Russian Hacktivists Attack Canadian Gas Pipeline

A pro-Russia hacktivist group claims to have breached the network of a Canadian gas pipeline company in February and caused damage that resulted in loss of profits, according to a document found among a tranche of US classified intelligence assessments leaked online recently.

Secret Pentagon documents that have been exposed on social medi also  shed new light on the state of the war in Ukraine, showing just how deeply the United States has penetrated Russia’s military and intelligence services.

These documents suggest that Washington also appears to be spying on some of its closest allies, including Ukraine, Israel and South Korea.

One of the documents, part of a cache of leaks recently circulated on the Internet, suggests the Russian hackers had the ability to cause an explosion and sought instruction from the Russian Federal Security Service or FSB.

 In the leaked briefing, actors with the Russian hacking group known as Zarya shared screenshots with an FSB officer on February 25th purporting to show their access to the Canadian facility and indicating that they had the ability to increase valve pressure, disable alarms, and initiate an emergency shutdown of the facility.

The US intelligence briefing didn’t identify the Canadian victim, writing that the screenshot was of an “unspecified gas distribution station.”

The briefing indicates that the hacking group was “receiving instructions” from someone presumed to be an FSB officer, who ordered them to maintain their network access, and that the hackers were on “standby” for further instructions from the FSB.

The document states that the FSB officer “anticipated a successful operation would cause an explosion” at the gas distribution station and that the FSB was “monitoring Canadian news reports for indications of an explosion.” But it’s not clear what the hackers did to the facility or planned to do.

They claimed they had already done “sufficient damage” to the Canadian firm “to cause profit loss to the company,” but their intention was “not to cause loss of life” only “loss of income for Canadians.” It’s not clear if US authorities ever verified the claims or identified and notified the Canadian firm in question. Zero Day was unable to independently verify the claims.

The documents reveal a broad array of information that the US intelligence community and its partners have collected about Russia’s war plans in Ukraine, including detailed maps, and about Ukraine’s defense vulnerabilities. The documents also reveal information about other countries as well, such as Iran’s nuclear program and North Korea’s testing of missiles.

Officials at the Pentagon and national security agencies have indicated they believe the documents are authentic and have launched investigations into the leaks. The revelation about the alleged cyberattack in Canada appears in just two paragraphs on a page that provides brief summaries of intelligence about other countries and regions.

Kim Zetter:     NY Times:    NY Times:     The Globe & Mail:     CTV News:      National News Watch:    AP News

You Might Also Read: 

Suspicions That Explosion At US Gas Export Terminal Caused By Russian Hackers:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Attack On Israel’s Water Systems
How Does IT Impact The Manufacturing Industry? All You Need To Know »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

GFI Software

GFI Software

GFI Software works with System Administrators, IT Professionals and IT Executives to ensure that their IT infrastructures are monitored, managed, secured and compliant.

Preempt Security

Preempt Security

The Preempt Platform delivers adaptive threat prevention that continuously preempts threats based on identity, behavior and risk.

Institute for Cyber Security Innovation - Royal Holloway

Institute for Cyber Security Innovation - Royal Holloway

The Institute for Cyber Security Innovation aims to bring together Academia, Industry and Government to be a catalyst for applied research and innovation in cyber security policy and solutions.

Herbert Smith Freehills

Herbert Smith Freehills

Herbert Smith Freehills is a leading professional services including data protection and privacy.

CICRA

CICRA

CICRA is Sri Lanka's pioneering cyber security training and consultancy provider.

Charterhouse Müller UK

Charterhouse Müller UK

Charterhouse Müller UK are a leading service provider for end of life IT services including data erasure and secure IT asset disposal.

TAC Security (TAC Infosec)

TAC Security (TAC Infosec)

TAC Security (aka TAC Infosec) is a leading and trusted cyber security consulting partner that specializes in securing the IT infrastructure and assets of enterprises.

Duality Technologies

Duality Technologies

Duality Technologies combine Advanced Cryptography with Data Science to deliver High-Performance Privacy-Protecting Computing to Regulated Industries.

Edgile

Edgile

Edgile is the trusted cyber risk and regulatory compliance partner to the world’s leading organizations, providing consulting, managed services, and harmonized regulatory content.

Resolvo Systems

Resolvo Systems

Resolvo is provides comprehensive security assessment and testing services in Asia.

RAND Corporation

RAND Corporation

The RAND Corporation is a non-profit institution that helps improve policy and decision making through research and analysis.

Red Helix

Red Helix

Red Helix (formerly Phoenix Datacom) is a market leader in network performance and cyber security.

HaystackID

HaystackID

HaystackID provides industry-leading computer forensics, eDiscovery, and attorney document review experts to help with complex, data-intensive investigations and litigation.

XONA Systems

XONA Systems

XONA is The Zero Trust user access platform for the OT enterprise. Secure operational access to critical systems - from anywhere.

DataGuard

DataGuard

DataGuard is a security and compliance software company trusted by organisations across the globe.

Sword Group

Sword Group

Sword is a leader in data insights, digital transformation and technology services with a substantial reputation in complex IT, business projects and mission critical operations.