Germany blames Fancy Bear for 2023 hacking campaign (www.theregister.com)
from kid@sh.itjust.works to cybersecurity@sh.itjust.works on 06 May 2024 11:56
https://sh.itjust.works/post/18882953

#cybersecurity

threaded - newest

autotldr@lemmings.world on 06 May 2024 12:00 collapse

This is the best summary I could come up with:


infosec in brief It was just around a year ago that a spate of allegedly Russian-orchestrated cyberattacks hit government agencies in Germany, and now German officials claim to know for a fact who did it: APT28, or Fancy Bear, a Russian threat actor linked to the GRU intelligence service.

Regardless, the confirmation of the attack serves as evidence of ongoing cyberattacks waged by Russia against its enemies that German foreign minister Annalena Baerbock said can’t be allowed to continue.

“It was a state-sponsored Russian cyber attack on Germany, and this is absolutely intolerable and unacceptable and will have consequences,” Baerbock told reporters at a news conference.

The 12-year old DIR-645, provided it’s running firmware versions prior to and including 1.04b12, contains an almost-as-old vulnerability – CVE-2015-2051 – that allows an attacker to execute arbitrary commands via the GetDeviceSettings action in the HNAP protocol.

Someone aware of the vulnerability – and the general public’s penchant for not upgrading end-of-life technology – is using it to deploy a new botnet, security shop Fortinet recently discovered.

Russian hackers caught last month trying to attack water plants in the US and Europe have apparently inspired enough of a copycat movement that governments are warning of a widespread – but easy-to-counter – campaign.


The original article contains 795 words, the summary contains 208 words. Saved 74%. I’m a bot and I’m open source!