San Francisco, April 17: Cyber security representatives from the US and Britain have warned of Russian state-sponsored cyber-attacks that are targeting network infrastructure devices such as routers and firewalls, to compromise government and private sectors globally.
According to a US Computer Emergency Response Team (US-CERT), the Technical Alert (TA) provided information on the worldwide cyber exploitation of network infrastructure devices (routers, switches, firewalls, Network-based Intrusion Detection Systems) by Russian state-sponsored cyber actors.
The joint TA is the result of analytic efforts between the US Department of Homeland Security (DHS), the Federal Bureau of Investigation (FBI), and the UK's National Cyber Security Centre, according to information on the official website of the DHS.
"Victims were identified through a coordinated series of actions between US and international partners. The report builds on previous DHS reporting and advisories from the UK, Australia and the European Union," the website said.
"The FBI has high confidence that Russian state-sponsored cyber actors are using compromised routers to conduct man-in-the-middle attacks to support espionage, extract intellectual property, maintain persistent access to victim networks, and potentially lay a foundation for future offensive operations," the website added.
Since 2015, the US government has been receiving information from multiple sources -- including private and public sector cyber security research organisations and allies -- that cyber actors were exploiting large numbers of enterprise-class and residential routers and switches worldwide.
The US government assessed that cyber actors supported by the Russian government carried out this worldwide campaign.
These operations enable espionage and intellectual property that supports the Russian Federation's national security and economic goals, the website said.
Russian cyber actors leverage a number of legacy or weak protocols and service ports associated with network administration activities.
Cyber actors use these weaknesses to identify vulnerable devices, extract device configurations, harvest login credentials, modify device firmware, and copy or redirect victim traffic through Russian cyber-actor-controlled infrastructure.
Organisations can use publicly available cyber security guidance and best practices from DHS, allied governments, vendors and the private-sector cyber security community on mitigation strategies for the exploitation vectors to safeguard their networks.
Let the Truth be known. If you read VB and like VB, please be a VB Supporter and Help us deliver the Truth to one and all.
ISLAMABAD: At least two more cases of poliovirus were reported in Pakistan, taking the number of infections to 52 so far this year, a report said on Friday.
“The Regional Reference Laboratory for Polio Eradication at the National Institute of Health has confirmed the detection of two more wild poliovirus type 1 (WPV1) cases in Pakistan," an official statement said.
The fresh infections — a boy and a girl — were reported from the Dera Ismail Khan district of Khyber-Pakhtunkhwa province.
“Genetic sequencing of the samples collected from the children is underway," the statement read. Dera Ismail Khan, one of the seven polio-endemic districts of southern Khyber Pakhtunkhwa province, has reported five polio cases so far this year.
Of the 52 cases in the country this year, 24 are from Balochistan, 13 from Sindh, 13 from Khyber Pakhtunkhwa, and one each from Punjab and Islamabad.
There is no cure for polio. Only multiple doses of the oral polio vaccine and completion of the routine vaccination schedule for all children under the age of five can keep them protected.