CIO News Hubb
Advertisement
  • Home
  • News
  • Operations CIO
  • Visionary CIO
  • IT Management
  • Information Security
  • Contact
No Result
View All Result
  • Home
  • News
  • Operations CIO
  • Visionary CIO
  • IT Management
  • Information Security
  • Contact
No Result
View All Result
CIO News Hubb
No Result
View All Result
Home Visionary CIO

US shuts down Russia’s Cyclops Blink botnet operation

admin by admin
April 7, 2022
in Visionary CIO
585
SHARES
3.2k
VIEWS
Share on FacebookShare on Twitter


The US Department of Justice (DoJ), working alongside the FBI and various other authorities, has successfully disrupted the operation of a Russian botnet being used by Moscow’s intelligence services to distribute the so-called Cyclops Blink malware.

The Cyclops Blink malware targeted WatchGuard firewall and later Asus router devices, using them as command and control (C2) infrastructure for an underlying botnet. It was a tool of Russia’s Main Intelligence Directorate (GRU) and used by the well-known Sandworm (aka Voodoo Bear) advanced persistent threat (APT) group.

The successor to a previous Sandworm malware known as VPNFilter, Cyclops Blink was particularly dangerous because it specifically targeted firewalls at network perimeters, so when successfully exploited, it enabled Sandworm to conduct malicious activities on all the machines sitting behind the firewall.

However, it is important to note that in WatchGuard’s case, it only targeted devices that had been reconfigured from their factory default sessions to enable remote management interfaces to be accessed externally – thought to be less than 1% of the firm’s installed base.

Its existence was disclosed in a joint advisory by the UK’s National Cyber Security Centre (NCSC) and its US equivalent, the Cybersecurity and Infrastructure Security Agency (CISA) on 23 February 2022, just hours before Russia began its attack on Ukraine.

“This court-authorised removal of malware deployed by the Russian GRU demonstrates the department’s commitment to disrupt nation-state hacking using all of the legal tools at our disposal,” said Matthew Olsen, assistant attorney general at the DoJ’s National Security Division.

“By working closely with WatchGuard and other government agencies in this country and the UK to analyse the malware and to develop detection and remediation tools, we are together showing the strength that public-private partnership brings to our country’s cyber security. The department remains committed to confronting and disrupting nation-state hacking, in whatever form it takes.”

The operation saw the authorities copy and remove Cyclops Blink malware from the vulnerable internet-connected WatchGuard firewalls that Sandworm was using for C2 of the underlying botnet. They also closed the external management ports that Sandworm was using to access its C2 devices, which effectively severed the victim devices from Sandworm’s control and neutralised the botnet.

The Americans said they leveraged direct communications with the Cyclops Blink malware on the C2 firewall and router devices it identified, and apart from collecting their serial numbers and copying the malware, it did not otherwise search for, or collect, other information from the victim networks it found. Nor did it communicate with any of the actual underlying bots.

The DoJ said WatchGuard’s swift attention to the issue, its release of detection and remediation tools and prompt patching by users had been highly effective. Later efforts by Asus to mitigate the threat were also effective, and together, both firms have likely successfully remediated thousands of compromised devices.

But at the same time, WatchGuard and Asus devices whose owners have not yet followed the recommended detection and remediation steps are still at risk of being compromised by Sandworm. Users of WatchGuard and Asus devices who are learning Cyclops Blink for the first time now should consult the relevant advisories and follow the advice contained. WatchGuard’s advice can be found here, and Asus’s here.



Source link

Previous Post

MPs and editors sound alarm over threat to Freedom of Information

Next Post

Collaborating to make the internet safer for all

Related Posts

Visionary CIO

Reimagining the cities of the future in Finland

by admin
May 23, 2022
Visionary CIO

The longlist of the UK’s influential tech leaders

by admin
May 23, 2022
Visionary CIO

Did the Conti ransomware crew orchestrate its own demise?

by admin
May 23, 2022
Visionary CIO

Understanding attack paths is a question of training

by admin
May 23, 2022
Visionary CIO

How large companies can be ‘sharks’ that devour startups in their way – I-CIO

by admin
May 23, 2022
Next Post

Collaborating to make the internet safer for all

Leave Comment

Recommended

Reimagining the cities of the future in Finland

May 23, 2022

The longlist of the UK’s influential tech leaders

May 23, 2022

Did the Conti ransomware crew orchestrate its own demise?

May 23, 2022

Understanding attack paths is a question of training

May 23, 2022

How large companies can be ‘sharks’ that devour startups in their way – I-CIO

May 23, 2022

Cisco Issues Patch for New IOS XR Zero-Day Vulnerability Exploited in the Wild

May 23, 2022

© 2022 CIO News Hubb All rights reserved.

Use of these names, logos, and brands does not imply endorsement unless specified. By using this site, you agree to the Privacy Policy.

Navigate Site

  • Home
  • News
  • Operations CIO
  • Visionary CIO
  • IT Management
  • Information Security
  • Contact

Newsletter Sign Up

No Result
View All Result
  • Home
  • News
  • Operations CIO
  • Visionary CIO
  • IT Management
  • Information Security
  • Contact

© 2022 JNews - Premium WordPress news & magazine theme by Jegtheme.