<?xml version="1.0" encoding="UTF-8"?><feed
	xmlns="http://www.w3.org/2005/Atom"
	xmlns:thr="http://purl.org/syndication/thread/1.0"
	xml:lang="en-US"
	>
	<title type="text">Kelsey Atherton | Vox</title>
	<subtitle type="text">Our world has too much noise and too little context. Vox helps you understand what matters.</subtitle>

	<updated>2018-03-28T14:33:26+00:00</updated>

	<link rel="alternate" type="text/html" href="https://www.vox.com/author/kelsey-atherton" />
	<id>https://www.vox.com/authors/kelsey-atherton/rss</id>
	<link rel="self" type="application/atom+xml" href="https://www.vox.com/authors/kelsey-atherton/rss" />

	<icon>https://platform.vox.com/wp-content/uploads/sites/2/2024/08/vox_logo_rss_light_mode.png?w=150&amp;h=100&amp;crop=1</icon>
		<entry>
			
			<author>
				<name>Kelsey Atherton</name>
			</author>
			
			<title type="html"><![CDATA[It’s not just elections: Russia hacked the US electric grid]]></title>
			<link rel="alternate" type="text/html" href="https://www.vox.com/world/2018/3/28/17170612/russia-hacking-us-power-grid-nuclear-plants" />
			<id>https://www.vox.com/world/2018/3/28/17170612/russia-hacking-us-power-grid-nuclear-plants</id>
			<updated>2018-03-28T10:33:26-04:00</updated>
			<published>2018-03-28T08:00:06-04:00</published>
			<category scheme="https://www.vox.com" term="Climate" /><category scheme="https://www.vox.com" term="Defense &amp; Security" /><category scheme="https://www.vox.com" term="Explainers" /><category scheme="https://www.vox.com" term="Politics" /><category scheme="https://www.vox.com" term="Russia" /><category scheme="https://www.vox.com" term="World Politics" />
							<summary type="html"><![CDATA[A huge story about Russian hacking got lost amid all the Trump administration staffing drama and Stormy Daniels news over the past week: On March 15, the US government released a report describing a massive Russian hacking campaign to infiltrate America&#8217;s &#8220;critical infrastructure&#8221; &#8212; things like power plants, nuclear generators, and water facilities. The joint [&#8230;]]]></summary>
			
							<content type="html">
											<![CDATA[

						
<figure>

<img alt="" data-caption="A new US government report details a major Russian cyberattack on the US power grid — including nuclear power plants and water facilities. | Scott Olson/Getty Images" data-portal-copyright="Scott Olson/Getty Images" data-has-syndication-rights="1" src="https://platform.vox.com/wp-content/uploads/sites/2/chorus/uploads/chorus_asset/file/10540161/GettyImages_56873199.jpg?quality=90&#038;strip=all&#038;crop=0,0,100,100" />
	<figcaption>
	A new US government report details a major Russian cyberattack on the US power grid — including nuclear power plants and water facilities. | Scott Olson/Getty Images	</figcaption>
</figure>
<p>A huge story about Russian hacking got lost amid all the Trump administration staffing drama and Stormy Daniels news over the past week: On March 15, the US government released a report describing a massive <a href="https://www.us-cert.gov/ncas/alerts/TA18-074A">Russian hacking campaign</a> to infiltrate America&rsquo;s &ldquo;critical infrastructure&rdquo; &mdash; things like power plants, nuclear generators, and water facilities.</p>

<p>The joint report from the FBI and Department of Homeland Security claims that Russian hackers gained access to computers across the targeted industries<strong> </strong>and collected sensitive data including passwords, logins, and information about energy generation. While the report doesn&rsquo;t specify any identifiable sabotage, the intrusion could set up future attacks that do more than just record observations.</p>

<p>The day after the report was released, Energy Secretary Rick Perry <a href="https://www.bloomberg.com/news/articles/2018-03-15/russian-hackers-attacking-u-s-power-grid-aviation-fbi-warns">told lawmakers</a> at an appropriations hearing that cyberattacks are &ldquo;literally happening hundreds of thousands of times a day,&rdquo; and warned that the Department of Energy needs an &ldquo;office of cybersecurity and emergency response&rdquo; in order to be prepared for threats like this in the future.</p>

<p>This report is a big deal: It&rsquo;s the first time the US government has publicly blamed Russia&rsquo;s government for attacks on energy infrastructure. Explicitly pinning the attack on the Kremlin means that rather than targeting the hackers as individuals, the United States can now respond against Russia as a whole.</p>

<p>By tying the attacks to Russian intelligence agencies, the US government can then sanction high-level members of those agencies for the actions of their subordinates. This makes further hacking operations a lot riskier for not just the hackers themselves but also their bosses and the government that authorized them. It&rsquo;s a first step toward establishing deterrence in cyberspace.</p>
<h2 class="wp-block-heading">The Russian hackers used decades-old tactics to gain access</h2>
<p>The report says that Russia targeted &ldquo;Energy and Other Critical Infrastructure Sectors,&rdquo; an unhelpfully large category. But these weren&rsquo;t actually the first targets.</p>

<p>To gain access to the power plant computers and internal networks, the hackers first attacked smaller, less secure companies &mdash; like ones that make parts for generators or sell software that power plant companies use, for instance.<strong> </strong></p>

<p>The Russian hackers then repeated some of those same techniques again to gain access to the primary targets.</p>

<p>One way they did that was to send emails from a compromised account that the receiver trusted and had interacted with before, to get the person receiving the email to reveal confidential information. This is known as &ldquo;<a href="https://www.wired.com/2015/04/hacker-lexicon-spear-phishing/">spearphishing</a>.&rdquo;<strong> </strong>For example, if the email looks like it&rsquo;s coming from Bob from marketing, then Alice will be more likely to open it, even if the email was actually sent by Eve from Russia.</p>

<p>Another method they used was &ldquo;waterholing.&rdquo; The hackers altered websites that people in the energy industry regularly visit, so that those websites could collect information, like logins and passwords, and relay them back to the hackers.</p>

<p>Some targeted users were induced to &ldquo;download enticing word documents<em>,&rdquo; </em>as the report phrases it,<em> </em>about control process systems (programs that watch other programs work, essentially). But those documents turned out to be more malicious than enticing. By opening them, the targets ran programs that gave hackers access to their computers.</p>

<p>After acquiring the logins needed to fool the computers into letting the attackers in, the intruders set up local administrator accounts (the kind with permissions to do things like install programs) and used them to place more malware in the networks. The code they used also contained steps to cover the intruders&rsquo; tracks, like automatically logging out of the administrator accounts every eight hours.</p>

<p>&ldquo;The bad news is this attack used a lot of the old methods to get in,&rdquo; says Bob Gourley, founder and chief technology officer of the tech consultancy firm<strong> </strong>Crucial Point and author of the book <a href="https://www.amazon.com/dp/B00NBBKU28/ref=dp-kindle-redirect?_encoding=UTF8&amp;btkr=1"><em>The Cyber Threat</em></a>.</p>

<p>&ldquo;Trickery, getting people to click on links, the other kind of social engineering, phishing to get a foothold somewhere, this was the same kind of basic attack pattern that&rsquo;s been going on for a decade now,&rdquo; Gourley says. &ldquo;It was just better resourced and better targeted, and they had more focused intelligence.&rdquo;</p>
<h2 class="wp-block-heading">The attacks were all about scouting, not sabotage</h2>
<p>Once inside the computers of a primary target,<strong> </strong>like a power company, the attackers primarily set up programs that collected information. These programs captured screenshots, recorded details about the computer, and saved information about user accounts on that computer.</p>

<p>The report doesn&rsquo;t say that the attackers were able to control how power plants generated power. Instead of messing up power generation, the intruders watched and recorded information from computers that received the data from the energy generation systems.</p>

<p>Essentially, this attack provided Russia a peek into how US power plants work and report data. That peek turned into a prolonged observation.</p>

<p>The DHS and FBI report is cagey about the impact, simply stating that the campaign &ldquo;affected multiple organizations in the energy, nuclear, water, aviation, construction, and critical manufacturing sectors.&rdquo;</p>

<p>But how did it affect them? We don&rsquo;t really know. The report doesn&rsquo;t name any companies, and they&rsquo;re allowed to remain anonymous in public releases about the attacks &mdash; that way, the companies can share and access reports of hacking with others, without fear that public knowledge of the attacks will panic investors or customers.</p>

<p>Nothing in the report speaks to the sabotage or damaging of any equipment. But if intruders were able to get into computers the same way they did for this scouting mission, and to modify code on the targeted computers as easily as they did, then there&rsquo;s no reason they couldn&rsquo;t stage another attack.<strong> </strong></p>

<p>The report also notes that the hackers tried to mask evidence of their intrusion on the way out, and advises the targeted companies to take precautions in case any malicious code was left behind.</p>
<h2 class="wp-block-heading">Are we sure it was Russia, and what was its goal?</h2>
<p>The DHS and FBI are characterizing it as a Russian attack, noting that this was a multiyear campaign started in March 2016 by Russian government &ldquo;cyber actors.&rdquo; &nbsp;</p>

<p>An October 2017 <a href="https://www.symantec.com/blogs/threat-intelligence/dragonfly-energy-sector-cyber-attacks">report on the attack</a>, published by Symantec and cited in the government report, notes that &ldquo;some code strings in the malware were in Russian. However, some were also in French, which indicates that one of these languages may be a false flag.&rdquo;</p>

<p>When the US Treasury Department issued <a href="https://home.treasury.gov/news/press-releases/sm0312">new sanctions</a> against several Russian individuals and organizations on March 15, it named these cyberattacks as one of the reasons for doing so. The Treasury Department <a href="https://home.treasury.gov/news/press-releases/sm0312">statement</a><strong> </strong>specifically names and sanctions individuals involved with <a href="https://www.vox.com/2018/2/16/17020974/mueller-indictment-internet-research-agency">Russia&rsquo;s Internet Research Agency</a> and the GRU, Russia&rsquo;s military intelligence branch, though it declines to specifically link any of the individuals named to this latest hacking campaign.</p>

<p>Former intelligence officials and analysts interviewed by <a href="https://www.thecipherbrief.com/russians-targeting-achilles-heel-critical-infrastructure">the Cipher Brief</a> regarding the report all reached a similar conclusion: The intrusion looks like a scouting mission, which tells us a lot about what kind of information was gathered, and not a whole lot about what Russia intends to do with all that information.</p>

<p>Chris Inglis, former deputy director of the National Security Agency, put it <a href="https://www.thecipherbrief.com/russians-targeting-achilles-heel-critical-infrastructure">most succinctly</a>: &ldquo;[T]his is not an opportunistic foray on the part of the Russians. They seem to be intent on getting into the critical infrastructure; they didn&rsquo;t simply get there because they&rsquo;ve taken a shotgun approach.&rdquo;</p>

<p>As for what Russia intends to do once inside that critical infrastructure, that&rsquo;s much harder to say.</p>
<h2 class="wp-block-heading">What can the United States do?</h2>
<p>The DHS-FBI report includes suggestions, like specific code for targeted companies to run to root out some problems and step-by-step guidelines for how to find and eliminate malware.</p>

<p>Beyond that, there&rsquo;s a list of cybersecurity tips and common sense advice, like setting limits on the functions a regular user can access on a computer, leaving other functions to secure administrator accounts. That would minimize the damage an intruder could do by compromising a normal user.</p>

<p>The report also includes tips like &ldquo;Establish a password policy to require complex passwords for all users.&rdquo; (Just what everyone wants &mdash; yet another complex password involving letters, numbers, and symbols that you have to change every month.) Annoying as they may be, there&rsquo;s a reason that complex passwords are such a common recommendation after cyberattacks: Not everyone uses them yet, and setting your password as &ldquo;password&rdquo; still lets attackers in the front door.</p>

<p>To protect against attacks like this in the future, Gourley, the Crucial Point founder and chief technology officer, recommends that companies adopt multifactor authentication to mitigate the harm from stolen logins and passwords. That means that instead of just using a password to get into a system, a user also has to type in an additional code that they receive via text message or plug in an ID card into a card reader hooked up to the computer.</p>

<p>Every additional means of verifying that a user is who they say they are makes it harder for an attacker to replicate all the credentials required and log in to the network.</p>
<h2 class="wp-block-heading">Welcome to the new era of cyberwar</h2>
<p>The biggest problem is that <a href="https://www.vox.com/world/2017/10/13/16465882/north-korea-cyber-attack-capability-us-military">countries the world over</a> are rapidly learning just how much vital or even lucrative information they can obtain from hacking, and are constantly figuring out new ways to circumvent security measures they encounter.</p>

<p>Sanctioning officials involved in authorizing attacks certainly punishes those involved. But it&rsquo;s worth noting that more than a third of the individuals named in these latest sanctions had <a href="https://www.nytimes.com/2018/03/15/us/politics/trump-russia-sanctions.html">already been sanctioned by the US</a> &mdash; and that apparently didn&rsquo;t stop them from carrying out these new attacks. Which means that the deterrence or retaliatory effect of sanctions alone may not be as great as perhaps desired.</p>

<p>But cyberattacks like these fall in the gray area between network security, espionage, and crime, making it harder to figure out how to respond in a way that actually makes a real difference. Intrusions like these still fall short of sabotage or war, but that doesn&rsquo;t mean we have to like them.</p>

<p><em>Kelsey Atherton is a defense technology journalist based in Albuquerque, New Mexico.&nbsp;Find him&nbsp;on Twitter&nbsp;</em><a href="https://twitter.com/AthertonKD"><em>@athertonkd</em></a><em>.</em></p>
						]]>
									</content>
			
					</entry>
			<entry>
			
			<author>
				<name>Kelsey Atherton</name>
			</author>
			
			<title type="html"><![CDATA[How North Korean hackers stole 235 gigabytes of classified US and South Korean military plans]]></title>
			<link rel="alternate" type="text/html" href="https://www.vox.com/world/2017/10/13/16465882/north-korea-cyber-attack-capability-us-military" />
			<id>https://www.vox.com/world/2017/10/13/16465882/north-korea-cyber-attack-capability-us-military</id>
			<updated>2017-12-19T14:07:02-05:00</updated>
			<published>2017-10-13T08:40:02-04:00</published>
			<category scheme="https://www.vox.com" term="Defense &amp; Security" /><category scheme="https://www.vox.com" term="Explainers" /><category scheme="https://www.vox.com" term="North Korea" /><category scheme="https://www.vox.com" term="Politics" /><category scheme="https://www.vox.com" term="Technology" /><category scheme="https://www.vox.com" term="World Politics" />
							<summary type="html"><![CDATA[In September 2016, North Korean intelligence services stole a huge batch of classified US and South Korean military plans &#8212; including a plan to assassinate North Korea&#8217;s dictator Kim Jong Un and other top government officials. Yet this was not the stuff of an old-school John le Carr&#233; spy novel, with shady figures in trench [&#8230;]]]></summary>
			
							<content type="html">
											<![CDATA[

						
<figure>

<img alt="" data-caption="" data-portal-copyright="&lt;a href=&quot;https://www.shutterstock.com/image-photo/hacker-dark-hoody-sitting-front-notebook-498172096&quot;&gt;Shutterstock&lt;/a&gt;" data-has-syndication-rights="1" src="https://platform.vox.com/wp-content/uploads/sites/2/chorus/uploads/chorus_asset/file/9449791/shutterstock_498172096.jpg?quality=90&#038;strip=all&#038;crop=0,0,100,100" />
	<figcaption>
		</figcaption>
</figure>
<p>In September 2016, North Korean intelligence services stole a huge batch of classified US and South Korean military plans &mdash; including a plan to assassinate North Korea&rsquo;s dictator Kim Jong Un and other top government officials.</p>

<p>Yet this was not the stuff of an old-school John le Carr&eacute; spy novel, with shady figures in trench coats exchanging documents at a dark rendezvous spot in the woods. North Korea&rsquo;s data theft was done entirely through computer systems.</p>

<p>According to a South Korean politician, last fall North Korean hackers gained access to South Korea&rsquo;s Defense Integrated Data Center and stole <a href="https://www.reuters.com/article/us-northkorea-cybercrime-southkorea/north-korea-hackers-stole-south-korea-u-s-military-plans-to-wipe-out-north-korea-leadership-lawmaker-idUSKBN1CF1WT">235 gigabytes of classified military plans</a>. Two plans in particular stand out: One was for how to respond to an attack on South Korea by North Korean commandos. The other was the plan for what&rsquo;s called a &ldquo;decapitation strike,&rdquo; or an operation that would specifically target Kim and other key government officials loyal to the regime. But the full depth of what was stolen is still unknown.</p>

<p>The fact that we&rsquo;re only just now learning of the extent of the burglary, more than a year after it happened, is a testament to North Korea&rsquo;s immense cyber capabilities.</p>

<p>But wait a second &mdash; how did an impoverished country like North Korea end up with such impressive hacking abilities? And <em>are</em> they really that impressive? Or is our information just really easy to steal?</p>

<p>It turns out that while we&rsquo;ve been (understandably) focused on North Korea&rsquo;s nuclear weapons and ballistic missiles, the country has been quietly developing another powerful tool &mdash; a selection of malware and malicious code, a veritable cyberweapons cache.</p>
<h2 class="wp-block-heading">How did North Korea pull it off?</h2>
<p>North Korea is one of seven nations generally regarded as &ldquo;cyberpowers&rdquo; &mdash; countries with the ability to mess around in the information systems of other countries. (Besides North Korea, the major cyberpowers are the United States, Russia, China, the United Kingdom, Iran, and France.)</p>

<p>In 2014, North Korean hackers conducted a major operation against <a href="https://www.vox.com/cards/sony-hack-north-korea">Sony in the United States</a> in retaliation for the Sony Pictures film <em>The Interview,</em> a Seth Rogen and James Franco comedy depicting a fictional assassination of Kim Jong Un &mdash; a cyberattack that some political commentators labeled <a href="https://www.popsci.com/can-rules-cyber-war-explain-what-happened-sony">an act of war</a>.</p>

<p>This latest hack of the military documents worked through human error. As the <a href="https://www.wsj.com/articles/north-korea-allegedly-used-antivirus-software-to-steal-defense-secrets-1507736060">Wall Street Journal reports</a>, the North Korean hackers first gained access to a South Korean company that makes the antivirus software used by the South Korean military. That compromised antivirus software provided a path for North Korean hackers into South Korean military computers.</p>

<p>Normally, the military database they hacked, working on a secured intranet, would be safe from compromise &mdash; but a contractor working at the data center left a cable in place that connected the military intranet to the internet, allowing the North Korean hackers to access the database of sensitive documents.</p>

<p>That connection remained in place for <em>more than a year</em>, and wasn&rsquo;t detected until September 2016. North Korean state media has denied involvement in the attack, claiming instead that South Korea made up the whole thing.</p>
<h2 class="wp-block-heading">How did a country like North Korea develop such impressive cyber capabilities?</h2>
<p>Computer scientists are the key to creating and maintaining new cyberweapons, but there&rsquo;s also a great deal of reverse-engineering that goes on. For instance, in 2012 Iran used cyber tools to wipe and render useless <a href="http://money.cnn.com/2015/08/05/technology/aramco-hack/index.html">35,000 computers at Saudi Aramco</a>, one of the world&rsquo;s biggest oil companies. The tools Iran used in the Saudi Aramco attack were largely modifications of tools that had attacked Iran, now redesigned for different targets.</p>

<p>&ldquo;[For] everybody, once your code gets out on the internet, it&rsquo;s possible that someone else can intercept copy and modify for their own use,&rdquo; says Bob Gourley, co-founder of the security consultancy firm Cognitio and veteran of the intelligence community.</p>

<p>&ldquo;North Koreans might be borrowing code they saw in a Russian attack,&rdquo; Gourley says, but that &ldquo;doesn&rsquo;t mean Russians and North Koreans are collaborating. [It] just means they saw that code and modified it, or they may be modifying code of some hacker or some criminal groups.&rdquo;</p>

<p>&ldquo;Everyone starts to build upon other people&rsquo;s exploits,&rdquo; he adds.</p>

<p>But North Korea has the smallest economy of all the cyberpowers, with a <a href="https://www.cia.gov/library/publications/the-world-factbook/geos/kn.html">GDP estimated</a> at somewhere between that of Vermont and Wyoming. How, then, can it so effectively fund the kinds of computer scientists needed to maintain such a potent cyber capability?</p>

<p>Part of the answer has to do with the nature of the North Korean economy itself. The North has what&rsquo;s known as a &ldquo;command economy,&rdquo; which means that the central government basically controls every single aspect of the economy, including the production and distribution of goods and services.</p>

<p>As a result, the regime is able to direct as many resources as it wants toward military programs within the country, like its nuclear project and its cyber program, even in the face of strict <a href="https://thediplomat.com/2017/10/kim-jong-un-emphasizes-economic-self-reliance-after-sanctions/">foreign sanctions</a>.</p>

<p>The other reason is that North Korea&rsquo;s cyber division actually makes a lot of money on its own, thanks to the country&rsquo;s willingness to have its military programmers engage in straight-up crime.</p>

<p>&ldquo;There are remarkable similarities between North Korea and an organized crime group,&rdquo; says William Carter, deputy director of the technology policy program at the Center for Strategic and International Security, a Washington think tank.</p>

<p>For instance, Carter says, North Korea&rsquo;s cyber division &ldquo;used a pretty sophisticated scheme to send false payment orders through the Swiss [banking] network and got hundreds of millions of dollars transferred out of the banks of Bangladesh, the Philippines, Vietnam, Ecuador, and others and into accounts controlled by North Korean government.&rdquo;</p>

<p>When your hackers are bringing in that kind of cash, paying their salaries becomes a whole lot easier.</p>
<h2 class="wp-block-heading">Why would North Korea launch cyberattacks?</h2>
<p>While North Korean attacks and intrusions make headlines, it&rsquo;s safe to assume that all countries with the capability to do so are actively watching and tracking and spying on the cyber capabilities of other countries. So it&rsquo;s not the use of cyber itself that sets North Korea apart from other nations.</p>

<p>&ldquo;The challenge is that North Korea&#8217;s objectives are a lot about being able to lash out,&rdquo; says Michael Sulmeyer, director of the Cyber Security Project at Harvard&rsquo;s Belfer Center, &ldquo;and they&rsquo;re also limited in other ways they could insert themselves, cut off from so much of the global economy.&rdquo;</p>

<p>With an army focused on the South, a navy that is limited in reach, and an air force oriented toward defense, North Korea&rsquo;s main ways to threaten countries beyond its immediate borders are with missiles or with cyber intrusions.</p>

<p>Having a robust hacking capability means that Pyongyang can attack those who make both fictional depictions of Kim Jong Un&rsquo;s assassination and actual military plans for such an event. Kim inherited not just his father&rsquo;s nuclear program but his grandfather&rsquo;s <a href="http://foreignpolicy.com/2017/07/06/how-not-to-kill-kim-jung-un/">intense paranoia</a>, and the whole orientation of the regime is built around ensuring his survival.</p>

<p><em>Kelsey Atherton is a defense technology journalist based in Albuquerque, New Mexico. Find him on Twitter </em><a href="https://twitter.com/AthertonKD"><em>@athertonkd</em></a><em>.</em></p>
						]]>
									</content>
			
					</entry>
	</feed>
