Share this
How Tech and Non-Tech Staff Unwillingly Become a Hacker’s Best Friend
by Reflare Research Team on May 6, 2021 6:54:00 PM
A cyber-attack cripples a power grid leaving an entire town in the dark, and a jammed home security system stops detecting intruders. What's the commonality across all these seemingly unrelated events? Surprise! It's inadequately trained staff.
First Published 15th January 2016 | Latest Refresh 6th May 2021
Power generation in Ukraine has, let’s say, a history.
5 min read | Reflare Research Team
Humans (again)
Today, the need for practical cyber security training has never been more critical. In fact, 'inadequately trained staff' is often the organisation’s weakest link for allowing cybercriminals to wreak havoc on business-critical networks and systems.
Whether they are developers, administrators or otherwise, your team can unintentionally assist hackers in their nefarious intentions. Here we look at two major security breaches where a simple lack of security awareness in staff brought down not just a major player in broadband, but almost an entire country.
Ukrainians Like Heat in Winter
On one chilly December afternoon, over 200,000 people in Ukraine lost electricity for several hours after hackers breached the country’s Prykarpattyaoblenergo power grid using a type of social engineering attack called spear phishing.
Spear phishing sends phishing attacks to key personnel within an organisation to obtain highly sensitive credentials and data. Social engineering is an attack vector of choice for cybercriminals. It’s completely user-driven, which makes it efficient, quick and low-risk. The process involves building trust with potential victims and then persuading them into performing actions they normally wouldn’t.
One such action can be an employee simply clicking on a malicious link or downloading an attachment from an email that appears to come from a legitimate source. In the case of the Prykarpattyaoblenergo utility, hackers were able to breach Ukraine’s critical power supply using malware called ‘BlackEnergy Malware’ in a corrupted Microsoft Word file.
“This is the first case in Ukraine where the hacker attack resulted in a power outage”, Sergey Golovan, a spokesman for Ukraine’s state security service, said at a news conference. Not only was Sergey correct in saying it was the first time in Ukraine that a power grid had been taken out by a cyber-attack, it also was the first time in the world. Ukrainian accusations were pointed toward Russian hackers being the culprits, but there was little evidence to support this. At the time, this hack garnished so much global attention that NATO saw fit to release a short video profiling what happened.
In October 2020, a federal grand jury in Pittsburgh, Pennsylvania ruled six Russian GRU officers be charged in connection with the ‘worldwide deployment of destructive malware and other disruptive actions in cyberspace’, which included the Ukraine blackout. It is also worth noting that this is the same group to be charged with the NotPetya ransomware attack, spearfishing the 2017 French elections and among other things, conducting the odd Novichok poisoning in the United Kingdom.
This breach brings to light the importance for workers in major infrastructures such as power, sewage, water, and food production to be on alert for potential risks. Hackers no longer target just individuals but also government entities and critical networks. These structures were built decades ago, and older systems are sometimes vulnerable to various attacks if not patched properly.
For critical infrastructure that possesses ageing technologies operated by lackadaisical staff, it is no longer a question of “if” their systems will get hacked, but of when, and by whom.
The Xfinity Design Team Overlook the Basics
Engineers at Comcast Corp. (Nasdaq: CMCSA, CMCSK) have learnt the importance of thinking like a hacker the hard way. Engineers do not often think of security risks when designing systems, which is a critical mistake made all too often in software development. Such is the case with Comcast’s Xfinity Home Security systems. IoT has become increasingly targeted by hackers since security is not often integrated into its software.
A motion sensor unable to sense motion might be problematic.
Xfinity’s security system monitors the home for intruders using Wi-Fi connectivity. However, jamming the wireless signal that sends data back to the central hub was found to set a false negative within the home even if an intruder is present.
Instead of considering ‘failure’ a case for an alert, the Xfinity system considers the environment ‘safe’, which goes against standard security protocols and designing a system with security in mind. Subsequently, the use of Xfinity Home Security could leave the home vulnerable to a thief with $20 worth of jamming equipment.
The irony of a security system engineer designing a security system without security is not lost on this writer.
After the fact, Comcast did issue a voluntary product recall on the Xfinity Home to fix this “glitch”, but not after receiving negative press for putting their customers at risk, as well as bringing their ability to design secure products into question.
The breach brings to light the importance of security as part of development and engineering with IoT systems, which are currently problematic. The Xfinity hack is just one of several IoT systems that have been shown to be vulnerable to hackers. Until IoT designers think like hackers, these systems will continue to expose severe flaws.
As you have read in this research brief, both of these vulnerabilities could have been easily avoided if it had not been for the complacency of individual staff members who simply did not have security forward-of-mind. The challenge now is to identify other vulnerabilities and take preventative action before they become problematic. To stay up to date with the latest information on similar events and learn how to mitigate specific IT security risks before they land in your lap, read more of our research briefs on related topics.
Share this
- November 2024 (1)
- October 2024 (1)
- September 2024 (1)
- August 2024 (1)
- July 2024 (1)
- June 2024 (1)
- April 2024 (2)
- February 2024 (1)
- January 2024 (1)
- December 2023 (1)
- November 2023 (1)
- October 2023 (1)
- September 2023 (1)
- August 2023 (1)
- July 2023 (1)
- June 2023 (2)
- May 2023 (2)
- April 2023 (3)
- March 2023 (4)
- February 2023 (3)
- January 2023 (5)
- December 2022 (1)
- November 2022 (2)
- October 2022 (1)
- September 2022 (11)
- August 2022 (5)
- July 2022 (1)
- May 2022 (3)
- April 2022 (1)
- February 2022 (4)
- January 2022 (3)
- December 2021 (2)
- November 2021 (3)
- October 2021 (2)
- September 2021 (1)
- August 2021 (1)
- June 2021 (1)
- May 2021 (14)
- February 2021 (1)
- October 2020 (1)
- September 2020 (1)
- July 2020 (1)
- June 2020 (1)
- May 2020 (1)
- April 2020 (2)
- March 2020 (1)
- February 2020 (1)
- January 2020 (3)
- December 2019 (1)
- November 2019 (2)
- October 2019 (3)
- September 2019 (5)
- August 2019 (2)
- July 2019 (3)
- June 2019 (3)
- May 2019 (2)
- April 2019 (3)
- March 2019 (2)
- February 2019 (3)
- January 2019 (1)
- December 2018 (3)
- November 2018 (5)
- October 2018 (4)
- September 2018 (3)
- August 2018 (3)
- July 2018 (4)
- June 2018 (4)
- May 2018 (2)
- April 2018 (4)
- March 2018 (5)
- February 2018 (3)
- January 2018 (3)
- December 2017 (2)
- November 2017 (4)
- October 2017 (3)
- September 2017 (5)
- August 2017 (3)
- July 2017 (3)
- June 2017 (4)
- May 2017 (4)
- April 2017 (2)
- March 2017 (4)
- February 2017 (2)
- January 2017 (1)
- December 2016 (1)
- November 2016 (4)
- October 2016 (2)
- September 2016 (4)
- August 2016 (5)
- July 2016 (3)
- June 2016 (5)
- May 2016 (3)
- April 2016 (4)
- March 2016 (5)
- February 2016 (4)