Breaches by Iran-affiliated hackers spanned multiple US states, federal agencies say

This photo provided by the Municipal Water Authority of Aliquippa shows the screen of a Unitronics device that was hacked in Aliquippa, Pa., on Saturday, Nov. 25, 2023. (AP)
Short Url
Updated 03 December 2023
Follow

Breaches by Iran-affiliated hackers spanned multiple US states, federal agencies say

  • Since the beginning of the Israel-Hamas war, the group has expanded and accelerated targeting Israeli critical infrastructure, said Check Point’s Sergey Shykevich

HARRISBURG, Pennsylvania: A small western Pennsylvania water authority was just one of multiple organizations breached in the United States by Iran-affiliated hackers who targeted a specific industrial control device because it is Israeli-made, US and Israeli authorities say.
“The victims span multiple US states,” the FBI, the Environmental Protection Agency, the Cybersecurity and Infrastructure Security Agency, known as CISA, as well as Israel’s National Cyber Directorate said in an advisory emailed to The Associated Press late Friday.
They did not say how many organizations were hacked or otherwise describe them.
Matthew Mottes, the chairman of the Municipal Water Authority of Aliquippa, which discovered it had been hacked on Nov. 25, said Thursday that federal officials had told him the same group also breached four other utilities and an aquarium.
Cybersecurity experts say that while there is no evidence of Iranian involvement in the Oct. 7 attack into Israel by Hamas that triggered the war in Gaza they expected state-backed Iranian hackers and pro-Palestinian hacktivists to step up cyberattacks on Israeli and its allies in its aftermath. And indeed that has happened.
The multiagency advisory explained what CISA had not when it confirmed the Pennsylvania hack on Wednesday — that other industries outside water and water-treatment facilities use the same equipment — Vision Series programmable logic controllers made by Unitronics — and were also potentially vulnerable.
Those industries include “energy, food and beverage manufacturing and health care,” the advisory says. The devices regulate processes including pressure, temperature and fluid flow.
The Aliquippa hack promoted workers to temporarily halt pumping in a remote station that regulates water pressure for two nearby towns, leading crews to switch to manual operation. The hackers left a digital calling card on the compromised device saying all Israeli-made equipment is “a legal target.”
The multiagency advisory said it was not known if the hackers had tried to penetrate deeper into breached networks. The access they did get enabled “more profound cyber physical effects on processes and equipment,” it said.
The advisory says the hackers, who call themselves “Cyber Av3ngers,” are affiliated with Iran’s Islamic Revolutionary Guards Corps, which the US designated as a foreign terrorist organization in 2019. The group targeted the Unitronics devices at least since Nov. 22, it said.
An online search Saturday with the Shodan service identified more than 200 such Internet-connected devices in the US and more than 1,700 globally.
The advisory notes that Unitronics devices ship with a default password, a practice experts discourage as it makes them more vulnerable to hacking. Best practices call for devices to require a unique password to be created out of the box. It says the hackers likely accessed affected devices by “exploiting cybersecurity weaknesses, including poor password security and exposure to the Internet.”
Experts say many water utilities have paid insufficient attention to cybersecurity.
In response to the Aliquippa hack, three Pennsylvania congressmen asked the US Justice Department in a letter to investigate. Americans must know their drinking water and other basic infrastructure is safe from “nation-state adversaries and terrorist organizations,” US Sens. John Fetterman and Bob Casey and US Rep. Chris Deluzio said. Cyber Av3ngers claimed in an Oct. 30 social media post to have hacked 10 water treatment stations in Israel, though it is not clear if they shut down any equipment.
Since the beginning of the Israel-Hamas war, the group has expanded and accelerated targeting Israeli critical infrastructure, said Check Point’s Sergey Shykevich. Iran and Israel were engaged in low-level cyberconflict prior to the Oct. 7. Unitronics has not responded to the AP queries about the hacks.
The attack came less than a month after a federal appeals court decision prompted the EPA to rescind a rule that would have obliged USpublic water systems to include cybersecurity testing in their regular federally mandated audits. The rollback was triggered by a federal appeals court decision in a case brought by Missouri, Arkansas and Iowa, and joined by a water utility trade group.
The Biden administration has been trying to shore up cybersecurity of critical infrastructure — more than 80 percent of which is privately owned — and has imposed regulations on sectors including electric utilities, gas pipelines and nuclear facilities. But many experts complain that too many vital industries are permitted to self-regulate.

 


Taiwan police rule out ‘terrorism’ in metro stabbing

Updated 5 sec ago
Follow

Taiwan police rule out ‘terrorism’ in metro stabbing

  • Taiwan police on Sunday ruled out “terrorism” in a metro stabbing in the capital Taipei, where an attacker killed three and wounded 11
TAIPEI: Taiwan police on Sunday ruled out “terrorism” in a metro stabbing in the capital Taipei, where an attacker killed three and wounded 11.
A 27-year-old man, identified by police by his family name Chang, set off smoke bombs at Taipei Main Station metro on Friday afternoon before launching into a three hour stabbing spree.
The attacker then moved to a shopping district near Zhongshan station, authorities said.
“Based on what we have established so far in the investigation, the suspect Chang did not make or display any statements or views related to politics, religion, or any specific ideology, and we have preliminarily ruled out terrorism,” a senior Taipei City Police Department official told AFP, under the condition of anonymity.
“Terrorist attacks have a specific definition and the suspect does not meet that definition,” he added.
Taipei Mayor Chiang Wan-an said the suspect was found dead the same day, after jumping off a nearby building.
The senior police official said investigators also found searches for “random killings” on Chang’s iPad, including material related to a Taipei metro stabbing in 2014 when a man killed four people.
Chang had served in the military but was discharged over driving under the influence of alcohol, according to police, who said he was wanted after he failed to report for reserve military training.
Taiwan requires former soldiers to undergo seven to 14 days of reserve training within eight years of discharge. Failure to report is treated as evasion of military service.
In the immediate aftermath of the Friday stabbing, officials called the attack “deliberate” but said the motive was not clear.
Police said they believe Chang had acted alone and planned to “randomly kill people.” He rented an apartment in the district in January and scouted the area in advance.
The city doubled its police deployment for the Taipei Marathon on Sunday and is expected to conduct a “high-intensity” drill at metro stations ahead of New Year’s Eve, the mayor said.
Taiwan’s President Lai Ching-te said on Saturday that authorities should be “more cautious and proactive” and improve emergency protocols.
Lai said the police must be “trained and equipped for counter-terrorism operations” to protect citizens.
Metro Taipei announced that it had shut down a Christmas market near Zhongshan station on Saturday, which will remain closed for three days in honor of the victims.