ICS Forth more about the hack of Greek domains gr & el

We reported some time ago that hackers violated ICS-Forth. This is the company that manages the top-level domains of Greece, ie our well-known .gr and .el. According to the latest information from investigators involved in the case, the hackers are supported by a state,

ICS Forth, representing the Institute of Information Technology at the Institute of Technology and Research, has publicly acknowledged the security incident in emails sent to domain owners on April 19th.

The hackers behind the breach are the same group mentioned in a Cisco Talos post in April, called Sea Turtle.

The team uses a relatively new approach to breaking goals. Instead of targeting victims directly, they violate or gain access to domain registrars' accounts and thus manage DNS where they make changes to the settings.

By modifying DNS on internal servers, they redirect traffic from legitimate ones of a company or email services to perform man-in-the-middle attacks and collect login credentials.

ICS Forth
Image: Cisco Talos

Attacks are short-lived, lasting from hours to days. So they are extremely difficult to detect as most they do not track changes in DNS settings.

Reports on the activities of this group have been published from time to time by security groups FireEye, CrowdstrikeAnd Cisco Talos.. FireEye attributed the attacks to the Iranian government, while Crowdstrike and Cisco Talos have refrained from linking any governments to the attacks (until now). The American services US DHS and UK NCSC also issued security alerts for the group's new strategies.

From the above reports it appears that the Sea Turtle team usually breaches accounts with domain registrars and DNS providers, selecting after the breach accounts that belong to their targets.

In its first post, the Cisco Talos team reported that the Sea Turtle team crashed NetNod, an exchange node located in Sweden, which among other things offered DNS services for ccTLD organizations – such as the Greek ICS-Forth.

The ICS-Forth attack is still shrouded in mystery

Now, in one today's post, Talos researchers say Sea Trutle hackers did not leave ICS-Forth quickly.

Talos researchers have no details on what the hackers did to ICS Forth's network after gaining access to its systems. So no one knows which domains were affected by changes to DNS settings.

But Talos investigators said the hackers retained access for another five days after ICS Forth announced the incident.

It should be noted that the attack on ICS-Forth was not the only one by Sea Turtle. Talos reported that they also identified new victims in such as Sudan, Switzerland and the USA.

These targets - whose DNS settings have been modified so that hackers can block traffic and collect user credentials - are government agencies, power companies, think tanks, international NGOs and at least one airport.

______________

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.082 registrants.

Written by giorgos

George still wonders what he's doing here ...

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).