Microsoft: Russian Hackers Targeted Companies Through IoT Hardware

Microsoft: Russian Hackers Targeted Companies Through IoT Hardware

The ever-growing network of the internet of things (IoT) can make life more convenient by automating your home and delivering data wherever you are. However, all those internet-connected devices can also provide a massive attack surface for online criminals. We’ve already seen malware that targets IoT hardware, but now Microsoft says it has uncovered a coordinated hacking campaign focused on government, political groups, and charities via devices like printers and VoIP phones.

Microsoft’s Threat Intelligence Center says a new wave of IoT hacks began in April of this year. It points the finger at a group known as Fancy Bear or Strontium, which is best known as the perpetrator of high-profile hacks supporting the Russian government. Naturally, Fancy Bear is linked to Russian military intelligence (GRU). Fancy Bear stole files from the Democratic National Committee in 2016 — those documents later appeared on Wikileaks, helping to damage Hilary Clinton’s presidential campaign. Later, it conducted the NotPetya ransomware attack on Ukraine and other countries.

The new hacking operation takes aim at popular internet of things devices because they often escape normal security scrutiny. According to Microsoft, the hackers went after three popular devices: a VOIP phone, an office printer, and a video decoder. In many cases, these devices connect to the internet but have a default password or outdated security patches. That makes them an ideal entry point for an attacker to gain access to a larger network. From there, Fancy Bear used access to steal high-value data from other computers.

Don’t pick up — it’s the hackers.
Don’t pick up — it’s the hackers.

Microsoft only spotted this attack because it has insights into so many corporate networks via Windows software. It detected around 1,400 intrusions via IoT hardware. About 20 percent of the infiltrations have been at non-government organizations, think tanks, and other political organizations. The remaining 80 percent focused on government, military, technology firms, and other entities. The campaign even targeted Olympic organizing committees and anti-doping agencies, both of which have been problems for Russian interests.

Microsoft offers a raft of suggestions for improving IoT security, which starts with securing approval before plugging in new IoT devices. Unauthorized hardware can circumvent many security measures on a network, as NASA found out recently. Microsoft also suggests setting up secure networks specifically for IoT hardware and monitoring the connections for unusual activity. You can see the full list in Microsoft’s blog post.

Continue reading

Someone Hacked Ray Tracing Into the SNES
Someone Hacked Ray Tracing Into the SNES

Surely, a game console from the 90s couldn't support ray tracing, right? Wrong. Game developer and engineer Ben Carter hacked ray tracing into the Super NES with a little help from an FPGA dev board.

New ‘Morpheus’ CPU Design Defeats Hundreds of Hackers in DARPA Tests
New ‘Morpheus’ CPU Design Defeats Hundreds of Hackers in DARPA Tests

A new CPU design has won accolades for defeating the hacking efforts of nearly 600 experts during a DARPA challenge. Its approach could help us close side-channel vulnerabilities in the future.

Knee-Deep in the LED: Hackers Get Doom Running on Ikea Smart Bulb
Knee-Deep in the LED: Hackers Get Doom Running on Ikea Smart Bulb

The devices capable of running Doom keep growing. Today's demonstration? Smart bulbs.

Switch Hacker Agrees to Pay Nintendo an Additional $10 million
Switch Hacker Agrees to Pay Nintendo an Additional $10 million

After spending the last few years making and selling Switch modding kits, Bowser has agreed to pay Nintendo $10 million in damages to settle a civil lawsuit. This is in addition to the restitution he was ordered to pay following his criminal conviction.