Cyberwarfare, Espionage & Extortion Issue #11: 29th March 2024

"All warfare is based on deception." - Sun Tzu’s “Art of War”

Welcome to this week’s episode of Cyberwarfare, Espionage, and Extortion, in which we examine notable events and try to explore their causal links.

In this week’s episode, we examine the attack surface exposed by industrial automation, the dangers of online love traps, and a deep dive into the UK’s response to China’s cyber threats, which the intelligence and security committee described as “inadequate.” Ouch.


  • Over 170K Users Affected by Attack Using Fake Python Infrastructure:

    An attacker combined multiple TTPs to launch a silent software supply chain attack, stealing sensitive information from victims.
    Multiple malicious open-source tools with clickbait descriptions were created by the threat actors to trick victims, most likely coming from search engines.
    An attacker distributed a malicious dependency hosted on a fake Python infrastructure, linking it to popular projects on GitHub and to legitimate Python packages. GitHub accounts were taken over, malicious Python packages were published, and social engineering schemes were used by the threat actors.
    The multi-stage and evasive malicious payload harvests passwords, credentials, and more dumps of valuable data from infected systems and exfiltrates them to the attacker’s infrastructure.
    In this attack, the threat actors deployed a fake Python packages mirror, which was successfully used to deploy a poisoned copy of the popular package “colorama”.
    Among the victims is also a top.gg contributor, whose code repository of the top.gg community (170K+ members) was affected by the attack.

  • New MFA-bypassing phishing kit targets Microsoft 365, Gmail accounts:

    Cybercriminals have been increasingly using a new phishing-as-a-service (PhaaS) platform named 'Tycoon 2FA' to target Microsoft 365 and Gmail accounts and bypass two-factor authentication (2FA) protection.
    Tycoon 2FA was discovered by Sekoia analysts in October 2023 during routine threat hunting, but it has been active since at least August 2023, when the Saad Tycoon group offered it through private Telegram channels.
    The PhaaS kit shares similarities with other adversary-in-the-middle (AitM) platforms, such as Dadsec OTT, suggesting possible code reuse or a collaboration between developers.

  • Proofpoint Discloses Technique Pivot by Attacker Group TA577: Targeting Windows NTLM:

    Proofpoint detected two distinct email-based campaigns that TA577 carried out on February 26 and 27, 2024. The campaigns targeted hundreds of businesses globally via tens of thousands of emails. 

    The attackers cleverly disguised the emails as replies to previous emails. This is an effective social engineering tactic known as thread hijacking. 

    The emails contained HTML attachments compressed into zip files. Each malicious attachment had its own unique identifier. And the HTML files contained within the attachment were customized for each recipient. Because all the hashes were unique, a simple signature-based detection system could not consistently detect and block these emails.

    When the email recipient opened the files, it triggered a connection to a Server Message Block (SMB) server that the threat actor controlled. No malware was directly delivered through these connections.


Insight

Unveiling the Threat Landscape: Industrial Automation Systems in H2 2023 

The threat landscape for industrial automation systems. H2 2023

In the dynamic realm of cybersecurity, the threat landscape for industrial automation systems (IAS) is a critical focal point. As we delve into the insights from SecureList's report on the second half of 2023, it becomes evident that the challenges facing IAS security are multifaceted and evolving. From Eastern Europe's surge in malicious activity to Russia's struggle against miner executable files, the threat landscape presents a complex tableau of risks that demand proactive measures and vigilant defenses. 

Eastern Europe Emerges as a Hotspot 

Amidst the global cybersecurity landscape, Eastern Europe emerges as a hotspot for malicious activity targeting industrial automation systems. The region witnessed a significant uptick in the percentage of IAS computers on which malicious objects were blocked during the latter half of 2023, marking a notable increase of 6 percentage points. This surge underscores the escalating threat posed by cyber adversaries to critical infrastructure in the region. 

Further analysis reveals that Eastern Europe ranked second among regions in blocking malicious scripts and phishing pages—a sobering indication of the pervasive nature of cyber threats facing IAS networks. The six-month period also witnessed a concerning rise in blocked malicious scripts, phishing pages, miner executable files for Windows, worms, and denylisted internet resources, amplifying the urgency for robust security measures to safeguard industrial assets. 

Russia's Battle Against Mining Malware 

In the realm of IAS security, Russia grapples with its own set of challenges, particularly concerning the proliferation of mining malware. The country ranks second among regions in the percentage of IAS computers on which miners in the form of executable files for Windows were blocked—a troubling trend that underscores the prevalence of cryptojacking attacks targeting industrial infrastructure. 

Actionable Insights for IAS Security 

As organizations navigate the evolving threat landscape surrounding industrial automation systems, proactive measures are imperative to mitigate risks effectively. Here are actionable insights to enhance IAS security: 

  1. Strengthen Endpoint Protection: Deploy robust endpoint protection solutions capable of detecting and blocking malicious scripts, phishing pages, and executable files targeting IAS computers. Regularly update antivirus definitions and conduct comprehensive scans to identify and neutralize threats. 
  2. Implement Network Segmentation: Segment IAS networks to isolate critical assets from potential threats and limit the lateral movement of malicious actors within the infrastructure. Adopt a zero-trust approach to network security, where access privileges are granted based on strict authentication and authorization protocols. 
  3. Enhance Threat Intelligence Sharing: Foster collaboration and information exchange among industry peers, cybersecurity experts, and government agencies to gain insights into emerging threats and proactive defense strategies. Participate in threat intelligence sharing platforms and leverage shared data to strengthen IAS defenses. 
  4. Conduct Regular Security Audits: Conduct periodic security audits and vulnerability assessments to identify potential weaknesses in IAS infrastructure. Address vulnerabilities promptly and implement robust security controls to mitigate risks and fortify defenses against cyber threats. 
  5. Invest in Employee Training: Educate employees about on the importance of cybersecurity hygiene and train them to recognize and report suspicious activities. Foster a culture of cybersecurity awareness within the organization, empowering employees to play an active role in safeguarding IAS assets. 

By adopting a proactive and multi-layered approach to IAS security, organizations can effectively mitigate the risks posed by the evolving threat landscape and safeguard critical infrastructure from cyber threats. As cyber adversaries continue to evolve their tactics, staying vigilant and implementing comprehensive security measures are paramount to protecting industrial automation systems in an increasingly interconnected world. 


Scammer’s Corner

Create an illustration representing the dangers of online dating scams. The image should depict a person sitting in front of a computer, visibly stressed and surrounded by warning signs such as question marks, exclamation points, and representations of fake profiles. The background should subtly include shadowy figures holding masks, symbolizing deception. The atmosphere should convey caution and awareness without being overly dark, using a balanced color scheme to evoke a sense of alertness and the need for vigilance in online interactions.

The Digital Love Trap: A Cautionary Tale of Online Dating Scams 

In today's digital age, the quest for love has transitioned online, but so have the predators. A harrowing incident involving an online dating scam highlights the sophisticated tactics used by scammers to exploit individuals seeking companionship on platforms like Hinge. The scam, involving fake identities and a concocted narrative of legal trouble, serves as a grave reminder of the dangers hidden behind digital profiles. 

The Incident

The saga began with a typical match on popular dating site Hinge, swiftly escalating to private text exchanges. Within this rapidly developing digital romance, the individual received unsolicited explicit images from their new match. However, this apparent show of trust quickly turned into a nightmare. The match vanished, and the individual was soon contacted by someone claiming to be from the police, alleging that the person they had been conversing with was a minor involved in a tragic suicide. 

Scam Development

The plot thickened with the supposed law enforcement official's vague details and rushed communication, followed by an equally confusing call from a person claiming to be the distressed father. These calls were marked by inconsistencies and geographical disparities, with phone numbers tracing back to various states, casting a shadow of doubt over their legitimacy. 

Red Flags and Tactics

Key red flags included the rapid progression of the online relationship, the receipt of unsolicited intimate photos, the sudden disappearance of the contact, and the subsequent alarming phone calls. Experts highlight these as classic signs of a scam, designed to create panic and cloud judgment, making the individual more susceptible to manipulation. 

Understanding the red flags and tactics used in online dating scams is crucial for recognizing and avoiding potential dangers. These scams are sophisticated and exploit human psychology, making anyone vulnerable, regardless of intelligence or emotional state. Key red flags include rapid escalation of the relationship, requests for personal or intimate information early on, inconsistencies in the scammer's story, and urgent, emotionally charged requests or threats. The tactics employed are designed to manipulate emotions—creating a false sense of intimacy or urgency that clouds judgment. Recognizing these signs can empower individuals to navigate online interactions more safely, emphasizing that falling victim to such scams is not a reflection of one's intelligence or desperation but rather the cunning of the scammer. 

Psychological Impact

The scam exploits emotional vulnerability, creating a scenario where the victim feels both responsible and terrified. This psychological manipulation is intended to coerce the individual into acting hastily, driven by fear of legal repercussions or social disgrace. 

The psychological impact of online dating scams extends beyond immediate stress and confusion. Victims often experience long-term emotional distress, loss of trust in others, and diminished self-esteem. The scam's personal nature can lead to feelings of betrayal, making it difficult for victims to engage in future online interactions. Additionally, the fear and embarrassment stemming from the scam can lead to isolation, as victims might refrain from seeking help or sharing their experience due to shame or guilt. This can exacerbate the emotional toll, underscoring the importance of supportive resources and open discussions about online safety. 

Expert Opinions

Cybersecurity experts underscore the importance of maintaining scepticism online, and emphasize the importance of digital literacy in identifying and preventing online scams. They recommend being highly cautious of rapid emotional escalation and unsolicited sharing of personal information online, advising never to share personal information or images with strangers. 

Law enforcement officials stress that real police work involves thorough investigation and proper communication, not hasty, unverifiable phone calls.

Legal experts suggest that real law enforcement processes involve clear communication and proper legal procedures, advising individuals to verify the authenticity of any alarming claims.  

Psychologists highlight the emotional manipulation involved in scams, advising individuals to maintain boundaries and seek second opinions when confronted with suspicious online interactions. 

These collective insights underline the multifaceted approach needed to combat and remain resilient against online scams. 

The Bottom Line

To safeguard against such online dating scams, individuals must remain vigilant, question inconsistencies, and verify identities. It's crucial to report suspicious interactions to both the dating platform and local authorities. Reflecting on these incidents reinforces the essential blend of hope and caution in the digital quest for love, urging online daters to navigate their virtual interactions with informed caution. 

It's crucial to understand that online dating scams can ensnare anyone, regardless of their intelligence, experience, or emotional state. These scams exploit basic human desires and emotions, making them highly effective. Labeling victims as "stupid" or "desperate" is not only inaccurate but also harmful. It undermines the sophistication of these scams and discourages victims from seeking help. Remember, recognizing the sophisticated nature of these entrapments is key to fostering a supportive environment for those affected.  

What Can We Do

Victims of similar scams are encouraged to come forward and share their experiences, contributing to a collective effort against online exploitation. Awareness and education remain the most potent weapons in the fight against digital deception. 


The Deep Dive

The UK's Inadequate Response to China's Cyber Threat: A Call for Urgent Reformation 

Introduction 

The United Kingdom's response to the escalating cyber threat from China has been critically assessed as "completely inadequate" by a cross-party committee of lawmakers, illuminating significant gaps in national security measures and policy formulation. The lack of adequate resources and slow policy development pace have left the UK vulnerable to Chinese interference, according to a damning report by the Intelligence and Security Committee (ISC). 

Inadequacies and Oversights 

The ISC's findings underline a "serious failure" in the UK's approach to addressing the risks posed by China. Despite Prime Minister Rishi Sunak's assurances of not being complacent, the UK's efforts are found to be lacking in both scale and speed. Historically, the British intelligence community has prioritized counter-terrorism, neglecting the equally significant threat of Chinese espionage and interference. This miscalculation has allowed China to potentially influence the UK's key decision-makers and acquire valuable intellectual property, pushing towards technological supremacy. 

Economic Interests vs. National Security 

The report also highlights a critical dilemma faced by the UK government: the balance between fostering economic ties with China and ensuring national security. The ISC criticizes the Government's lenient stance towards Chinese investments, especially in the critical national infrastructure sectors such as the civil nuclear industry. This approach, according to the ISC, overlooks the extensive espionage efforts and the influence exerted by China, notably within the UK's academic institutions and industrial sectors. 

In the context of economic interests versus national security, a balanced approach is essential. Nations should consider their interests in terms of security, prosperity, and social wellbeing, as all three are interconnected and reinforce each other. Strategies to mitigate risks should not be isolated within one domain but can span across economic, social, and security areas. For example, diversified investment in infrastructure can mitigate security risks while enhancing economic benefits. Similarly, promoting strong domestic governance and diverse markets can help manage the risks associated with foreign investment, balancing economic gains with national security concerns. 

Smug Cronyism Within the UK’s Tech Sector 

The issue of smug cronyism within the UK's tech and governmental sectors, particularly highlighted during the COVID-19 pandemic, reflects a significant challenge. The British Medical Journal (BMJ) reported that a fifth of the UK government contracts awarded to respond to the pandemic showed signs of possible corruption. Transparency International UK identified 73 questionable contracts worth more than £3.7 billion that should be subject to detailed audits. Critically, the "VIP" or "high priority" lane facilitated contracts due to political connections rather than competency, damaging trust in the integrity of the pandemic response. This so-called "VIP lane" system, which was ten times more likely to award contracts than ordinary lanes, raised concerns of nepotism and improper conduct. 

Moreover, the pandemic response highlighted the broader issues of neoliberal policies and underinvestment in public health infrastructure. Recommendations for the future include avoiding neoliberal outsourcing in favor of strengthening public sector capacity, ensuring effective and accountable contracting processes, and embracing transparent communication. This approach aims to prevent the reoccurrence of cronyism and improve public trust in governmental decisions and spending. 

These situations underscore the tension between economic gain and ethical governance, emphasizing the need for transparency and accountability in both the public sector and the private tech industry to restore public trust and ensure equitable and effective responses to crises. 

While cronyism in the UK tech sector isn't as prominently featured as it was in the medical supply sector during the COVID-19 pandemic, there are related concerns within the tech industry, especially regarding workplace dynamics and unionization efforts. 

The United Tech and Allied Workers Union (UTAW), part of the Communication Workers Union, is aiming to address a variety of workplace issues including discrimination, gender pay gaps, bullying, lack of representation, and cronyism. This move signals a growing awareness among tech workers about their collective power and the potential issues within their industry, including those related to unfair practices and unequal treatment​​. 

Recommendations and Government Response 

Among the ISC's recommendations are the reassessment of the 'revolving door' guidelines, which address the movement of officials between government and industry, particularly with respect to China. The report urges a long-term strategic approach to security policies to effectively counter Chinese interference. Although Prime Minister Sunak highlighted steps taken in alignment with the committee’s recommendations, the ISC and other observers have called for more decisive action and transparency in tackling the threats posed by China. 

A Path Forward is Possible, if the UK Can Join the 21st Century 

The UK is at a critical juncture, requiring a strategic overhaul of its cybersecurity and intelligence policies to address the multifaceted threats from China. The Government's response to the ISC report and subsequent actions will be pivotal in safeguarding the nation's security, economic interests, and democratic values against the challenges posed by a rapidly evolving global landscape. 

The ISC's report serves as a stark reminder of the urgent need for the UK to enhance its cyber defense mechanisms, foster robust policies, and maintain a vigilant stance against foreign interference to ensure a secure and prosperous future. 


And Finally ….

As our regular readers can see, our usual categories of articles this week were somewhat derailed by events. We found an alarming romance scam story on Reddit which shows how fraudsters will go to any lengths - even faking suicides and impersonating the police - in order to get their evil way. Secondly, the story of how the UK has been shown to be woefully unprepared to counter the cyber threat from a significant nation state actor warranted urgent coverage.  

Over the last week, the cybersecurity landscape has been marked by several significant events in the realms of cyberwarfare, espionage, and extortion: 

  1. US-Russia Election Cyberattack Accusations: The US and Russia have accused each other of intending to disrupt their respective presidential elections. This has escalated tensions between the two nations, highlighting the ongoing cyber confrontations and deepening the existing mutual distrust. 
  2. US Cyber Operations Against Iran: The US reportedly hacked an Iranian military vessel used for spying purposes. This incident is part of broader geopolitical tensions and showcases the continuous cyber engagement between the US and Iran. 
  3. North Korean Hacking Activity: South Korea reported that presumed North Korean hackers breached the personal emails of a presidential staffer, indicating ongoing espionage activities by North Korea aimed at gathering intelligence and potentially disrupting South Korean affairs. 
  4. Cyberattack in Albania: Albanian authorities accused Iranian-backed hackers of targeting the country’s Institute of Statistics. This event underscores the increasing trend of state-sponsored cyber activities aimed at disrupting governmental functions and stealing data. 
  5. Leadership Changes in US Cyber Command: General Timothy D. Haugh assumed command of the NSA and USCYBERCOM, succeeding General Paul M. Nakasone. This change in leadership might signal a shift in strategies or priorities within US cybersecurity efforts. 
  6. Chinese Cyber Threats to US Infrastructure: The US has disrupted a cyber threat originating from Chinese government hackers targeting critical infrastructure. Despite this successful intervention, the FBI has warned that the threat from Chinese cyber activities remains significant and could impact American citizens. 

These events reflect a complex and evolving cyber threat landscape where espionage, extortion and state-sponsored activities are increasingly common. The incidents also highlight the global nature of cyber threats, affecting nations across different continents and involving a range of actors from government agencies down to individual hackers. 

We’re all trying to work out what big beasts lurk below the surface by watching the swirls in the water, so join us next week when we’ll be analysing the news as usual, taking a close look at PRC state-sponsored cyber activity, how cybercriminals are holding New Zealanders to ransom, and much, much more!  

Make sure to remain secure, well-informed, and as always, stay frosty. 


Thanks for reading Cyberwarfare, Espionage & Extortion! Subscribe for free to receive new posts and support my work.

Follow My Socials

#Cyberwarfare #Espionage #Extortion #Cyberthreats