Article Details

Scrape Timestamp (UTC): 2024-01-14 09:09:30.145

Source: https://thehackernews.com/2024/01/new-findings-challenge-attribution-in.html

Original Article Text

Click to Toggle View

New Findings Challenge Attribution in Denmark's Energy Sector Cyberattacks. The cyber attacks targeting the energy sector in Denmark last year may not have had the involvement of the Russia-linked Sandworm hacking group, new findings from Forescout show. The intrusions, which targeted around 22 Danish energy organizations in May 2023, occurred in two distinct waves, one which exploited a security flaw in Zyxel firewall (CVE-2023-28771) and a follow-on activity cluster that saw the attackers deploy Mirai botnet variants on infected hosts via an as-yet-unknown initial access vector. The first wave took place on May 11, while the second wave lasted from May 22 to 31, 2023. In one such attack detected on May 24, it was observed that the compromised system was communicating with IP addresses (217.57.80[.]18 and 70.62.153[.]174) that were previously used as command-and-control (C2) for the now-dismantled Cyclops Blink botnet. Forescout's closer examination of the attack campaign, however, has revealed that not only were the two waves unrelated, but also unlikely the work of the state-sponsored group owing to the fact the second wave was part of a broader mass exploitation campaign against unpatched Zyxel firewalls. It's currently not known who is behind the twin sets of attacks. "The campaign described as the 'second wave' of attacks on Denmark, started before and continued after [the 10-day time period], targeting firewalls indiscriminately in a very similar manner, only changing staging servers periodically," the company said in a report aptly titled "Clearing the Fog of War." There is evidence to suggest that the attacks may have started as early as February 16 using other known flaws Zyxel devices (CVE-2020-9054 and CVE-2022-30525) alongside CVE-2023-28771, and persisted as late as October 2023, with the activity singling out various entities across Europe and the U.S. "This is further evidence that exploitation of CVE-2023-27881, rather than being limited to Danish critical infrastructure, is ongoing and targeting exposed devices, some of which just happen to be Zyxel firewalls safeguarding critical infrastructure organizations," Forescout added. Report: Unveiling the Threat of Malicious Browser Extensions Download the Report to learn the Risks of Malicious Extensions and How to Mitigate Them. Firewalls vs. Zero Trust: Minimize Your Attack Surface Learn latest trends in the attack landscape, attacker strategies, and how to implement Zero Trust Security.

Daily Brief Summary

CYBERCRIME // Unraveling the Truth Behind Denmark Energy Sector Cyberattacks

Initial claims connected Russia-linked Sandworm to cyberattacks on 22 Danish energy organizations in May 2023.

New analysis from Forescout indicates two separate attack waves, not linked to each other or to Sandworm.

First wave exploited a Zyxel firewall vulnerability on May 11; second wave used Mirai botnet variants from May 22 to 31.

Second wave's attacks aligned with a broader pattern of targeting unpatched firewalls, not just Danish infrastructure.

Evidence suggests these cyberattacks began as early as February 16, utilizing various exploits in Zyxel devices.

Ongoing attacks across Europe and the U.S. indicate that the flaws were not exclusively exploited against Danish targets.

The report underscores the need for robust cybersecurity measures beyond the immediate incidents in Denmark.