You are here: Home » News-IANS » Defence-Security
Business Standard

US, UK warn against Russia-sponsored cyber-attacks

IANS  |  San Francisco 

Cyber representatives from the US and Britain have warned of Russian state-sponsored cyber-attacks that are targeting such as routers and firewalls, to compromise government and private sectors globally.

According to a US Computer Emergency Response Team (US-CERT), the Technical Alert (TA) provided information on the worldwide cyber exploitation of (routers, switches, firewalls, Network-based Intrusion Detection Systems) by Russian state-sponsored cyber actors.

The joint TA is the result of analytic efforts between the US Department of Homeland (DHS), the (FBI), and the UK's National Cyber Centre, according to information on the official website of the DHS.

"Victims were identified through a coordinated series of actions between US and international partners. The report builds on previous DHS reporting and advisories from the UK, and the European Union," the website said.

"The FBI has high confidence that Russian state-sponsored cyber actors are using compromised routers to conduct man-in-the-middle attacks to support espionage, extract intellectual property, maintain persistent access to victim networks, and potentially lay a foundation for future offensive operations," the website added.

Since 2015, the has been receiving information from multiple sources -- including private and public sector cyber research organisations and allies -- that cyber actors were exploiting large numbers of enterprise-class and and switches worldwide.

The assessed that cyber actors supported by the carried out this worldwide campaign.

These operations enable espionage and intellectual property that supports the Russian Federation's national and economic goals, the website said.

Russian cyber actors leverage a number of legacy or weak protocols and service ports associated with network administration activities.

Cyber actors use these weaknesses to identify vulnerable devices, extract device configurations, harvest login credentials, modify device firmware, and copy or redirect victim traffic through Russian cyber-actor-controlled infrastructure.

Organisations can use publicly available cyber guidance and best practices from DHS, allied governments, vendors and the private-sector cyber community on mitigation strategies for the exploitation vectors to safeguard their networks.



(This story has not been edited by Business Standard staff and is auto-generated from a syndicated feed.)

First Published: Tue, April 17 2018. 11:52 IST