{"id":10388,"date":"2022-07-05T10:42:58","date_gmt":"2022-07-05T13:42:58","guid":{"rendered":"https:\/\/www.fie.undef.edu.ar\/ceptm\/?p=10388"},"modified":"2022-07-05T10:43:28","modified_gmt":"2022-07-05T13:43:28","slug":"ataques-a-agencias-gubernamentales","status":"publish","type":"post","link":"https:\/\/www.fie.undef.edu.ar\/ceptm\/?p=10388","title":{"rendered":"Ataques a agencias gubernamentales"},"content":{"rendered":"<p>Resecurity, Inc. (EE. UU.) ha identificado un aumento en la actividad dentro de los grupos hacktivistas, que est\u00e1n aprovechando las tensiones geopol\u00edticas actuales entre Ucrania y Rusia para realizar ataques cibern\u00e9ticos. Se ha identificado un nuevo grupo llamado &#8220;Cyber Spetsnaz&#8221;. Los actores se est\u00e1n posicionando como un grupo\u00a0ciberofensivo\u00a0de \u00e9lite que tiene como objetivo la infraestructura de la OTAN y realiza ciberespionaje para robar datos confidenciales.<\/p>\n<hr \/>\n<p><a href=\"https:\/\/resecurity.com\/\" target=\"_blank\" rel=\"noopener\">Resecurity, Inc.<\/a>\u00a0(USA) has identified an increase in activity within hacktivist groups, they\u2019re leveraging current geopolitical tensions between the Ukraine and Russia to perform cyber-attacks. Following the attacks of the\u00a0<a href=\"https:\/\/securityaffairs.co\/wordpress\/131776\/hacking\/killnet-threatens-italy.html\" target=\"_blank\" rel=\"noopener\">Killnet\u00a0<\/a>Collective, the group responsible for the attacks against major government resources and law enforcement, a new group has been identified called \u201cCyber Spetsnaz\u201d. The actors are positioning themselves as an elite cyber offensive group targeting NATO infrastructure and performing cyberespionage to steal sensitive data.<\/p>\n<p>Starting May 24, the group calling themselves \u201cCyber Spetsnaz\u201d announced the launch of a new campaign \u201cPanopticon\u201d which aimed to recruit 3,000 volunteer cyber offensive specialists willing to participate in attacks against the European Union and the Ukrainian government institutions including Ukrainian companies.<\/p>\n<p>Around April time, \u201cCyber Spetsnaz\u201d built one its first divisions called \u201cZarya\u201d, they looked for experienced penetration testers, OSINT specialists, and hackers:<\/p>\n<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-10390\" src=\"https:\/\/www.fie.undef.edu.ar\/ceptm\/wp-content\/uploads\/2022\/07\/Cyber-Spetsnaz-Article_html_9c0cd242e71c2356.webp\" alt=\"\" width=\"429\" height=\"246\" srcset=\"https:\/\/www.fie.undef.edu.ar\/ceptm\/wp-content\/uploads\/2022\/07\/Cyber-Spetsnaz-Article_html_9c0cd242e71c2356.webp 429w, https:\/\/www.fie.undef.edu.ar\/ceptm\/wp-content\/uploads\/2022\/07\/Cyber-Spetsnaz-Article_html_9c0cd242e71c2356-300x172.webp 300w\" sizes=\"(max-width: 429px) 100vw, 429px\" \/><\/p>\n<p>Around this time the group performed one of their first coordinated attacks against NATO. Prior to that, \u201cCyber Spetsnaz\u201d members have been distributing domains assigned to the NATO infrastructure, by doing so they could plan an effective attack. The actor shared a list of NATO resources and a comprehensive Excel file.<\/p>\n<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-10391\" src=\"https:\/\/www.fie.undef.edu.ar\/ceptm\/wp-content\/uploads\/2022\/07\/Cyber-Spetsnaz-Article_html_3aea28eeedf152e6.webp\" alt=\"\" width=\"768\" height=\"781\" srcset=\"https:\/\/www.fie.undef.edu.ar\/ceptm\/wp-content\/uploads\/2022\/07\/Cyber-Spetsnaz-Article_html_3aea28eeedf152e6.webp 768w, https:\/\/www.fie.undef.edu.ar\/ceptm\/wp-content\/uploads\/2022\/07\/Cyber-Spetsnaz-Article_html_3aea28eeedf152e6-295x300.webp 295w\" sizes=\"(max-width: 768px) 100vw, 768px\" \/><\/p>\n<p>On June 2nd, the group created a new division called \u201cSparta\u201d. The responsibility of the new division includes \u201ccyber sabotage\u201d, disruption of Internet resources, data theft and financial intelligence focused on NATO, their members and allies. Notably, \u201cSparta\u201d outlines this activity as a key priority today and confirms the newly created division is an official part of \u201cKillnet Collective\u201d group.<\/p>\n<p>Based on the description, the actors call themselves \u201chacktivists\u201d, however, it\u2019s not yet clear if the group has any connection to state actors. Sources interviewed by Security Affairs interpreted this activity with high levels of confidence to be state-supported. Interestingly, the name \u201cSparta\u201d (in context of the current Ukrainian war) is related to the name of a unit from the Donetsk People\u2019s Republic (DNR).<\/p>\n<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-10392\" src=\"https:\/\/www.fie.undef.edu.ar\/ceptm\/wp-content\/uploads\/2022\/07\/Cyber-Spetsnaz-Article_html_8a87c098c188c34.webp\" alt=\"\" width=\"442\" height=\"698\" srcset=\"https:\/\/www.fie.undef.edu.ar\/ceptm\/wp-content\/uploads\/2022\/07\/Cyber-Spetsnaz-Article_html_8a87c098c188c34.webp 442w, https:\/\/www.fie.undef.edu.ar\/ceptm\/wp-content\/uploads\/2022\/07\/Cyber-Spetsnaz-Article_html_8a87c098c188c34-190x300.webp 190w\" sizes=\"(max-width: 442px) 100vw, 442px\" \/><\/p>\n<p>Besides proprietary tools, they\u2019re leveraging MHDDoS, Blood, Karma DDoS, Hasoki, DDoS Ripper and GoldenEye scripts to generate malicious traffic on Layer 7 which may impact the availability of WEB resources.<\/p>\n<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-10393\" src=\"https:\/\/www.fie.undef.edu.ar\/ceptm\/wp-content\/uploads\/2022\/07\/Cyber-Spetsnaz-Article_html_f90374d052a3f632.webp\" alt=\"\" width=\"525\" height=\"470\" srcset=\"https:\/\/www.fie.undef.edu.ar\/ceptm\/wp-content\/uploads\/2022\/07\/Cyber-Spetsnaz-Article_html_f90374d052a3f632.webp 525w, https:\/\/www.fie.undef.edu.ar\/ceptm\/wp-content\/uploads\/2022\/07\/Cyber-Spetsnaz-Article_html_f90374d052a3f632-300x269.webp 300w\" sizes=\"(max-width: 525px) 100vw, 525px\" \/><\/p>\n<p>The group performed cyber-attacks against 5 logistic terminals in Italy (Sech, Trieste, TDT, Yilprort, VTP) and several major financial institutions too. \u201cPhoenix\u201d coordinated its activities with another division called \u201cRayd\u201d who previously attacked government resources in Poland including the Ministry of Foreign Affairs, Senate, Border Control and the Police. Other divisions involved in the DDoS attacks included \u201cVera\u201d, \u201cFasoninnGung\u201d, \u201cMirai\u201d, \u201cJacky\u201d, \u201cDDOS Gung\u201d and \u201cSakurajima\u201d who previously attacked multiple WEB-resources in Germany.<\/p>\n<p>According to Resecurity, such hacktivist campaigns typically have the goal to orchestrate certain information operations rather than a real cyber-attack that disrupts networks or the availability of critical resources. Cybersecurity specialists should be especially careful with attribution, as in some cases such activity leads to provocations and purposely generated operations.<\/p>\n<p>Based on the observed victims and close collaboration with several impacted organizations, the attacks primarily focused on the exploitation of poorly configured WEB servers and short-term disruptions. Proper hardening and implementation of WAF, along with DDoS protection may preemptively resolve the issue, as the total network attack pool of unique sources may be exhausted relatively quickly. The logged sources of attacks showed how the attackers are actively using spoofed IP addresses and the deployment of tools on compromised IoT devices and hacked WEB resources.<\/p>\n<p>Ukraine\u2019s main cybersecurity incident response team\u00a0<a href=\"https:\/\/cip.gov.ua\/en\/news\/p-yat-khakerskikh-ugrupuvan-yaki-naichastishe-atakuyut-ukrayinu\" target=\"_blank\" rel=\"noopener\">released<\/a>\u00a0a list of the five most persistent hacking groups and malware families attacking Ukraine\u2019s critical infrastructure. Hostile hacking groups are exploiting Russia\u2019s invasion of Ukraine to carry out cyberattacks designed to steal login credentials, sensitive information, money and more from victims around the world.<\/p>\n<p>According to cybersecurity researchers at Google\u2019s Threat Analysis Group (TAG), government-backed hackers from Russia, China, Iran and North Korea, as well as various unattributed groups and cyber-criminal gangs, are using various themes related to the war in Ukraine to lure people into becoming victims of cyberattacks.<\/p>\n<blockquote><p>Security Affairs is one of the finalists for the best European Cybersecurity Blogger Awards 2022 \u2013 VOTE FOR YOUR WINNERS. I ask you to vote for me again (even if you have already done it), because this vote is for the final.<\/p>\n<p>Please vote for Security Affairs and Pierluigi Paganini in every category that includes them (e.g. sections \u201cThe Underdogs \u2013 Best Personal (non-commercial) Security Blog\u201d and \u201cThe Tech Whizz \u2013 Best Technical Blog\u201d)<\/p><\/blockquote>\n<p><strong>Fuente:<\/strong> <a href=\"https:\/\/securityaffairs.co\/wordpress\/131967\/hacking\/exclusive-pro-russia-cyber-spetsnaz-is-attacking-government-agencies.html\" target=\"_blank\" rel=\"noopener\"><em>https:\/\/securityaffairs.co<\/em><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Resecurity, Inc. (EE. UU.) ha identificado un aumento en la actividad dentro de los grupos hacktivistas, que est\u00e1n aprovechando las tensiones geopol\u00edticas actuales entre Ucrania&hellip; <\/p>\n","protected":false},"author":1,"featured_media":10389,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[23,28],"tags":[],"_links":{"self":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/10388"}],"collection":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=10388"}],"version-history":[{"count":2,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/10388\/revisions"}],"predecessor-version":[{"id":10395,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/10388\/revisions\/10395"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/media\/10389"}],"wp:attachment":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=10388"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=10388"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=10388"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}