FBI Preempted Russian Cyberattack
The US conducted a preemptive strike against the GRU's systems.
Reuters (“U.S. FBI says it disrupted Russian hackers“):
The U.S. Federal Bureau of Investigation has wrested control of thousands of routers and firewall appliances away from Russian military hackers by hijacking the same infrastructure Moscow’s spies were using to communicate with the devices, U.S. officials said on Wednesday.
An unsealed redacted affidavit described the unusual operation as a pre-emptive move to stop Russian hackers from mobilizing the compromised devices into a “botnet” – a network of hacked computers that can bombard other servers with rogue traffic.
“Fortunately, we were able to disrupt this botnet before it could be used,” U.S. Attorney General Merrick Garland said.
The Russian Embassy in Washington did not immediately return an email seeking comment.
The targeted botnet was controlled through malware called Cyclops Blink, which U.S. and UK cyberdefense agencies had publicly attributed in late February to “Sandworm,” allegedly one of the Russian military intelligence service’s hacking teams that has repeatedly been accused of carrying out cyberattacks. Cyclops Blink was designed to hijack devices made by WatchGuard Technologies Inc (WTCHG.UL) and ASUSTeK Computer Inc (2357.TW), according to research by private cybersecurity firms. It provides Russian services with access to those compromised systems, offering the ability to remotely exfiltrate or delete data or turn the devices against a third party.
Watchguard issued a statement confirming it worked with the U.S. Justice Department to disrupt the botnet but did not disclose the number of devices affected – saying only that they represented “less than 1 percent of WatchGuard appliances.”
AsusTek, better known as Asus, did not immediately return messages seeking comment.
FBI Director Chris Wray told reporters the FBI, with court approval, secretly reached into thousands of routers and firewall appliances to delete the malware and reconfigure the devices. “We removed malware from devices used by thousands of mostly small businesses for network security all over the world,” Wray said. “We shut the door the Russians had used to get into them.”
The affidavit noted that U.S. officials launched an awareness campaign “to inform owners of WatchGuard devices of the steps they should take to remediate infections or vulnerabilities” and yet less than half the devices had been fixed to expel the hackers. The affidavit noted that the FBI had carried out its work in cooperation with WatchGuard.
NYT (“U.S. Says It Secretly Removed Malware Worldwide, Pre-empting Russian Cyberattacks“) adds:
The United States said on Wednesday that it had secretly removed malware from computer networks around the world in recent weeks, a step to pre-empt Russian cyberattacks and send a message to President Vladimir V. Putin of Russia.
The move, made public by Attorney General Merrick B. Garland, comes as U.S. officials warn that Russia could try to strike American critical infrastructure — including financial firms, pipelines and the electric grid — in response to the crushing sanctions that the United States has imposed on Moscow over the war in Ukraine.
The malware enabled the Russians to create “botnets” — networks of private computers that are infected with malicious software and controlled by the G.R.U., the intelligence arm of the Russian military. But it is unclear what the malware was intended to do, since it could be used for everything from surveillance to destructive attacks.
An American official said on Wednesday that the United States did not want to wait to find out. Armed with secret court orders in the United States and the help of governments around the world, the Justice Department and the F.B.I. disconnected the networks from the G.R.U.’s own controllers.
The NYT report, by Kate Conger and David Sanger, anticipates my reaction:
President Biden has repeatedly said he would not put the U.S. military in direct conflict with the Russian military, a situation he has said could lead to World War III. That is why he refused to use the U.S. Air Force to create a no-fly zone over Ukraine or to permit the transfer of fighter jets to Ukraine from NATO air bases.
But his hesitance does not appear to extend to cyberspace. The operation that was revealed on Wednesday showed a willingness to disarm the main intelligence unit of the Russian military from computer networks inside the United States and around the world. It is also the latest effort by the Biden administration to frustrate Russian actions by making them public before Moscow can strike.
Even as the United States works to prevent Russian attacks, some American officials fear Mr. Putin may be biding his time in launching a major cyberoperation that could strike a blow at the American economy.
Until now, American officials say, the primary Russian cyberactions have been directed at Ukraine — including “wiper” malware designed to cripple Ukrainian government offices and an attack on a European satellite system called Viasat. The details of the satellite attack, one of the first of its kind, are of particular concern to the Pentagon and American intelligence agencies, which fear it may have exposed vulnerabilities in critical communications systems that the Russians and others could exploit.
While the administration has, rightly in my view, ruled out direct kinetic confrontation with Russia, ruling out not only “boots on the ground” but a US-manned no-fly zone, the fact of the matter is that we’re very much belligerents in the war on the side of Ukraine. We’re supplying weapons and ISR support that are directly leading to the deaths of Russian soldiers. It would not be the least bit surprising if Russia decided to hit back.
The rules of cyber escalation are still soft. Going back to at least the Obama administration, the United States has publicly reserved the option to respond to cyberattacks via military action. Presumably, this is intended for attacks on critical infrastructure that pose a direct threat to life. Still, it’s easy to fathom one side launching a cyberattack that it believed short of the red line that would lead to a kinetic response and the receiving party believed otherwise.
As always when authorities announce their success in stopping an attack, we really don’t know whether an attack was coming, much less how much damage it would have caused. Under the circumstances, though, Justice (presumably with direct approval from the President) was almost certainly right in not waiting to find out.