scientific Research Institute of Chemistry and Mechanics in Moscow — created the Triton malware, also known as Trisis and HatMan, used in an attack on a Saudi petrochemical facility in 2017 that resulted in tens of millions of dollars in lost production. Dozens of people could have been killed, but a coding error prevented the malware from working as intended, and a potential catastrophe was averted, experts said.
  21.  
  22. The lab is thought to have links to Russia’s GRU military spy agency.
  23.  
  24. The hackers who attacked the Saudi plant also have scanned and probed U.S. energy facilities, as well as oil and gas companies in Europe and the Persian Gulf, experts said. The Saudi plant was identified by E & E News in 2017 as Petro Rabigh.
  25.  
  26. The malware at Petro Rabigh was found almost by accident, said John Hultquist, senior director of intelligence analysis at the cybersecurity company Mandiant, which was among the firms called in to investigate the incident. The hackers tripped a safety system, causing the plant to shut down, which led to the cyber investigation, he said.
  27.  
  28. “This malware is a threat to human life,” Hultquist said. Mandiant in 2018 linked the malware to the Russian lab.
  29.  
  30. The sanctions are “a very significant move by the U.S. government,” said Robert M. Lee, a co-founder of Dragos, a cybersecurity firm that, like Mandiant, identified the malware. “It’s a good norm-setting moment. It’s a signal to say, ‘Hands off’ of industrial control equipment.”
  31.  
  32. Dragos: They’re on the lookout for malware that can kill
  33.  
  34. The sanctions freeze any assets the institute holds in the United States, and Americans are barred from engaging in transactions with the lab.
  35.  
  36. It remains unclear why Russia would have targeted the Saudi plant.
  37.  
  38. The Treasury Department said in a news release that the use of the Triton malware “against our partners is particularly troubling given the Russian government’s involvement in malicious and dangerous cyber-enabled activities.”
  39.  
  40. Just this week, the United States unsealed charges against GRU operatives in connection with the NotPetya cyberattack, the costliest cyber intrusion in history, which damaged institutions across the globe. Russian hackers also have targeted the U.S. energy grid, potentially to enable future offensive operations, as well as the Organization for the Prohibition of Chemical Weapons and the World Anti-Doping Agency.
  41.  
  42. Four years ago, the GRU hacked and leaked Democratic emails, disrupting the presidential election. Russian hackers also probed state and local election systems in 2016, penetrating several, though they did not alter votes or manipulate information.
Add Comment
Please, Sign In to add comment