Cookie Consent by Free Privacy Policy Generator ๐Ÿ“Œ AA21-042A: Compromise of U.S. Water Treatment Facility

๐Ÿ  Team IT Security News

TSecurity.de ist eine Online-Plattform, die sich auf die Bereitstellung von Informationen,alle 15 Minuten neuste Nachrichten, Bildungsressourcen und Dienstleistungen rund um das Thema IT-Sicherheit spezialisiert hat.
Ob es sich um aktuelle Nachrichten, Fachartikel, Blogbeitrรคge, Webinare, Tutorials, oder Tipps & Tricks handelt, TSecurity.de bietet seinen Nutzern einen umfassenden รœberblick รผber die wichtigsten Aspekte der IT-Sicherheit in einer sich stรคndig verรคndernden digitalen Welt.

16.12.2023 - TIP: Wer den Cookie Consent Banner akzeptiert, kann z.B. von Englisch nach Deutsch รผbersetzen, erst Englisch auswรคhlen dann wieder Deutsch!

Google Android Playstore Download Button fรผr Team IT Security



๐Ÿ“š AA21-042A: Compromise of U.S. Water Treatment Facility


๐Ÿ’ก Newskategorie: Sicherheitslรผcken
๐Ÿ”— Quelle: us-cert.cisa.gov

Original release date: February 11, 2021

Summary

On February 5, 2021, unidentified cyber actors obtained unauthorized access to the supervisory control and data acquisition (SCADA) system at a U.S. drinking water treatment plant. The unidentified actors used the SCADA systemโ€™s software to increase the amount of sodium hydroxide, also known as lye, a caustic chemical, as part of the water treatment process. Water treatment plant personnel immediately noticed the change in dosing amounts and corrected the issue before the SCADA systemโ€™s software detected the manipulation and alarmed due to the unauthorized change. As a result, the water treatment process remained unaffected and continued to operate as normal. The cyber actors likely accessed the system by exploiting cybersecurity weaknesses, including poor password security, and an outdated operating system. Early information indicates it is possible that aย desktop sharing software, such as TeamViewer, may have been used to gain unauthorized access to the system. Onsite response to the incident included Pinellas County Sheriff Office (PCSO), U.S. Secret Service (USSS), and the Federal Bureau of Investigation (FBI).

The FBI, the Cybersecurity and Infrastructure Security Agency (CISA), the Environmental Protection Agency (EPA), and the Multi-State Information Sharing and Analysis Center (MS-ISAC)ย have observed cyber criminals targeting and exploiting desktop sharing software and computer networks running operating systems with end of life status to gain unauthorized access to systems. Desktop sharing software, which has multiple legitimate usesโ€”such as enabling telework, remote technical support, and file transfersโ€”can also be exploited through malicious actorsโ€™ use of social engineering tactics and other illicit measures. Windows 7 will become more susceptible to exploitation due to lack of security updates and the discovery of new vulnerabilities. Microsoft and other industry professionals strongly recommend upgrading computer systems to an actively supported operating system. Continuing to use any operating system within an enterprise beyond the end of life status may provide cyber criminals access into computer systems.

Click hereย for a PDF version of this report.

Technical Details

Desktop Sharing Software

The FBI, CISA, EPA, and MS-ISAC have observed corrupt insiders and outside cyber actors using desktop sharing software to victimize targets in a range of organizations, including those in the critical infrastructure sectors. In addition to adjusting system operations, cyber actors also use the following techniques:

  • Use access granted by desktop sharing software to perform fraudulent wire transfers.
  • Inject malicious code that allows the cyber actors to
    • Hide desktop sharing software windows,
    • Protect malicious files from being detected, and
    • Control desktop sharing software startup parameters to obfuscate their activity.
  • Move laterally across a network to increase the scope of activity.

TeamViewer, a desktop sharing software, is a legitimate popular tool that has been exploited by cyber actors engaged in targeted social engineering attacks, as well as large scale, indiscriminate phishing campaigns. Desktop sharing software can also be used by employees with vindictive and/or larcenous motivations against employers.

Beyond its legitimate uses, TeamViewer allows cyber actors to exercise remote control over computer systems and drop files onto victim computers, making it functionally similar to Remote Access Trojans (RATs). TeamViewerโ€™s legitimate use, however, makes anomalous activity less suspicious to end users and system administrators compared to RATs.

Windows 7 End of Life

On January 14, 2020, Microsoft ended support for the Windows 7 operating system, which includes security updates and technical support unless certain customers purchased an Extended Security Update (ESU) plan. The ESU plan is paid per-device and available for Windows 7 Professional and Enterprise versions, with an increasing price the longer a customer continues use. Microsoft will only offer the ESU plan until January 2023. Continued use of Windows 7 increases the risk of cyber actor exploitation of a computer system.

Cyber actors continue to find entry points into legacy Windows operating systems and leverage Remote Desktop Protocol (RDP) exploits. Microsoft released an emergency patch for its older operating systems, including Windows 7, after an information security researcher discovered an RDP vulnerability in May 2019. Since the end of July 2019, malicious RDP activity has increased with the development of a working commercial exploit for the vulnerability. Cyber actors often use misconfigured or improperly secured RDP access controls to conduct cyberattacks. The xDedic Marketplace, taken down by law enforcement in 2019, flourished by compromising RDP vulnerabilities around the world.

Mitigations

General Recommendations

The following cyber hygiene measures may help protect against the aforementioned scheme:

  • Update to the latest version of the operating system (e.g., Windows 10).
  • Use multiple-factor authentication.
  • Use strong passwords to protect Remote Desktop Protocol (RDP) credentials.
  • Ensure anti-virus, spam filters, and firewalls are up to date, properly configured, and secure.
  • Audit network configurations and isolate computer systems that cannot be updated.
  • Audit your network for systems using RDP, closing unused RDP ports, applying multiple-factor authentication wherever possible, and logging RDP login attempts.
  • Audit logs for all remote connection protocols.
  • Train users to identify and report attempts at social engineering.
  • Identify and suspend access of users exhibiting unusual activity.

Water and Wastewater Systems Security Recommendations

The following physical security measures serve as additional protective measures:

  • Install independent cyber-physical safety systems. These are systems that physically prevent dangerous conditions from occurring if the control system is compromised by a threat actor.
  • Examples of cyber-physical safety system controls include:
    • Size of the chemical pump
    • Size of the chemical reservoir
    • Gearing on valves
    • Pressure switches, etc.

The benefit of these types of controls in the water sector is that smaller systems, with limited cybersecurity capability, can assess their system from a worst-case scenario. The operators can take physical steps to limit the damage. If, for example, cyber actors gain control of a sodium hydroxide pump, they will be unable to raise the pH to dangerous levels.

TeamViewer Software Recommendations

For a more secured implementation of TeamViewer software:

  • Do not use unattended access features, such as โ€œStart TeamViewer with Windowsโ€ and โ€œGrant easy access.โ€
  • Configure TeamViewer service to โ€œmanual start,โ€ so that the application and associated background services are stopped when not in use.
  • Set random passwords to generate 10-character alphanumeric passwords.
  • If using personal passwords, utilize complex rotating passwords of varying lengths. Note: TeamViewer allows users to change connection passwords for each new session. If an end user chooses this option, never save connection passwords as an option as they can be leveraged for persistence.
  • When configuring access control for a host, utilize custom settings to tier the access a remote party may attempt to acquire.
  • Require remote party to receive confirmation from the host to gain any access other than โ€œview only.โ€ Doing so will ensure that, if an unauthorized party is able to connect via TeamViewer, they will only see a locked screen and will not have keyboard control.
  • Utilize the โ€˜Block and Allowโ€™ list which enables a user to control which other organizational users of TeamViewer may request access to the system. This list can also be used to block users suspected of unauthorized access.

Contact Information

To report suspicious or criminal activity related to information found in this Joint Cybersecurity Advisory, contact your local FBI field office at www.fbi.gov/contact-us/field, or the FBIโ€™s 24/7 Cyber Watch (CyWatch) at (855) 292-3937 or by e-mail at [email protected] or your local WMD Coordinator. When available, please include the following information regarding the incident: date, time, and location of the incident; type of activity; number of people affected; type of equipment used for the activity; the name of the submitting company or organization; and a designated point of contact.

To request incident response resources or technical assistance related to these threats, contact CISA at [email protected].

Revisions

  • February 11, 2021: Initial Version

This product is provided subject to this Notification and this Privacy & Use policy.

...



๐Ÿ“Œ Poor Password Security Lead to Recent Water Treatment Facility Hack


๐Ÿ“ˆ 46.48 Punkte

๐Ÿ“Œ Attack against Florida Water Treatment Facility


๐Ÿ“ˆ 46.48 Punkte

๐Ÿ“Œ Hackers attempt to poison the well, but AI cybersecurity solutions bolster water treatment facility security


๐Ÿ“ˆ 46.48 Punkte

๐Ÿ“Œ Florida Water Treatment Facility Hack, and the Convergence of OT & IT - Damon Small - ESW #227


๐Ÿ“ˆ 46.48 Punkte

๐Ÿ“Œ Hackers Attempted to Poison the Water Supply After Gaining Access to the Water Treatment System


๐Ÿ“ˆ 40.29 Punkte

๐Ÿ“Œ Attacker Hacked into Florida Cityโ€™s Water Treatment Plant, Attempted to Poison Water Supply


๐Ÿ“ˆ 40.29 Punkte

๐Ÿ“Œ AA21-008A: Detecting Post-Compromise Threat Activity in Microsoft Cloud Environments


๐Ÿ“ˆ 39.31 Punkte

๐Ÿ“Œ AA21-077A: Detecting Post-Compromise Threat Activity Using the CHIRP IOC Detection Tool


๐Ÿ“ˆ 39.31 Punkte

๐Ÿ“Œ Hackers tried poisoning town after breaching its water facility


๐Ÿ“ˆ 29.61 Punkte

๐Ÿ“Œ ICS Hot Take: Oldsmar, FL Water Facility Event


๐Ÿ“ˆ 29.61 Punkte

๐Ÿ“Œ Hackers breach US water facility via exposed Unitronics PLCs


๐Ÿ“ˆ 29.61 Punkte

๐Ÿ“Œ Hackers use Unitronics PLCs that are exposed to breach a US water facility


๐Ÿ“ˆ 29.61 Punkte

๐Ÿ“Œ Hackers Knew How to Target PLCs in Israel Water Facility Attacks: Sources


๐Ÿ“ˆ 29.61 Punkte

๐Ÿ“Œ Iranian Hackers Access Unprotected ICS at Israeli Water Facility


๐Ÿ“ˆ 29.61 Punkte

๐Ÿ“Œ Iranian hackers access unsecured HMI at Israeli Water Facility


๐Ÿ“ˆ 29.61 Punkte

๐Ÿ“Œ Dutch Engineer Used Water Pump to Get Billion-Dollar Stuxnet Malware Into Iranian Nuclear Facility: Report


๐Ÿ“ˆ 29.61 Punkte

๐Ÿ“Œ Threat actors in January attempted to poison the water at a US facility


๐Ÿ“ˆ 29.61 Punkte

๐Ÿ“Œ Threat actors in January attempted to poison the water at a US facility


๐Ÿ“ˆ 29.61 Punkte

๐Ÿ“Œ Water Pump Used To Get $1 Billion Stuxnet Malware Into Iranian Nuclear Facility


๐Ÿ“ˆ 29.61 Punkte

๐Ÿ“Œ Intruders Altered Chemical Settings at Water Treatment Plant (March 22 and 23, 2016)


๐Ÿ“ˆ 28.58 Punkte

๐Ÿ“Œ Intruders Altered Chemical Settings at Water Treatment Plant (March 22 and 23, 2016)


๐Ÿ“ˆ 28.58 Punkte

๐Ÿ“Œ Israel government tells water treatment companies to change passwords


๐Ÿ“ˆ 28.58 Punkte

๐Ÿ“Œ Someone tried to poison a Florida city by hijacking its water treatment plant via TeamViewer, says sheriff


๐Ÿ“ˆ 28.58 Punkte

๐Ÿ“Œ Hacker Tried Poisoning Water Supply After Breaking Into Florida's Treatment System


๐Ÿ“ˆ 28.58 Punkte

๐Ÿ“Œ FBI, Secret Service investigating cyberattack on Florida water treatment plant


๐Ÿ“ˆ 28.58 Punkte

๐Ÿ“Œ COMMENT: Israel Government Tells Water Treatment Companies To Change Passwords


๐Ÿ“ˆ 28.58 Punkte

๐Ÿ“Œ Hacker Breached Florida Treatment Plant To Poison The Water Supply


๐Ÿ“ˆ 28.58 Punkte

๐Ÿ“Œ Misplaced expectations securing water treatment systems


๐Ÿ“ˆ 28.58 Punkte

๐Ÿ“Œ Learning from the Oldsmar Water Treatment Attack to Prevent Critical Infrastructure Breaches


๐Ÿ“ˆ 28.58 Punkte

๐Ÿ“Œ Attack on a water treatment plant highlights vulnerabilities in infrastructure


๐Ÿ“ˆ 28.58 Punkte

๐Ÿ“Œ Florida water treatment plant was involved in second security incident before poisoning attempt: report


๐Ÿ“ˆ 28.58 Punkte

๐Ÿ“Œ Experts React: San Francisco Water Treatment Plant Breach


๐Ÿ“ˆ 28.58 Punkte

๐Ÿ“Œ Experts detect new cyberattack targeting water treatment plant in the U.S.


๐Ÿ“ˆ 28.58 Punkte

๐Ÿ“Œ People in Haiti Are Dying Because They Lack Water, Food, and Medical Treatment


๐Ÿ“ˆ 28.58 Punkte

๐Ÿ“Œ AA21-048A: AppleJeus: Analysis of North Koreaโ€™s Cryptocurrency Malware


๐Ÿ“ˆ 27.07 Punkte











matomo