Malware found on vitality organization portable PC may not be aftereffect of Russian hack
Suspicious activity detected on a Vermont-based utilities company laptop last week may not have been linked to Russian hackers, the Washington Post says today. That's a reversal on a report published by the Post last week, in which it said that US officials had found evidence of Russian malware on a computer at the Burlington Electric Department, code linked to a hacking operation codenamed "Grizzly Steppe" by US intelligence officers.
The alert was reportedly triggered when a Burlington
Electric Department employee noticed his computer had connected to a
suspicious IP address while checking his Yahoo email inbox. The IP
address in question had previously been associated with Grizzly Steppe —
the operation connected to the DNC email hack last year — but experts
and officials close to the investigation now say that the traffic may
have been benign.
Traffic with the noted IP address has been found
elsewhere in the United States, indicating that the Burlington discovery
wasn't a sign of a targeted attack, and is not always linked with
malicious activity. The Post also reports that officials found a suite of malware on the laptop, a more standard criminal package known as "Neutrino," which is not believed to be connected to any Russian hacking operations.
The Post originally reported that Russian
hackers had breached the US electrical grid with the apparent attack,
but according to the Burlington Electric Department itself, the laptop in question was not connected to the utilities system. "The grid is not in danger,"
Vermont Public Service Commissioner Christopher Recchia said at the
time, specifying that monitoring utilities "flagged it, saw it, notified
appropriate parties and isolated that one laptop with that malware on
it."
In a bid to inform companies about the risk of
cyberattacks coming from abroad, the FBI and the Department of Homeland
Security released a report last week that contained a list of suspicious
IP addresses — a list that presumably included the address discovered
by Burlington Electric Company employees. The report gave advice on how
to proceed if such indicators were discovered, but warned against
assuming every IP it mentioned was a stone-cold indicator of a hacking
operation, with a note saying that “upon reviewing the traffic from
these IPs, some traffic may correspond to malicious activity, and some
may correspond to legitimate activity.”
The report was still criticized, however, for featuring
too broad a swathe of IPs, with 30 percent of the addresses being benign
proxies or servers used by companies like Amazon and Yahoo. Experts
warned that the report may cause people to jump to early conclusions —
as apparently happened in Vermont — but a Department of Homeland
Security official said the document was "“precisely the type of
information DHS should be sharing, particularly since we know that
cybersecurity capabilities differ among companies and organizations.”
Comments
Post a Comment