Pipeline Hackers Say They're 'Apolitical,' Will Choose Targets More Carefully Next Time (vice.com) 134
The criminal hacking group suspected of being behind the ransomware attack on the Colonial Pipeline, which was shut down as a precaution in response, has published a new statement on its dark web site saying it is "apolitical." From a report: "We are apolitical, we do not participate in geopolitics, do not need to tie us with a defined government and look for other our motives," the statement from the DarkSide ransomware group reads. The statement did not explicitly point to the Colonial Pipeline incident, but it was titled "About the latest news." Various outlets have reported that U.S. officials and private industry say DarkSide is behind the ransomware event. Dmitry Smilyanets, a cyber threat intelligence expert from cybersecurity firm Recorded Future, tweeted a screenshot of the statement on Monday. Motherboard verified the statement is available on DarkSide's dark web site. "Our goal is to make money, and not creating problems for society," the statement continues. The statement also indicated that the group may be making changes to how it operates and chooses targets. "From today we introduce moderation and check each company that our partners want to encrypt to avoid social consequences in the future," it read.
Oops (Score:5, Insightful)
Re:Oops (Score:5, Interesting)
Re: (Score:2)
There's no defense spending that would take care of this. The solution is not opening your industrial systems up for Remote Desktop connections.
I guess they could throw out a 2 million dollar contract for someone to install McAfee. But they do that kind of thing regularly anyway, without needing to engineer a complex false-flag operation. All they need is a Powerpoint that says "cyber" a lot.
Re: (Score:3)
Remote desktop is not the problem. Crappy insecure Microsoft remote desktop is.
Re: (Score:3)
Remote desktop is not the problem. Crappy insecure Microsoft remote desktop is.
Do you think they'd be better off with a VNC server?
The better solution would be a SCADA system that's built to allow limited (and audited) remote control instead of taking a system that's meant only for on-site engineers for use in a secured control room and putting it on the internet with nothing but a simple remote desktop password to protect it, since once they through that password, they have full control do do anything someone sitting on-site can do. Even a firewall that requires a 2FA protected VPN
Re: Oops (Score:4, Interesting)
It's not clear that SCADA systems were involved. There are hints that the pipeline was ok, but that they were shut down anyway as a precaution.
Also it's not a typical ransomware that threatens to wipe your hard disk unless you pay; the threat here is that they want to expose all the records, a threat that exists even if there are proper backups and files are restored. Ransomware isn't even a good word anymore, it's just plain extortion.
Passwords are old school, need something better, and 2FA isn't really it. Instead a some industrial networks or infrastructre rely on certficates. The certificate might only begood for one day of 10 transactions, thus preventing a single disgruntled employee from screwing up the entire system, or shutting off service to the ex. But trying to explain such a system is complex when even the average IT guy thinks that merely using longer passwords will solve the problems.
Re: (Score:3)
Sorry, but 2FA definitely is it. Yes, it is expensive, and yes, you need to carry a token. But that is the only thing that works.
Re: (Score:2)
Well, in the scenario I had, you carry a "token" but it's not a phone or dongle, instead it's your laptop or handheld that has a limited time cert that expires at the end of the day automatically. That's *better* than 2FA. 2FA is an IT thing, good for protecting your account login access but clumsy or insecure in other ways. Ie, do you use your personal phone, or the company supplied phone for network router #1, or the company supplied phone for for pipeline shutdown valve #2, or... The laptop is in a se
Re: (Score:2)
Actually, what you describe is far worse than 2FA. If anybody attacks that device successfully, then they gets free reign for the validity period of that cert. Extremely bad. 2FA never gives anybody that. All they can do is take over an existing connection and that is really hard to do or impossible without getting noticed.
But I do now know you are not a security expert. Sales?
Re: (Score:2)
I'm not an in-depth expert but I have developed for security and managed a security team involved in industrial uses. Irrelevant though, more important is that I know how state of the art security is done in practice with industrial IoT and standalone devices. Yes, there are a lot of insecure industrial devices but the trend is changing and the customers are demanding security. They use PKI, the cornerstone behind DTLS, TLS, SSL or other protocols in common use on secure industrial devices that don't have
Re: (Score:2)
Remote desktop is not the problem. Crappy insecure Microsoft remote desktop is.
Do you think they'd be better off with a VNC server?
Not really. But look at X forwarding over SSH and you get an idea what is actually possible and should be state-of-the-art.
Re: (Score:2)
Remote Desktop is fine. The problem is the way people configure it. Open to the internet and just a password to connect. No enforcement of certificate checks.
Re: (Score:2)
And then you look at thinks like X forwarding over SSH and realize "open to the Internet" is not a problem and neither is "just a password to connect". Of course, this assumes the default certificate checks in SSH have not been disabled, because software in the UNIX space tends to give you that option as it assumes you know what you are doing.
Face it, security-wise, the whole MS world is 20 years behind.
Re: (Score:2)
You could be crazy to have SSH open to the internet with just a password and no additional protection.
Some kind of rate limiting as a minimum, ditch passwords and use public key crypto. Make sure the certificate of the machine you are connecting to matches the ones you expect.
Re: (Score:2)
Nope. Have been doing it for 20 years. It is not a security concern if you either have good passwords or use certificate authentication, which is really easy with SSH. The server certificate gets checked automatically after first login and you get warned if it changes. When you have high security needs you may want to check the server cert fingerprint on first login or get it via some side-channel. Also note that sftp is ftp over ssh and it is the usual solution in security-conscious industries to send file
Re: (Score:2)
So how mad was the scramble to patch 10,000 machines when CVEs were found in the SSH servers?
Re: (Score:2)
Re:Oops (Score:5, Interesting)
These slimeballs have attacked plenty of critical infrastructure in the past, including hospitals. They aren't just apolitical; they are absolutely immoral.
I have to wonder what has happened behind the scenes to cause them to publish this message. Maybe they have received some anonymous emails along the lines of "We know who you are"? Maybe one or two of their members have suddenly vanished and can no longer be contacted?
The U.S. does not lack the resources or capability to retaliate. All it takes is sufficient motivation to strike back, and these guys may have finally crossed that line.
Re: (Score:1)
Don't forget that if they are Russian backed or Chinese backed, their government may not be happy with additional focused attention and then disappear anyone in group who was compromised.
Re: (Score:3)
I would guess the Little Spymaster has told them to knock it off - taking out a major pipeline could cause problems for *him*.
Re: (Score:1)
Re: (Score:3)
Re:Oops (Score:5, Funny)
I have to wonder what has happened behind the scenes to cause them to publish this message.
I imagine there was a conversation like this.
[Scene: A dark room in an unknown location. Laughter and voices speaking Russian can be heard. Vodka is flowing freely as everyone is cheering something.]
Leader [in Russian]: Congrats, team! This is our biggest haul yet. We'll be raking in...
[The Leader's phone rings. The screen indicates it's his wife. He answers it.]
Unknown Male Voice on the Phone [in Russian]: Stop it.
Leader: Who is...
Unknown Voice: We know you, Andrei Ivanov, age 46, born August 24, 1972, to Ivan and Tatiana Ivanov. You reside at 505 Gargarin Avenue with your wife, Ilya, and 10 year-old daughter...
Leader/Andrei [angrily]: If I...
Voice [not pausing in the slightest]: ...Natasha. It's Monday. Your daughter is usually home with your wife after school at this time, but for the last four months she's been spending the second Monday of each month with her friend, Katerina, so that your wife can have some alone time with your neighbor [sound of rustling papers in the background] Yuri. Your mother is not well. She has undiagnosed pancreatic cancer and won't live through the week.
Andrei [eyes going wide]: Wait, I...
Voice: We've tolerated you and your DarkSide, Andrei, but the US is calling this an act of war. They demand concessions. Heads will roll. When I next speak with our leader, do you know whose name I will give when he asks who did this?
Andrei [gulping]: Mine?
Voice [cutting off the response before Andrei can complete the word]: Yours. Unless...
Andrei: Yes?
Voice: ...you target who we tell you, when we tell you. You belong to us. DarkSide belongs to us. You are ours.
Andrei: But I...
Voice: Of course, we have some vacancies at our finest Siberian establishment for you and your family, if you have any objections?
Andrei: No, I just...
*click*
[the rest of the group looks on for a second, before finally breaking the silence]
Onlooker: Andrei, what was that?
[Andrei stares at the phone for a moment, then looks up and answers]
Andrei: My whore of a wife is sleeping with my neighbor!
Re: (Score:2)
It’s the 21st century. No judgment here.
>_>
Definitely not a mistake. Nope.
Re: (Score:2)
Re: (Score:2)
But if you mess with my gasoline price, buddy you better be ready for nuclear war. You do NO
Re: (Score:1)
More like, oops, we accidentally your country.
That's a power play. "Nope, not even deliberately, just kind of as an afterthought."
Re: (Score:2)
We painted too big of a target on our back; please forget about us, OK?
Security by threat of retaliation should be discredited for the same reason as security-by-obscurity; Neither is a calculably certain guarantee of information security.
Law enforcement should focus less on retaliation and institutions more on prevention.
Re: (Score:2)
Pretty much what I thought. If these people ever get caught, they probably will die in prison and they seem to realize that.
Re: (Score:2)
They are merely making money the old fashioned way. They take it. So very patriotic.
Re: (Score:2)
What are you even talking about?
No one was murdered here. Someone pointed out that the US might be hunting whoever did this attack ("I'd start checking the sky for drones"). I think it's unlikely that they'll be killed; we haven't really seen that with any hacking groups yet. It's more likely that there would just be further escalation in the US-Russia situation.
Furthermore, I don't know many (read: any) Americans that support murdering unconvicted people, especially if it's not clear that the facts are pro
Re: (Score:2)
"Furthermore, I don't know many (read: any) Americans that support murdering unconvicted people, especially if it's not clear that the facts are properly understood."
And yet, both Obama and Clinton openly admitted to doing so, and people voted for them. I'm sure that many if not all other leaders have done likewise.
Re: Oops (Score:1)
Cry some more, loser. Maybe that'll help.
Putin is the head of the Russian Mafia (Score:5, Interesting)
The Underpants Poisoner calls the shots for the Russian mafia. You can't even open a bar in Russia without the Russian government onboard.
You think the Russian mafia figures who orchestrated this attack on critical American infrastructure fear the Russian police? Hell no. They are the Russian security service.
Russia is a mafia state, and the mob helps Putin and his allies suck up Russia's wealth.
Lock Him Up.
Re:Putin is the head of the Russian Mafia (Score:4, Insightful)
You can't open a bar in American without the government allowing it either.
Re: (Score:1)
Fucking idiot, you can't open a bar in America without the government in on it either. It's call "liquor license" and "taxes" and "incorporation".
Thieves with a social conscience (Score:1)
Re: (Score:3)
Re: (Score:2)
So the question is who do they think they can attack that wont 'cause any problems for society' granted not attacking critical infrastructure might have less immediate and less acute consequences for 'society' its not like other crime is inconsequential.
Do they think the cost of things like umbrella insurance don't go up for everyone else when the knock over a business?
Re: (Score:2)
This is like having someone asking for directions come onto your porch, put their foot through a rotten plank, and then pointing the finger at them for causing the broken board. The single
Re: (Score:2)
Third? This is what, the 800th? Or the 8000th?
Taking this stuff seriously is expensive and difficult. Companies that have multi-layered defences covering multiple attack vectors with up to date software, monitoring and detection, teams doing nothing more than testing, validating, verifying and looking out for this stuff and a vast profit munching budget behind all of that _still_ get compromised.
Organisations run by people that can't even switch on a fucking iPad? Not a fucking chance.
Privatize it (Score:5, Interesting)
It seems to me, that these ransoms are big enough now that someone could turn the tables by simply publishing a bounty... 50% of the ransom will be paid to the person who rats out his comrades. First one to squeal wins, and if that person cannot be brought to justice via international treaties, then perhaps we let the rules of war apply.
I'm sure there are lots of security researchers in the US who have the skills to identify these guys, but just lack the proper motivation. And for any of you who think "the government can't do this, why do you think anyone else could" I preempt your statement with "our government was unable to secure the OPM, as well as FermiLab... they are absolutely incompetent."
I say the government should hand this off to the private sector just like the government has basically ceded space launches to the private sector. As Dan Aykroid said in the original Ghost Busters "I've worked in the private sector... they expect results!"
Re: (Score:2)
Ransomware was never fun, and TOR exit nodes are now well-understood and each ring of the onion becomes revealed.
Slowly, the circle gets smaller, and crypto account movements become known, and the trails get more hounds, and then something happens. It is, as it always has been.
Re: (Score:2)
What happens when someone says - oh sure it was me and Biff, Raj, and Sam over here were my conspiritors give me the $100k and shoot them!
Or if some security researcher who is on the up and up just gets it wrong?
Re: (Score:2)
In Mother Russia, we shoot them. In the good 'ol U S of A we try them first, then shoot them. Hopefully the trial will weed out the liars. I admit it's a messy business.
Re: (Score:2)
Re: (Score:2)
I'm sure there are lots of security researchers in the US who have the skills to identify these guys, but just lack the proper motivation.
Being a hacker bounty hunter sounds pretty cool at first glance. Then I realized that some of these hackers are funded by nation states and cartels.
Re: (Score:2)
It seems to me, that these ransoms are big enough now that someone could turn the tables by simply publishing a bounty... 50% of the ransom will be paid to the person who rats out his comrades.
Wasn't that the plot of a Mel Gibson movie [imdb.com]?
Ransomware is organized crime (Score:2)
Near term the only solution to ransomware is better security. Long term it's better foreign policy.
Re: (Score:2)
Those were two separate operative statements. One: Rat out your team for some $$$. Two: First one to squeal wins (anybody who can unmask them gets paid.
I apologize for being unclear. I'm just thinking that the humble honey pot is still a nascent art with many decades of life ahead of it. Stow a custom URL, fake credentials, etc. on every device you need to defend, and instantly, the criminal can't know what info leads to a payday, and which info leads to prison. The uncertainty is what makes it fun! ;)
well, that's that then (Score:5, Funny)
Re: (Score:2, Insightful)
It was mostly peaceful. Probably about as peaceful as Portland I suppose. Glad I don't live in either of those areas.
Ransomware is terrorism (Score:2, Insightful)
That justifies killing the perps without warning. Humans only respect what they fear.
The pipeline attack was an act of war.
Re: (Score:2)
While I'm confident Biden is stupid enough to drone strike someone in Russia, I'm fairly sure his handlers want a more subtle escalation of hostilities.
too little, too late (Score:5, Insightful)
Re:too little, too late (Score:4, Interesting)
This is bad enough that you'd expect three-letter agencies to be aggressively hunting the people involved, not just updating a case file, and having access to the kind of resources you need to actually find them.
They should very much be scared, no matter what country they're in. Hell, their own country might just want to make them disappear.
Re:too little, too late (Score:5, Interesting)
He describes a probable outcome of the next world war: @ 35.30 https://www.youtube.com/watch?... [youtube.com]
Re: (Score:2)
Identify them (which is bad enough if they're state operatives), and personally sanction them anywhere that uses a US bank or US dollars. Request their extradition to the US to face charges and make sure their government understands the sanctions that will come down if the request is refused. There are other nations where they could be from that are simply either friendly or rely on American support one way or another.
They don't have to do anything that would make a good spy/action movie to be a scary th
Re: (Score:2)
Re: (Score:2)
we risk the world leaving the dollar as it's reserve currency.
Not really. That would be a massive infrastructure change which would be even more disruptive than sanctions on Russia.
Re: (Score:2)
Re: (Score:2)
Assonate on Russian soil?
Yes. They can do exactly that and make it look like an accident or a hit by the Russian mob, or just pay the Russian mob to do their dirty work for them. . And, the Russians know they can't scream too loudly about it because they have done assassinated people on foreign soil including in the U.S.
Re: (Score:2)
The US has made abundantly clear that they can and will kill targets that pose an active threat to the US regardless of where they are located. Just ask Bin Laden and Soleimani. If some Russian hackers were to mysteriously turn up dead there is little Russia could officially do or complain about, as they claim to have no knowledge of these people in the first place.
Re: (Score:2)
" All US military is dependent on 50 year old, vulnerable GPS,"
Except it isn't and INS among other options is retained as backup. Small IMUs are big business (too bad they've not made it to phones...yet).
Re: (Score:2)
All US military is dependent on 50 year old, vulnerable GPS, while the Chinese have built a secure alternative.
Do you know what you're talking about? Military GPS is not vulnerable in the way that you think it is.
Then, from the video:
Beijing's quantum satellite system, equipped with super-secure photon transmission, proves impervious to hacking.
So, using laser communications instead of microwave makes things impervious to hacking?
An armada of bigger, faster supercomputers ... blasts back with impenetrable logarithms of unprecedented sophistication.
How does he figure that China is so far advanced in cyber-warfare compared to the US? Evidence? None given.
China knocks out US missiles mid-flight somehow with computer code?
Heads-up-displays in F-35s are taken out by China with a virus?
This guy should stick to history. He clearly has no idea how tech
Re: (Score:2)
Beijing's quantum satellite system, equipped with super-secure photon transmission, proves impervious to hacking.
So, using laser communications instead of microwave makes things impervious to hacking?
Microwaves are photons too. Maybe Quantum Entanglement WooWoo Magic?
That dude used an awful lot of techno babble to say, "China gonna kick yo ass! Using computers!" Because, you know, Asians are good at math, or something.
Re: (Score:2)
"China gonna kick yo ass! Using computers!" Because, you know, Asians are good at math, or something.
Ahhh, so that's why they're attacking with logarithms.
Assonate (Score:2)
I think US agencies have been caught assonating plenty. They aren't even picky about whose soil it is.
Re: (Score:1)
As the US squandered trillions in the middle east over the past 20 years
that's not how the US economy works.
Re: (Score:3)
I expect the three letter agency bringing them the most fear is the FSB
Re: (Score:1)
Re: (Score:1)
>if they weren't too busy hunting for thankfully incompetent morons who illegally entered the capitol on the 6th in a failed coup attempt including planned executions, that resulted in deaths.
FTFY.
Re: (Score:2)
You changed a factual statement into an unhinged conspiracy theory lie.
Seek medical help. It's not too late for you.
Re: (Score:1)
When a hacking group has to release a public statement, you know the shit hit the fan. I do not envy these dumbasses, someones getting burned for this.
Yup, and we may never hear of it, or them, again. These things can get 'fixed' quietly..
Cute (Score:5, Insightful)
"Our goal is to make money, and not creating problems for society"
Tell that to the hospitals that got attacked with ransomware.
Re: (Score:2)
"Our goal is to make money, ..."
s/m/t/
They're not making anything but trouble.
Re: (Score:2)
Political Correctness Run Amok! (Score:2, Funny)
Re: (Score:2)
They're probably afraid of a significantly harsher version of "cancel culture".
Behind the hot water pipes, 3rd washroom along (Score:2)
"We are apolitical, we do not participate in geopolitics, do not need to tie us with a defined government and look for other our motives,"
"No, it's alright, sir. We don't morally censor you; we just want the money."
https://youtu.be/hdtWEVevHak [youtu.be]
Thank-you for using Danegeld Services (Score:5, Insightful)
Thank-you for using Danegeld Services. Your call is important to us. Please hold for the next available operator.
and??? (Score:5, Insightful)
Re: (Score:2)
They might not have the keys. I suspect someone with enough knowledge to be dangerous got lucky or unlucky depending on the situation. If you do pay the ransom there is no guarantee you get your data back.
Messing with US oil? That was stupid. (Score:2)
Destroy a hospital's records and patients die? No problem.
Mess up a police department or a city? Sucks to be them.
Mess with US oil supply? Your family is checking the value of your insurance policy. Past measures range up to and including invading a country on the other side of the world, and bringing in a bunch of allies for good measure.
These guys are done.
Re: (Score:2)
The USA has a well-established track record of mobilizing to secure their supply of cheap Oil, I don't see this as changing any time soon.
"oops, we attracted more attention than we intended to!"
I still find it a bit surreal though that they refer to their "partners", reminds me that this is how Organized Crime works - it's not run like a chaotic group of thieves, or even like a business. It's more on the level of a Corporation. And I don't see how someth
Bridges for sale? (Score:2)
I wonder if these guys also have a bargain price on the Brooklyn Bridge?
I can't make this more clear (Score:1)
And while you're at it, companies, stop hiring dumb boomers who don't know how to user a computer who open fake PDF attachments or at least give them some training and if they refuse to learn new things involving computers, fire them.
Re: (Score:2)
Re: (Score:2)
Because once drugs were illegal everyone stopped buying them.
Pragmatism (Score:2)
One way to look at the ethics of this is that "criminal hacking groups" are security consultants who name their own price for penetration testing.
Just as with penetration testing by legit consultants, the benefits will be that policies and practices will be reformed and improved, systems will be hardened.
An argument could be made to decriminalize intrusion whenever the loses are only financial. That hackers, when identified, should be subject to only civil fines equal to the amount they stole or ransomed.
I've said before that shit like this would happen (Score:2)
How did the hack work? (Score:1)
Okay then... (Score:2)
"Our goal is to make money, and not creating problems for society," the statement continues.
Then get a job and do legitimate work that doesn't create problems for society -- opposed to what you're doing now literally does.
Pipeline companies = no social problems, right? (Score:3)
I assume you would say the same to the pipeline company and it's workers too, right? Unless you think that the pipeline and it's workers don't cause problems for society? ...
*450ppm Co2* *shovels coal into ovens* *burns fossil fuels* *claims just following orders* *waits for whataboutism response*
"We won't step on any more land mines. Promise." (Score:2)
If you want a shortest-path to finding yourself in extradition treaties, attacking a first-world country's energy supply is a pretty quick way to get there.
I would imagine even Russia would be happy to give these guys up, just to show they didn't have anything to do with it - they really want to continue exporting energy to Europe, and don't need counterattacks on their own pipeline infrastructure, or increased sanctions and headwinds.
From Criminal to Terrorist (Score:3)
In other words... (Score:2)
Could they also have played the stock market? (Score:2)
easy to fix (Score:2)
All they have to do to make nice is to post the password to the ransomware.
Re: (Score:2)
Major Strasser has been shot.
Round up the usual suspects.
--Captain Louis Renault