UPDATED 22:05 EDT / OCTOBER 22 2017

INFRA

US warns hackers are targeting energy, infrastructure and manufacturing sectors

The U.S. Department of Homeland Security and the Federal Bureau of Investigation have issued a rare joint statement warning that hackers are targeting firms in the energy, nuclear, water, aviation and critical manufacturing sectors.

The warning, issued last Thursday through the United States Computer Emergency Readiness Team, said malicious actors had been targeting the sectors in a range of attacks dating back to May and that those behind the attacks have managed to compromise some targeted networks. The warning said the attacks often consisted of multistage intrusion campaigns in which hackers first target low-security and smaller networks as a way to gain backdoor access to larger networks at major, high-value targets, particularly in the energy sector.

Those behind the attacks use a number of different stages to gain access to their targets, starting with open-source reconnaissance — that is, the process of gathering publicly available information. They deploy spear phishing campaigns that attempt to trick employees at a target company either to click on a malicious link or to provide further information.

Described in the report as “watering-hole domains,” the hackers are also identified as gaining access to, then changing, legitimate organization web pages to serve malicious scripts that allow them to gather more information on their target, including credential gathering. With that information on hand, the hackers then target industrial control systems, including those involved with the day-to-day running of the targeted company.

Neither DHS nor the FBI would comment further on the details of the hacking incidents mentioned in the warning. DHS spokesman Scott McConnell said only that “the technical alert provides recommendations to prevent and mitigate malicious cyber activity targeting multiple sectors and reiterated our commitment to remain vigilant for new threats.”

Those recommendations include encouraging network users and administrators in implement a range of “detection and prevention guidelines to help defend against this activity,” most of which would be obvious to large enterprise firms but perhaps not so much to smaller ones.

Network administrators are encouraged to implement network and host-based signatures, detection and prevention measures such as IP tracking and logging, persistence detection and perhaps the most obvious recommendation of them all: the implementation of security best practices.

Photo: Vikramdeep Sidhu/Wikimedia Commons

Since you’re here …

… We’d like to tell you about our mission and how you can help us fulfill it. SiliconANGLE Media Inc.’s business model is based on the intrinsic value of the content, not advertising. Unlike many online publications, we don’t have a paywall or run banner advertising, because we want to keep our journalism open, without influence or the need to chase traffic.The journalism, reporting and commentary on SiliconANGLE — along with live, unscripted video from our Silicon Valley studio and globe-trotting video teams at theCUBE — take a lot of hard work, time and money. Keeping the quality high requires the support of sponsors who are aligned with our vision of ad-free journalism content.

If you like the reporting, video interviews and other ad-free content here, please take a moment to check out a sample of the video content supported by our sponsors, tweet your support, and keep coming back to SiliconANGLE.