In a first, US blames Russia for cyberattacks on energy grid

(Shutterstuck image)
Updated 16 March 2018
Follow

In a first, US blames Russia for cyberattacks on energy grid

WASHINGTON: The Trump administration on Thursday blamed the Russian government for a campaign of cyberattacks stretching back at least two years that targeted the US power grid, marking the first time the United States has publicly accused Moscow of hacking into American energy infrastructure.
Beginning in March 2016, or possibly earlier, Russian government hackers sought to penetrate multiple US critical infrastructure sectors, including energy, nuclear, commercial facilities, water, aviation and manufacturing, according to a US security alert published Thursday.
The Department of Homeland Security and FBI said in the alert that a “multi-stage intrusion campaign by Russian government cyber actors” had targeted the networks of small commercial facilities “where they staged malware, conducted spear phishing, and gained remote access into energy sector networks.” The alert did not name facilities or companies targeted.
The direct condemnation of Moscow represented an escalation in the Trump administration’s attempts to deter Russia’s aggression in cyberspace, after senior US intelligence officials said in recent weeks the Kremlin believes it can launch hacking operations against the West with impunity.
It coincided with a decision Thursday by the US Treasury Department to impose sanctions on 19 Russian people and five groups, including Moscow’s intelligence services, for meddling in the 2016 US presidential election and other malicious cyberattacks. Russia in the past has denied it has tried to hack into other countries’ infrastructure, and vowed on Thursday to retaliate for the new sanctions.

’Unprecedented and extraordinary’
US security officials have long warned that the United States may be vulnerable to debilitating cyberattacks from hostile adversaries. It was not clear what impact the attacks had on the firms that were targeted.
But Thursday’s alert provided a link to an analysis by the US cybersecurity firm Symantec last fall that said a group it had dubbed Dragonfly had targeted energy companies in the United States and Europe and in some cases broke into the core systems that control the companies’ operations.
Malicious email campaigns dating back to late 2015 were used to gain entry into organizations in the United States, Turkey and Switzerland, and likely other countries, Symantec said at the time, though it did not name Russia as the culprit.
The decision by the United States to publicly attribute hacking attempts of American critical infrastructure was “unprecedented and extraordinary,” said Amit Yoran, a former US official who founded DHS’s Computer Emergency Response Team.
“I have never seen anything like this,” said Yoran, now chief executive of the cyber firm Tenable, said.
A White House National Security Council spokesman did not respond when asked what specifically prompted the public blaming of Russia. US officials have historically been reluctant to call out such activity in part because the United States also spies on infrastructure in other parts of the world.
News of the hacking campaign targeting US power companies first surfaced in June in a confidential alert to industry that described attacks on industrial firms, including nuclear plants, but did not attribute blame.
“People sort of suspected Russia was behind it, but today’s statement from the US government carries a lot of weight,” said Ben Read, manager for cyber espionage analysis with cybersecurity company FireEye Inc.

Engineers targeted
The campaign targeted engineers and technical staff with access to industrial controls, suggesting the hackers were interested in disrupting operations, though FireEye has seen no evidence that they actually took that step, Read said.
A former senior DHS official familiar with the government response to the campaign said that Russia’s targeting of infrastructure networks dropped off after the publication in the fall of Symantec’s research and an October government alert, which detailed technical forensics about the hacking attempts but did not name Russia.
The official declined to say whether the campaign was still ongoing or provide specifics on which targets were breached, or how close hackers may have gotten to operational control systems.
“We did not see them cross into the control networks,” DHS cybersecurity official Rick Driggers told reporters at a dinner on Thursday evening.
Driggers said he was unaware of any cases of control networks being compromised in the United States and that the breaches were limited to business networks. But, he added, “We know that there is intent there.”
It was not clear what Russia’s motive was. Many cybersecurity experts and former US officials say such behavior is generally espionage-oriented with the potential, if needed, for sabotage.
Russia has shown a willingness to leverage access into energy networks for damaging effect in the past. Kremlin-linked hackers were widely blamed for two attacks on the Ukrainian energy grid in 2015 and 2016, that caused temporary blackouts for hundreds of thousands of customers and were considered first-of-their-kind assaults.
Senator Maria Cantwell, the top Democrat on the Senate Energy and Natural Resources Committee, asked the Trump administration earlier this month to provide a threat assessment gauging Russian capabilities to breach the US electric grid.
It was the third time Cantwell and other senators had asked for such a review. The administration has not yet responded, a spokesman for Cantwell’s office said on Thursday.
Last July, there were news reports that the Wolf Creek Nuclear Operating Corp, which operates a nuclear plant in Kansas, had been targeted by hackers from an unknown origin.
Spokeswoman Jenny Hageman declined to say at the time if the plant had been hacked but said that there had been no operational impact to the plant because operational computer systems were separate from the corporate network. Hageman on Thursday said the company does not comment on security matters.
John Keeley, a spokesman for the industry group the Nuclear Energy Institute, said: “There has been no successful cyberattack against any US nuclear facility, including Wolf Creek.”


In rare overlap, Chinese Muslims observe Ramadan with Lunar New Year

Updated 6 sec ago
Follow

In rare overlap, Chinese Muslims observe Ramadan with Lunar New Year

  • Lunar New Year started on Feb. 17 and is celebrated for another two weeks
  • Chinese Indonesians make up about 3 percent of the Indonesian population

JAKARTA: Every year, on the first day of Lunar New Year, Febriani visits relatives and gathers for a feast with her Chinese Muslim family, part of a long-standing tradition honoring their ethnic heritage.

But this year, as Thursday marks the beginning of Ramadan, she is celebrating two important occasions within the same week, in a rare overlap that last took place in 1995.

“I’m very happy and grateful that Lunar New Year and Ramadan are celebrated so closely. I observe both every year, so it’s truly special,” she told Arab News.

Widely observed across Asia, the Lunar New Year or Chinese New Year festival is believed to date back to the 14th century B.C., to the times of the Shang Dynasty, China’s earliest ruling dynasty, when people celebrated good harvests.

In 2026, it started on Feb. 17 and is celebrated for another two weeks. For many, celebrations typically involve elaborate feasts, giving children pocket money in red envelopes, and watching dragon dance parades.

In Indonesia, Chinese-descent citizens make up an estimated 3 percent of the country’s Muslim-majority population of more than 280 million. While most are either Buddhists or Christians, a small minority professes Islam.

For 25-year-old Febriani, both Lunar New Year and Ramadan are equally meaningful.

“The two celebrations teach us to strengthen bonds, to share with one another, and to become closer to family,” she said.

“They are both important to me because they happen only once every year and they’re always an occasion to gather with the extended family. It is also a chance to self-reflect and strengthen relationships with your loved ones.”

For Naga Kunadi, whose family lives in Central Java’s Cepu district, Chinese New Year is all about embracing his ethnic identity.

Earlier in the week, his family was busy preparing for the new year’s feast, which was a fusion of Chinese and Indonesian dishes, such as claypot tofu, meatball soup and shumai, or steamed dumplings.

“To celebrate Chinese New Year, we prepared halal Chinese food at home. It’s also a way to introduce to my children the traditions from our Chinese side, but there’s a bit of a fusion because my wife is Javanese,” Kunadi told Arab News.

Kunadi, an Islamic teacher at the Lautze Mosque in Jakarta, sees both Chinese New Year and Ramadan as opportunities to teach important life values for his two children. 

Upholding Chinese New Year traditions with his family is for him a way of preserving his ethnic heritage.

“We want to preserve cultural values as long as it does not clash with our religion,” he said.

“If we leave our culture behind, we might lose our identity, so this is something I want to teach my children.”

The fasting month of Ramadan, on the other hand, gives him a chance to teach and practice honesty.

“I want to focus on the religious and moral aspects during the holy month of Ramadan, when we practice honesty on a personal level,” Kunadi said.

“There’s always an opportunity to eat or snack in secret without anybody knowing, but we train ourselves not to do that. For me, Ramadan is a time for everyone to put honesty into practice, including myself and my children.”