Info@NationalCyberSecurity
Info@NationalCyberSecurity

Russia May Be Behind Hack of Texas Water Facility | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #hacker


A little-known hack of a water facility in Texas may be the work of Russian state-sponsored hackers, according to new findings from security researchers. 

Google-owned Mandiant today published a report linking the water facility hack to Sandworm, also known as APT44, a hacking group that allegedly works within Russia’s military intelligence. 

In January, city officials in the small town of Muleshoe, Texas, disclosed the water facility hack, which caused a water tank to overflow. At the same time, a hacktivist group dubbed CyberArmyofRussia_Reborn posted on its Telegram channel about gaining control of the water systems at Muleshoe, along with another town called Abernathy and water facilities in Poland.

From the video the hackers released.

(Credit: CyberArmyofRussia_Reborn)

As proof, CyberArmyofRussia_Reborn posted a video, demonstrating it had control over the Texas water facility computer systems. With the help of Google, Mandiant has since uncovered evidence that the hacktivist group has ties to Sandworm, a Russian operation that has been blamed for launching cyberattacks to disrupt Ukraine’s power plants and the 2018 Winter Olympics in South Korea. 

The evidence includes CyberArmyofRussia_Reborn trying to create a YouTube channel using internet infrastructure linked to Sandworm activity. Mandiant had also spotted CyberArmyofRussia_Reborn publishing data over its Telegram channel that was stolen through previous Sandworm attacks. 

In another case, the hacktivist group even made claims referencing a cyberattack before Sandworm actually carried it out. As a result, both Google’s security team and Mandiant conclude that Sandworm created and is possibly controlling CyberArmyofRussia_Reborn.

That said, Mandiant couldn’t definitively conclude that Sandworm directed the hack of the water facility in Texas. Wired reports it’s possible Sandworm created CyberArmyofRussia_Reborn, but allows the hacktivist group to operate independently. Still, the findings underscore the threat that foreign government hackers pose to US critical infrastructure. 

Recommended by Our Editors

In November, the US initially warned that Iranian hackers were targeting US water facilities. Then in March, the Environmental Protection Agency issued another alert, saying Chinese state-sponsored hackers had also been spotted trying to infiltrate US critical infrastructure. 

Mandiant’s report adds that Sandworm has largely targeted Ukrainian networks, including deploying “destructive” malware attacks that can corrupt fleets of computers. Still, the company warns that the hacking group could widen its attacks to other countries.

“We therefore assess that changing Western political dynamics, upcoming elections, and emerging issues in Russia’s near abroad will also continue to shape APT44’s operations for the foreseeable future,” Mandiant says.

Like What You’re Reading?

Sign up for SecurityWatch newsletter for our top privacy and security stories delivered right to your inbox.

This newsletter may contain advertising, deals, or affiliate links. Subscribing to a newsletter indicates your consent to our Terms of Use and Privacy Policy. You may unsubscribe from the newsletters at any time.

var facebookPixelLoaded = false;
window.addEventListener(‘load’, function() {
document.addEventListener(‘scroll’, facebookPixelScript);
document.addEventListener(‘mousemove’, facebookPixelScript);
})

function facebookPixelScript() {
if (!facebookPixelLoaded) {
facebookPixelLoaded = true;
document.removeEventListener(‘scroll’, facebookPixelScript);
document.removeEventListener(‘mousemove’, facebookPixelScript);

! function(f, b, e, v, n, t, s) {
if (f.fbq) return;
n = f.fbq = function() {
n.callMethod ?
n.callMethod.apply(n, arguments) : n.queue.push(arguments)
};
if (!f._fbq) f._fbq = n;
n.push = n;
n.loaded = !0;
n.version = ‘2.0’;
n.queue = [];
t = b.createElement(e);
t.async = !0;
t.src = v;
s = b.getElementsByTagName(e)[0];
s.parentNode.insertBefore(t, s)
}(window,
document, ‘script’, ‘//connect.facebook.net/en_US/fbevents.js’);

fbq(‘init’, ‘454758778052139’);
fbq(‘track’, “PageView”);
}
}

——————————————————–


Click Here For The Original Story From This Source.

.........................

National Cyber Security

FREE
VIEW