Rechercher
Contactez-nous Suivez-nous sur Twitter En francais English Language
 











Freely subscribe to our NEWSLETTER

Newsletter FR

Newsletter EN

Vulnérabilités

Unsubscribe

SecurityScorecard STRIKE Threat Intelligence

October 2023 by SecurityScorecard

Following the outbreak of war between Israel and Hamas on October 7, 2023, a wide variety of threat actors began claiming responsibility for cyberattacks against entities linked to both sides of the conflict.

Thus far, the attacks claimed by hacktivist groups have been relatively weak in both their impact and sophistication. However, on October 10, hacktivist group SiegedSec claimed responsibility for a series of attacks against Israeli infrastructure and industrial control systems (ICS).

Because attacks on ICS devices could have severe consequences, the SecurityScorecard Threat Research, Intelligence, Knowledge, and Engagement (STRIKE) Team focused on those.

When further investigating the cyber activity surrounding the conflict, the STRIKE Team focused on identifying other exposed Israeli ICS devices.

As of October 11, there is no indication that the IP addresses SiegedSec listed as targets have experienced denial of service attacks.

This could mean that these attempts were likely unsuccessful, though other explanations merit consideration.

Following the outbreak of war between Israel and Hamas on October 7, a wide variety of actors began claiming responsibility for cyberattacks against entities linked to both sides of the conflict.

The available evidence offers no clear indication that cyber activity preceded physical operations. Similarly, SecurityScorecard’s recently expanded collections of Hamas-affiliated messaging channels contain no evidence of how or when Hamas’s operation would begin prior to the start of the conflict. This suggests that, in contrast to other contemporary wars, the frequency or impact of cyber and information operations did not increase leading up to the war.

Attackers quite isolated from the physical conflict and without clear operational or organizational ties to it appear to be responsible for much of the cyber conflict thus far. This isolation, along with Israel’s technological advantage over Hamas, may explain why no cyber activity preceded the physical conflict. A Russian hacktivist group may, for example, oppose Israel and be capable of attempting attacks against Israeli targets following the start of the war, but such a group would be unlikely to have a relationship with Hamas that could have offered it the early indications necessary to conduct cyber operations as a prelude to physical attacks

Thus far, the attacks have chiefly involved distributed denial of service (DDoS) attacks and website defacements, relatively low-sophistication activity typical of the hacktivist groups claiming them. However, the international scope of this activity is noteworthy, purportedly featuring Indian and Ukrainian hacktivist groups sympathetic to Israel, and claiming attacks against Palestinian organizations. But Russia- and Iran-linked groups have mounted attacks against both public and private organizations in Israel. While some of these attacks have targeted fairly high-profile organizations, their disruptive impact has been relatively minimal, especially when compared to the kinetic activity related to the conflict.

KillNet and Anonymous Sudan, hacktivist groups believed to act in support of Russian geopolitical interests, have launched some of the highest-profile attacks against Israeli targets, including: the Israeli government’s website (www.gov.il); the Israel Security Agency, better known as Shin Bet or Shabak; shabak.gov.il); and the English-language newspaper the Jerusalem Post (jpost.com).

Recommendations

Speaking generally, SecurityScorecard recommends that organizations review the business necessity of exposing ICS devices to the wider Internet and, when possible, place them behind a VPN or firewall. If that is not possible, SecurityScorecard recommends that organizations consider restricting access to them by adding dependent IPs to an allow list.

To address the threat of DDoS attacks in particular, SecurityScorecard recommends the following:

Block the IPs in SecurityScorecard’s KillNet Bot Blocklist.

KillNet is only one of the many threat actor groups involved in the conflict, but this blocklist can likely help defend against more attackers than KillNet alone.

Although many of the highest-profile groups involved in these attacks, including KillNet and Anonymous Sudan, likely have links to Russia, blocking Russian IPs will not stop DDoS attacks. As reflected in SecurityScorecard’s blocklist, the attacks are coming from open proxies and DNS resolvers located all over the world.

Having only a firewall will not stop the volume of traffic we have observed in recent high-profile DDoS attacks. As a result, it’s critical to put DDoS mitigations in place via a service like Cloudflare, Akamai, or AWS Cloudfront.

Configure DNS resolvers and proxy servers to only accept requests from internal IP addresses and authorized users, unless there is a practical reason not to do so. Much of malicious bot infrastructure relies on open proxies. If all of these services were properly configured, it would be a crippling blow to the botnet operators that support the threat actors involved in the conflict.

Findings

As of October 11, a sample of network flow (NetFlow) data provided to SecurityScorecard by a strategic partner does not indicate that the IP addresses SiegedSec listed as targets have experienced volumes of traffic consistent with a typical denial of service attack. This may support other researchers’ assessment that these attempts were likely unsuccessful, though other explanations of the relative paucity of results do also merit consideration. The strategic partner’s ability to sample traffic involving the target IP addresses may, for example, have been unusually limited. However, in the absence of reported disruptions to Israeli infrastructure, the available NetFlow sample appears to support assessments that SiegedSec’s attacks were either unsuccessful or have not yet begun in earnest.

SecurityScorecard’s Attack Surface Intelligence module indicates that the following ICS services are in use at the Israeli IP addresses SiegedSec listed as targets:

Modbus Application Protocol (mbap)

Niagara Fox (niagara-fox)

Crestron Intersystem Communications (crestron-xsig)

Building Automation and Control Networks (bacnet)

In addition to those listed by SiegedSec, Attack Surface Intelligence has also identified these same services exposed at other Israeli IP addresses.

These observations indicate that mbap is the service exposed most frequently, crestro-xsig is the second most commonly exposed service, bacnet is the third, and niagara-fox is the least commonly exposed though the difference between the counts for bacnet and niagara-fox is considerably less pronounced than the others). Attack Surface Intelligence observes: 715 Israeli IP addresses where mbap is in use ;365 with observations of crestron-xsig; 37 with observations of bacnet; and 34 with observations of niagara-fox.

Conclusion

On October 9, the National Security Agency’s director of cybersecurity, Rob Joyce, noted that US intelligence has not yet observed evidence indicating that the conflict had resulted in particularly significant cyberattacks. The data SecurityScorecard gathered in the days since appears to support this assessment. While, hypothetically, attacks against ICS devices could prove more significant than many of the more visible attacks that have occurred thus far, the NetFlow data collected by the STRIKE Team does not yet point to successful attacks against the ICS targets claimed by SiegedSec. However, given the outsized impact such attacks could have on critical infrastructure, the Attack Surface Intelligence findings may merit closer attention as the conflict continues.


See previous articles

    

See next articles












Your podcast Here

New, you can have your Podcast here. Contact us for more information ask:
Marc Brami
Phone: +33 1 40 92 05 55
Mail: ipsimp@free.fr

All new podcasts