What's new

Cybersecurity firm claims to have found evidence of a Cyber attack against Pakistan

PDF

STAFF
Joined
May 1, 2015
Messages
3,786
Reaction score
34
Country
Pakistan
Location
Pakistan
Analysts at cybersecurity firm Cylance believe the widespread attack originated from a Middle Eastern nation.


85



The Irvine, California-based company Cylance released a report Monday saying that a group it calls "The White Company" hacked into various elements of Pakistan's military and intelligence networks with the intent of stealing data and, later, openly harassing the government. Cylance first identified the intrusion in 2017 and says the hack may still pose a threat to the Pakistani government as well as others in the region.

The disclosure is concerning pertaining to a nuclear-armed nation like Pakistan, whose control over its arsenal of weapons has at times been a source of concern for Western leaders.
https://www.usnews.com/news/best-co...veillance-model-by-training-other-governments
"It's a pivotal country not just in South Asia but in global affairs," says Kevin Livelli, director of threat intelligence for Cylance, citing Pakistan's role as a lynchpin in U.S.-led efforts to fight regional terrorist groups like the Taliban, al-Qaida and the Haqqani network. "In our judgment, targeting the military is also particularly concerning."

Spokespeople at the firm declined to say at this time which nation it believes sponsored the attack but said it was likely a country in the Middle East and one that seeks to emulate the cyberspace capabilities of the U.S. Livelli says he does not think that the perpetrator was the government of the U.S., Russia, China, North Korea, Iran, India, Israel, Great Britain, Canada, Australia or New Zealand – considered to be the world's most powerful cyber actors. Cylance also did not reveal any information about what it believes the hackers stole.

Cylance and other private security firms have previously helped detect and publicize the presence of high-profile hacker groups operating in a realm that governments rarely discuss voluntarily. In 2014 Cylance revealed information about an Iranian operation it said was in retaliation for Stuxnet, a virus believed to have been developed by the U.S. and Israel in the 2000s to sabotage Iran's burgeoning nuclear program. CyberStrike, a similar firm, detected a pro-Russian hacking group believed to have interfered in the 2016 and 2018 U.S. elections and coined the term Fancy Bear to refer to it.

Cylance said it shared information about the reported threat with counterparts in the U.S. government and with PakCERT, a non-governmental organization based in Karachi that, like other computer emergency response teams, is dedicated to identifying and protecting its country from cyberattacks.

In response to a request for comment, PakCERT in Pakistan did not officially confirm a cyberattack against the Pakistani military or government. U.S. intelligence agencies reached for comment did not immediately have information they could share. The Pakistani Embassy in Washington, D.C., did not immediately respond to requests for comment.

The reported attack comes at a precarious time for Pakistan, which resides in a dangerous neighborhood wedged between Afghanistan, Iran and India. The country is increasingly out of favor with the Trump administration and facing other recent high-profile cybersecurity threats. Cylance believes the attackers focused their attention on the air force because of its prominent role in the Pakistani government, including hosting its first cybersecurity center, launched earlier this year.
Livelli, a career investigator, says "a successful espionage operation targeting the Pakistani military would not just produce tactical and strategic insight into their operations but also into a range of other domestic and governmental concerns."

Pakistan's armed forces play an outsized role in its politics. Its powerful Inter-Services Intelligence or ISI, the Pakistan counterpart to the CIA, is deeply enmeshed in the civilian government and has waged multiple coups during its 70-year history.

Pakistan is also locked in a decades-old contest for regional influence with its rival and neighbor India. Prior U.S. administrations went to great lengths to maintain equal relations between the two countries for fear of upsetting a delicate, if imperfect, balance. These efforts took place despite concerns that elements of the Pakistan government reportedly turn a blind eye to or are even complicit in some activities of groups the U.S. considers terrorists operating in its rural northern reaches or along its border with Afghanistan and Iran.

The Trump administration, however, has taken a hard line against Islamabad, slashing billions in foreign military aid until such time it believes Pakistan is adequately cracking down on these groups. The Pentagon under Trump also took the bold step of renaming the integral military headquarters for the region, U.S. Pacific Command, as U.S. Indo-Pacific Command.

China took particular interest in Pakistan as a strategic partner in its "One Belt One Road" initiative to build trading infrastructure across the continent, though Islamabad has recently reconsidered the close partnership, according to some reports.

And reports persist that Pakistani scientists transferred centrifuge technology to North Korea in at least indirect support of Pyongyang's nuclear program.

https://www.usnews.com/news/best-co...tional-crisis-and-the-threat-to-its-democracy
Like other influential countries, many malicious hackers have an interest in attacking Pakistan.

"You can imagine the Pakistani government and its military networks, servers and computers are going to be targets, and they're going to be targeted by nation-state attackers," says Adam Segal, director of the Digital and Cyberspace Policy Program at the Council on Foreign Relations.

Cylance's work to identify a group it says carried out this attack does not mean that the same group was not already known and under surveillance by other firms or governments, perhaps under a different name.
Cybersecurity experts and U.S. officials specializing in the increasingly significant realm agree that attributing the source of an attack is one of the most difficult aspects of their work. Hackers worldwide have developed increasingly advanced tools to either mask their identity or make it appear as though a third party is to blame.

Officials at Cylance say the scale of this attack – espionage designed to steal sensitive Pakistani information – and the resources needed to carry it out show that it must have had support from a nation-state. It centered on a campaign of spear-phishing to gain access to secure computers, detailed reconnaissance to identify the anti-virus programs that the Pakistani servers were using and secretive loopholes that allowed the hackers to remain undetected.

However the campaign appeared to shift focus in 2017, the Cylance report says, when pre-programmed malware began automatically ceasing to evade the Pakistani anti-virus programs, openly calling attention to itself.

"It was like ringing the fire alarm," Livelli says. "They deliberately distracted attention and time and resources, and to confuse the victim into thinking something was wrong."

Other countries' assets in the region were targeted, the report claims, including China's.

Pakistan came under intense scrutiny this week following reports that most, if not all, of its banks were subject to a wide-scale security breach. PakCERT subsequently reported evidence of credit card-skimming, but not a massive data breach among Pakistan's financial institutions.
https://www.usnews.com/news/world/a...ir-force-government-hacked-by-foreign-country
 
Analysts at cybersecurity firm Cylance believe the widespread attack originated from a Middle Eastern nation.


85



The Irvine, California-based company Cylance released a report Monday saying that a group it calls "The White Company" hacked into various elements of Pakistan's military and intelligence networks with the intent of stealing data and, later, openly harassing the government. Cylance first identified the intrusion in 2017 and says the hack may still pose a threat to the Pakistani government as well as others in the region.

The disclosure is concerning pertaining to a nuclear-armed nation like Pakistan, whose control over its arsenal of weapons has at times been a source of concern for Western leaders.
"It's a pivotal country not just in South Asia but in global affairs," says Kevin Livelli, director of threat intelligence for Cylance, citing Pakistan's role as a lynchpin in U.S.-led efforts to fight regional terrorist groups like the Taliban, al-Qaida and the Haqqani network. "In our judgment, targeting the military is also particularly concerning."

Spokespeople at the firm declined to say at this time which nation it believes sponsored the attack but said it was likely a country in the Middle East and one that seeks to emulate the cyberspace capabilities of the U.S. Livelli says he does not think that the perpetrator was the government of the U.S., Russia, China, North Korea, Iran, India, Israel, Great Britain, Canada, Australia or New Zealand – considered to be the world's most powerful cyber actors. Cylance also did not reveal any information about what it believes the hackers stole.

Cylance and other private security firms have previously helped detect and publicize the presence of high-profile hacker groups operating in a realm that governments rarely discuss voluntarily. In 2014 Cylance revealed information about an Iranian operation it said was in retaliation for Stuxnet, a virus believed to have been developed by the U.S. and Israel in the 2000s to sabotage Iran's burgeoning nuclear program. CyberStrike, a similar firm, detected a pro-Russian hacking group believed to have interfered in the 2016 and 2018 U.S. elections and coined the term Fancy Bear to refer to it.

Cylance said it shared information about the reported threat with counterparts in the U.S. government and with PakCERT, a non-governmental organization based in Karachi that, like other computer emergency response teams, is dedicated to identifying and protecting its country from cyberattacks.

In response to a request for comment, PakCERT in Pakistan did not officially confirm a cyberattack against the Pakistani military or government. U.S. intelligence agencies reached for comment did not immediately have information they could share. The Pakistani Embassy in Washington, D.C., did not immediately respond to requests for comment.

The reported attack comes at a precarious time for Pakistan, which resides in a dangerous neighborhood wedged between Afghanistan, Iran and India. The country is increasingly out of favor with the Trump administration and facing other recent high-profile cybersecurity threats. Cylance believes the attackers focused their attention on the air force because of its prominent role in the Pakistani government, including hosting its first cybersecurity center, launched earlier this year.
Livelli, a career investigator, says "a successful espionage operation targeting the Pakistani military would not just produce tactical and strategic insight into their operations but also into a range of other domestic and governmental concerns."

Pakistan's armed forces play an outsized role in its politics. Its powerful Inter-Services Intelligence or ISI, the Pakistan counterpart to the CIA, is deeply enmeshed in the civilian government and has waged multiple coups during its 70-year history.

Pakistan is also locked in a decades-old contest for regional influence with its rival and neighbor India. Prior U.S. administrations went to great lengths to maintain equal relations between the two countries for fear of upsetting a delicate, if imperfect, balance. These efforts took place despite concerns that elements of the Pakistan government reportedly turn a blind eye to or are even complicit in some activities of groups the U.S. considers terrorists operating in its rural northern reaches or along its border with Afghanistan and Iran.

The Trump administration, however, has taken a hard line against Islamabad, slashing billions in foreign military aid until such time it believes Pakistan is adequately cracking down on these groups. The Pentagon under Trump also took the bold step of renaming the integral military headquarters for the region, U.S. Pacific Command, as U.S. Indo-Pacific Command.

China took particular interest in Pakistan as a strategic partner in its "One Belt One Road" initiative to build trading infrastructure across the continent, though Islamabad has recently reconsidered the close partnership, according to some reports.

And reports persist that Pakistani scientists transferred centrifuge technology to North Korea in at least indirect support of Pyongyang's nuclear program.

Like other influential countries, many malicious hackers have an interest in attacking Pakistan.

"You can imagine the Pakistani government and its military networks, servers and computers are going to be targets, and they're going to be targeted by nation-state attackers," says Adam Segal, director of the Digital and Cyberspace Policy Program at the Council on Foreign Relations.

Cylance's work to identify a group it says carried out this attack does not mean that the same group was not already known and under surveillance by other firms or governments, perhaps under a different name.
Cybersecurity experts and U.S. officials specializing in the increasingly significant realm agree that attributing the source of an attack is one of the most difficult aspects of their work. Hackers worldwide have developed increasingly advanced tools to either mask their identity or make it appear as though a third party is to blame.

Officials at Cylance say the scale of this attack – espionage designed to steal sensitive Pakistani information – and the resources needed to carry it out show that it must have had support from a nation-state. It centered on a campaign of spear-phishing to gain access to secure computers, detailed reconnaissance to identify the anti-virus programs that the Pakistani servers were using and secretive loopholes that allowed the hackers to remain undetected.

However the campaign appeared to shift focus in 2017, the Cylance report says, when pre-programmed malware began automatically ceasing to evade the Pakistani anti-virus programs, openly calling attention to itself.

"It was like ringing the fire alarm," Livelli says. "They deliberately distracted attention and time and resources, and to confuse the victim into thinking something was wrong."

Other countries' assets in the region were targeted, the report claims, including China's.

Pakistan came under intense scrutiny this week following reports that most, if not all, of its banks were subject to a wide-scale security breach. PakCERT subsequently reported evidence of credit card-skimming, but not a massive data breach among Pakistan's financial institutions.
https://www.usnews.com/news/world/a...ir-force-government-hacked-by-foreign-country

middle east ? israel or some other ?
 
oh good that it was in 2017, or else some people would have blamed that on Imran Khan as well.
 
Well cyber attacks do happen. We still lack a dedicated cyber warfare command despite it's usefulness in today's global theatre and the threats we're facing.
 
The article specifically says it wasn't Israel or Iran. Didn't know Pakistan had other enemies in the Middle East.
 
It is true that Cyber, the fourth dimension, is the weakest link of our defense. Look what this report "The White Company Series: "Operation Shaheen" says:

It’s not hard to imagine why this has taken so long. In 70 years, the leaders of Pakistan have focused on a myriad of pressing existential threats, both from abroad (India) and within (coups, Kashmir, terrorism). To now focus on threats from advanced threat actors only increases their considerable burden. Yet, the stakes couldn’t be higher. The very threats that drive Pakistan’s near constant upheaval and distract from cyber operations also make it a prime target for threats from the cyber domain. This situation begs some difficult questions:
• Does the Pakistani government have the ability to defend itself, respond, or even identify the threat actors responsible for a cyber operation (be it espionage, sabotage, or coercion)?

• Can they effectively react if Pakistan’s military and/or nuclear weapons facilities are targeted?

• If not, what are the consequences? There are no easy answers — and that should concern us all.

For the more insular community of information security researchers, Operation Shaheen imparts some tough lessons.

https://www.cylance.com/content/dam...85.1945983700.1542081596-822762987.1542081596
 
Pak folks by nature don't put anything on black and white!!! 70% of the business transactions are done without any documentations whatsoever, according to the public accountants!!!! No wonder two thirds of the income generators are self employed!!!! If this is the case with the civilian folks, what chances are there for the strategic folks????? Hints: hidden Imam syndrome.....
 
Despite several incidents, we are still reluctant to pay attention to this issue. , Pakistan's ranking on the cybersecurity index says it all.
7c91fa3d83a0581e7cc263d5b20fbf36.jpeg
 

Country Latest Posts

Back
Top Bottom