{"id":96407,"date":"2020-10-27T08:00:14","date_gmt":"2020-10-27T12:00:14","guid":{"rendered":"http:\/\/kendallharmon.net\/?p=96407"},"modified":"2020-10-27T18:02:18","modified_gmt":"2020-10-27T22:02:18","slug":"wired-the-russian-hackers-playing-chekhovs-gun-with-us-infrastructure","status":"publish","type":"post","link":"https:\/\/kendallharmon.net\/?p=96407","title":{"rendered":"(Wired) The Russian Hackers Playing &#8216;Chekhov&#8217;s Gun&#8217; With US Infrastructure"},"content":{"rendered":"<p><span class=\"lead-in-text-callout\">Over the last<\/span> half a decade, Russian state-sponsored hackers have <a href=\"https:\/\/www.wired.com\/story\/russian-hackers-attack-ukraine\/\">triggered blackouts in Ukraine<\/a>, <a href=\"https:\/\/www.wired.com\/story\/notpetya-cyberattack-ukraine-russia-code-crashed-the-world\/\">released history&#8217;s most destructive computer worm<\/a>, and <a href=\"https:\/\/www.wired.com\/story\/russia-election-hacking-playbook\/\">stolen and leaked emails from Democratic targets in an effort to help elect Donald Trump<\/a>. In that same stretch, one particular group of Kremlin-controlled hackers has gained a reputation for a very different habit: walking right up to the edge of cybersabotage\u2014sometimes with hands-on-the-switches access to US critical infrastructure\u2014and stopping just short.<\/p>\n<p>Last week the Department of Homeland Security&#8217;s Cybersecurity and Infrastructure Security Agency <a class=\"external-link\" href=\"https:\/\/us-cert.cisa.gov\/ncas\/alerts\/aa20-296a\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/us-cert.cisa.gov\/ncas\/alerts\/aa20-296a&quot;}\">published an advisory warning<\/a> that a group known as Berserk Bear\u2014or alternately Energetic Bear, TEMP.Isotope, and Dragonfly\u2014had carried out a broad hacking campaign against US state, local, territorial, and tribal government agencies, as well aviation sector targets. The hackers breached the networks of at least two of those victims. The news of those intrusions, which was <a class=\"external-link\" href=\"https:\/\/www.cyberscoop.com\/russia-temp-isotope-election-security-mandiant\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.cyberscoop.com\/russia-temp-isotope-election-security-mandiant\/&quot;}\">reported earlier last week by the news outlet Cyberscoop<\/a>, presents the troubling but unconfirmed possibility that Russia may be laying the groundwork to disrupt the 2020 election with its access to election-adjacent local government IT systems.<\/p>\n<p>In the context of Berserk Bear&#8217;s long history of US intrusions, though, it&#8217;s much harder to gauge the actual threat it poses. Since as early as 2012, cybersecurity researchers have been shocked to repeatedly find the group&#8217;s fingerprints deep inside infrastructure around the globe, from electric distribution utilities to nuclear power plants. Yet those researchers also say they&#8217;ve never seen Berserk Bear use that access to cause disruption. The group is a bit like Chekhov&#8217;s gun, hanging on the wall without being fired through all of Act I\u2014and foreshadowing an ominous endgame at a critical moment for US democracy.<\/p>\n<p>&#8220;What makes them unique is the fact that they have been so focused on infrastructure throughout their existence, whether it&#8217;s mining, oil, and natural gas in different countries or the grid,&#8221; says Vikram Thakur, a researcher at security firm Symantec who has tracked the group over several distinct hacking campaigns since 2013. <\/p>\n<p><a href=\"https:\/\/www.wired.com\/story\/berserk-bear-russia-infrastructure-hacking\/\">Read it all<\/a>.<\/p>\n<blockquote class=\"twitter-tweet\">\n<p lang=\"en\" dir=\"ltr\">The US gov called out a lot of Russian hackers&#39; cyberattacks in the past week. But most puzzling are the warnings about those who *haven&#39;t* attacked. What are we to make of a group that&#39;s dug into US infrastructure for years but never pulled the trigger? <a href=\"https:\/\/t.co\/q0hGqDWzl8\">https:\/\/t.co\/q0hGqDWzl8<\/a><\/p>\n<p>&mdash; Andy Greenberg (@a_greenberg) <a href=\"https:\/\/twitter.com\/a_greenberg\/status\/1321121888794497027?ref_src=twsrc%5Etfw\">October 27, 2020<\/a><\/p><\/blockquote>\n<p> <script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Over the last half a decade, Russian state-sponsored hackers have triggered blackouts in Ukraine, released history&#8217;s most destructive computer worm, and stolen and leaked emails from Democratic targets in an effort to help elect Donald Trump. In that same stretch,<span class=\"ellipsis\">&hellip;<\/span><\/p>\n<div class=\"read-more\"><a href=\"https:\/\/kendallharmon.net\/?p=96407\">Read more &#8250;<\/a><\/div>\n<p><!-- end of .read-more --><\/p>\n","protected":false},"author":794,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[433,209,94,168,144,151,479,95],"tags":[],"class_list":["post-96407","post","type-post","status-publish","format-standard","hentry","category-social-networking","category-americau-s-a","category-blogging-the-internet","category-ethics-moral-theology","category-foreign-relations","category-politics-in-general","category-russia","category-science-technology"],"_links":{"self":[{"href":"https:\/\/kendallharmon.net\/index.php?rest_route=\/wp\/v2\/posts\/96407","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kendallharmon.net\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kendallharmon.net\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kendallharmon.net\/index.php?rest_route=\/wp\/v2\/users\/794"}],"replies":[{"embeddable":true,"href":"https:\/\/kendallharmon.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=96407"}],"version-history":[{"count":4,"href":"https:\/\/kendallharmon.net\/index.php?rest_route=\/wp\/v2\/posts\/96407\/revisions"}],"predecessor-version":[{"id":96412,"href":"https:\/\/kendallharmon.net\/index.php?rest_route=\/wp\/v2\/posts\/96407\/revisions\/96412"}],"wp:attachment":[{"href":"https:\/\/kendallharmon.net\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=96407"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kendallharmon.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=96407"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kendallharmon.net\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=96407"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}