HomeCyber AttacksNew Findings Problem Attribution in Denmark's Vitality Sector Cyberattacks

New Findings Problem Attribution in Denmark’s Vitality Sector Cyberattacks

The cyber assaults focusing on the power sector in Denmark final yr could not have had the involvement of the Russia-linked Sandworm hacking group, new findings from Forescout present.

The intrusions, which focused round 22 Danish power organizations in Could 2023, occurred in two distinct waves, one which exploited a security flaw in Zyxel firewall (CVE-2023-28771) and a follow-on exercise cluster that noticed the attackers deploy Mirai botnet variants on contaminated hosts through an as-yet-unknown preliminary entry vector.

The primary wave passed off on Could 11, whereas the second wave lasted from Could 22 to 31, 2023. In a single such assault detected on Could 24, it was noticed that the compromised system was speaking with IP addresses (217.57.80[.]18 and 70.62.153[.]174) that have been beforehand used as command-and-control (C2) for the now-dismantled Cyclops Blink botnet.

Denmark's Energy Sector Cyberattacks

Forescout’s nearer examination of the assault marketing campaign, nevertheless, has revealed that not solely have been the 2 waves unrelated, but additionally unlikely the work of the state-sponsored group owing to the very fact the second wave was a part of a broader mass exploitation marketing campaign towards unpatched Zyxel firewalls. It is presently not identified who’s behind the dual units of assaults.

See also  Microsoft’s security operations platform affords end-to-end safety

“The marketing campaign described because the ‘second wave’ of assaults on Denmark, began earlier than and continued after [the 10-day time period], focusing on firewalls indiscriminately in a really comparable method, solely altering staging servers periodically,” the corporate stated in a report aptly titled “Clearing the Fog of Struggle.”

There may be proof to counsel that the assaults could have began as early as February 16 utilizing different identified flaws Zyxel gadgets (CVE-2020-9054 and CVE-2022-30525) alongside CVE-2023-28771, and persevered as late as October 2023, with the exercise singling out varied entities throughout Europe and the U.S.

“That is additional proof that exploitation of CVE-2023-27881, quite than being restricted to Danish essential infrastructure, is ongoing and focusing on uncovered gadgets, a few of which simply occur to be Zyxel firewalls safeguarding essential infrastructure organizations,” Forescout added.

- Advertisment -spot_img
RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -

Most Popular