Russian state-sponsored hackers target defense industry contractors


Russian hackers are alleged to have acquired security information technology by targeting US contractors, several federal agencies said in a breaking news posted Wednesday.

From at least January 2020 to February 2022, these agencies “have observed regular targeting of US licensed defense contractors by Russian state-run cyber attackers.” Said Cybersecurity and Infrastructure Agency (CISA), Federal Bureau of Investigation (FBI), and National Security Agency (NSA) operated by the Department of Homeland Security.

“Actors are targeting both big and small [defense contractors] “Subcontractors with different levels of cybersecurity protocols and resources,” the report continues. It was targeted at contractors who worked in a variety of areas, including missile and weapons development, vehicle and aircraft design, surveillance and reconnaissance, and communications systems.

In breaking news, authorities did not provide specific details on how they obtained evidence of Russian state-sponsored hackers allegedly targeting US defense contractors. It is also unknown what promoted hacking by one or more Russian agencies.

Whitehouse officials have repeatedly said Moscow is planning an attack in recent weeks, and the publication of this breaking news is in the midst of heightened tensions between the United States and Russia over troops stationed near Ukraine. It is done.

CISA also said that Russian-backed attackers were “common but effective, including spear phishing, credential harvesting, brute force / password spray technology, and exploitation of known vulnerabilities in weak accounts and networks. Use tactics to access the target network. ” Notice. “These actors use simple passwords, unpatched systems, and unsuspecting employees to traverse the network to establish persistence and steal data before they steal. Get the first access. “

Authorities have asked defense industry contractors to take additional security measures, such as using strong passwords and enabling multi-factor authentication for users.

“By acquiring its own internal documents and email communications, adversaries can coordinate their military plans and priorities, accelerate technological development efforts, inform foreign policy makers of US intentions, and potentially. We may be able to target the best sources of recruitment, “the advisory warned.Cyber ​​actors “will continue to be targeted [contractors] For US defense information in the near future. “

Last year, President Joe Biden warned Russia’s President Vladimir Putin that Russia would face consequences of a cyberattack on US infrastructure. However, Putin and other Russian authorities have long dismissed the US allegations that Russian-sponsored actors are behind cyberattacks.

“We have been blamed for all sorts of things,” Putin told NBC News last year. “Election interference, cyber attacks, etc. And, never, once, or once, they did not produce any kind of evidence or evidence. Unfounded accusations.”

The Russian embassy in Washington did not immediately respond to requests for comment on the recommendations.

Jack phillips

follow

Jack Phillips is the latest news reporter for The Epoch Times, based in New York.

Posted on