Russian Cyber Operations: State-led Organised Crime

Russia is emulating approaches used by cyber-criminals as it blurs the line between state and non-state activities in cyberspace. 

The recent activities of the Main Directorate of the General Staff of the Armed Forces of the Russian Federation, Russia’s military intelligence, otherwise known by its traditional (if slightly inaccurate) acronym of the GRU, on the territories of the UK and other European countries are by now well documented. 

However, less media and public attention is paid to the GRU’s hostile cyber activities, despite the fact that last month, the UK and its allies directly attributed a series of hostile cyber-attacks to the Russian military intelligence service. 

This provides a better understanding of some of the Russian offensive cyber-attack tools, the nature of certain Russian cyber operations and a glimpse into future trends in Russian cyber activity. And here is a brief rundown through some of the tools at Moscow’s disposal.

Bad Rabbit ransomware encrypts hard drives and renders IT inoperable. 
Most public references to Bad Rabbit appeared last month, and they also featured in the UK’s National Cyber Security Centre (NCSC) report, which states that it caused disruption to the underground railways system in the Ukrainian capital of Kiev, as well as to Odessa airport, Russia’s central bank and two Russian media outlets. Here we have a clear example that Russia has the technical capability to disrupt critical national infrastructure.

However, looking beyond the actors behind the malware and disruption caused, the infection methodology is one commonly used by cyber criminals. Trend Micro, a major Japanese cyber security company, claims that Bad Rabbit spreads via fake Adobe Flash updates, tricking users into clicking the malware by falsely alerting the user that their Flash player requires an update. 

Once the victim’s PC is infected and user data is encrypted, Bad Rabbit reboots the system and a classic ransom message is then displayed. Once Bad Rabbit has accessed one computer within a corporate network, it may use the ‘Eternal Romance’ exploit kit to spread to other computers within the network. An exploit kit is a reconnaissance tool that scans for vulnerabilities in systems to work out weak points for attackers to compromise.

Next up is VPNFilter malware, which was attributed to Russian state-sponsored actors in a joint Technical Alert issued by Britain’s NCSC, together with the US’s FBI and the Department for Homeland Security in April. VPNFilter malware permits attackers to perform ‘man-in-the-middle’ attacks by intercepting traffic that passes through vulnerable routers. 

It has infected thousands of home and small business routers, and network devices worldwide. Once initialised, it downloads an image from Photobucket.com, a US image-hosting website, that enables a connection between the compromised device and the attackers’ command-and-control server. This allows for malware to be downloaded onto the compromised device, before further stages increase the malicious capability of the malware.

Using VPNFilter, attackers can intercept web traffic and insert malicious code that enables them to exfiltrate data, collect files, disable access to the compromised router, and skim website log-in credentials. VPNFilter changes HTTPS requests to ordinary HTTP requests, meaning data that is meant to be encrypted is sent insecurely. 

Finally, the malware contains a ‘kill’ command, which if executed, removes all traces of it, before permanently shutting down the compromised router. Despite the complex and multi-functional nature of this malware, hard-resetting the device to its factory state (after backing up data) will remove it.

The attributions from the international community continue, with reference to additional attack tools used by the Russian threat group known as APT28. ¬X-Agent is a remote access tool used by APT28 to enable attackers to extract files and record keystrokes. 

A legitimate piece of software called CompuTrace has been modified by APT28 to provide the GRU with the ability to modify system memory. Meanwhile, X-Tunnel provides APT28 with a secure tunnel to an external command-and-control server from where the attacker can send malicious commands to compromised networks and devices. 

Finally, Zebrocy is a tool that logs keystrokes and uploads files. Zebrocy is delivered primarily via phishing attacks that contain malicious Microsoft Office documents with macros. Again, this is another common delivery mechanism used by both state actors and organised criminals and requires human intervention to grant permission to install the malware.

The NCSC and its international partners state that the GRU is ‘almost certainly responsible’ for multiple successful and attempted cyber-attacks, using the various tools and techniques listed above. 

However, just because there is now near certainty on the identity of the threat actor behind these cyber-attacks, this will not change the steps to defend against them. 

Most risk can be reduced through basic risk-management techniques. For compromised routers, users should install the latest firmware version, change the router’s username and password, and switch-off insecure interfaces (for example, remote web admin access or unused protocols like Telnet). 

Education and awareness can help users to spot fraudulent Adobe Flash updates and malicious links. Finally, the cyber threat intelligence community should work together to share indicators of compromise.

However, although they use widely known infection methods, this is not to say that Russian state attackers do not deploy a suite of malware that enables technically advanced cyber operations. 

The threat intelligence company FireEye published a report on APT28 stating that attack tools developed by this group can be easily modified to assist a specific operation, and within this group there is a philosophy of implementing zero-day attacks. According to FireEye, the group has access to skilled developers who conduct technical counter-analysis.

Now that there has been a step change in approach with the attribution of cyber-attacks, policymakers will wonder how the Russian state’s cyber machine will react. It seems likely that Russian state actors will continue to operate in a way that mirrors the activity of organised cybercrime groups. This creates a plausible narrative that these attacks are not state-led, and the techniques used by organised criminals suit the strategic aims of Russian state actors. 

The GRU has been deploying malware with delivery mechanisms commonly used in cybercrime campaigns, which meant that the recent cyber-attacks were initially perceived to be criminal in nature (rather than state-led). Added to this, Russian organisations have been part of the collateral damage from GRU-led cyber-attacks, making attribution even more complicated.

The GRU may seek to outsource more of its malicious cyber activity to organised criminals for greater plausible deniability. This poses a question as to what role law enforcement agencies should play in investigating cyber-related hostile state activity. 

The blurred lines between state and criminal cyber activity has the potential to create confusion as to how law enforcement and the security services should work together to investigate, disrupt and prosecute malicious cyber actors.

Attribution alone is unlikely to deter the Russian state from carrying out cyber-attacks. It is likely that similar style cyber-attacks will occur in the coming years and the GRU will continue to deploy malware and exploit kits that infect victims at scale, including Russian citizens. There may be an increase in automated attacks that successfully infect even more victims and provide greater anonymity for the attacker. 

For all the hyperbole relating to Western offensive cyber capability, the most effective tool to tackle the threat will be robust cyber risk-management strategies at both national and organisational level, together with diplomatic, legal and economic measures to deter future attacks.

RUSI

You Might Also Read:

What Is The GRU & Who Does It Hack?:

Russian Cyber Strategy And Tactics:

 

 

« Facebook CEO Zuckerberg Backed Sharing Customer Data
Germany Detects New Russian Cyber-Attack »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

European Council on Foreign Relations (ECFR)

European Council on Foreign Relations (ECFR)

ECFR is a pan-European think-tank conducting research and promote informed debate on European foreign policy. Cyber security is becoming an intrinsic element of foreign policy debate.

NopSec

NopSec

NopSec provides automated IT security control measurement and risk remediation solutions to help businesses protect their IT environments from security breaches.

Windscribe

Windscribe

Windscribe is a Virtual Private Network services provider offering secure encrypted access to the internet.

Cytelligence

Cytelligence

Cytelligence is a cyber security consulting company with deep expertise in Cyber Breach Response, Cyber Breach Investigations, and Digital Forensics.

Infosec Train

Infosec Train

Infosec Train provide professional training, certifications & professional services related to all spheres of Information Technology and Cyber Security.

Expel

Expel

Expel provide transparent managed security services, 24x7 detection, response and resilience.

ePLDT

ePLDT

ePLDT delivers best-in-class digital business solutions that include Cloud, Cyber Security, purpose-built Data Center facilities and Managed IT Services.

Cynance

Cynance

Cynance are an award-winning, independent cyber security specialist and part of the Transputec family of companies.

Gijima

Gijima

Gijima is one of SA’s leading ICT companies in Cloud & Outsourcing, Systems integration, Human Capital Management & Training, Cybersecurity, and Unified Communications.

BreachLock

BreachLock

Breachlock delivers the most comprehensive Penetration Testing as a Service (PtaaS) powered by Certified Hackers and AI.

Exceed Cybersecurity & I.T. Services

Exceed Cybersecurity & I.T. Services

Exceed Cybersecurity & I.T. Services is a premier Managed Internet Technology (I.T.) company with a focus in cybersecurity risk management and CMMC compliance management.

HackersEra

HackersEra

HackersEra is a leading offensive cybersecurity service provider. We enable our clients to operate in a more secure environment efficiently and produce more value.

Brightworks Group

Brightworks Group

BrightWorks Group offer comprehensive technology operations and security operations consulting services, tailored to meet your specific needs.

Axient

Axient

Axient advances defense and civilian missions from aerospace to cyberspace with multi-domain test and analysis, mission engineering and operations, and advanced technologies.

Scope AI

Scope AI

Scope AI is an innovative technology company specializing in quantum security and machine learning.

Redblock

Redblock

Redblock's mission is to eliminate the drudgery and repetitive 'eye on the glass' work done by Security Teams.