Russian Hacking Group is Targeting Corporate IoT Devices, Microsoft Researchers Say

Russian Hacking Group is Targeting Corporate IoT Devices, Microsoft Researchers Say

The state-sponsored hackers, best known as Fancy Bear, attempted to compromise popular IoT devices like office printers and a VOIP phone.

A state-sponsored Russian hacking group is targeting IoT devices as a strategy to breach corporate networks, Microsoft revealed in a Monday blog post.

The security threats were first noted in April by security researchers working for the Microsoft Threat Intelligence Center, a cybersecurity unit of the company. Further research by the group found that the “known adversary” was attempting to compromise popular IoT devices, including a VOIP phone, an office printer and a video decoder, according to the post.

“The investigation uncovered that an actor had used these devices to gain initial access to corporate networks,” the post reads. “These devices became points of ingress from which the actor established a presence on the network and continued looking for further access.”

The hacking group is identified by Microsoft as Strontium, but it is also known by the names APT28 and Fancy Bear. Strontium was previously involved in the hack of the Democratic National Committee during the 2016 election cycle and has been identified by U.S. intelligence officials as a unit of the Russian military intelligence agency GRU, ZDNet reported.

Because the company identified and blocked the attacks so early, the researchers said they were not able to “conclusively determine” what the hackers’ ultimate objectives were in carrying out the breaches.

Read more: IoT Security: Current Threats and How to Overcome Them

In the last 12 months, Microsoft has delivered nearly 1,400 notifications to those who have been targeted or compromised by the hacking group. The researchers also notified the manufacturers of the products that were compromised, prompting the companies to consider additional security measures, according to the blog post.

“One in five notifications of STRONTIUM activity were tied to attacks against non-governmental organizations, think tanks, or politically affiliated organizations around the world,” the researchers wrote, adding that the remaining 80 percent largely targeted organizations in government, military, medicine and education, among others. Olympic organizing committees and anti-doping agencies were also among the victims.

The research team said they were sharing information about the breaches to raise awareness of IoT security risks and issue a call to action regarding the enterprise integration of IoT devices. In their post, the researchers note that the number of deployed IoT devices outnumber the combined total of personal computers and mobile phones.

“With each networked IoT device having its own separate network stack, it’s quite easy to see the need for better enterprise management, especially in today’s ‘bring your own device’ world,” the post reads. “These simple attacks taking advantage of weak device management are likely to expand as more IoT devices are deployed in corporate environments.”

Microsoft’s recommendations for securing enterprise IoT devices include developing custom security policies on each IoT device, using a separate network for those devices if feasible, and monitoring devices for abnormal behavior.

About the Author

Haley Samsel is an Associate Content Editor for the Infrastructure Solutions Group at 1105 Media.

Featured

New Products

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation.

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings.

  • ResponderLink

    ResponderLink

    Shooter Detection Systems (SDS), an Alarm.com company and a global leader in gunshot detection solutions, has introduced ResponderLink, a groundbreaking new 911 notification service for gunshot events. ResponderLink completes the circle from detection to 911 notification to first responder awareness, giving law enforcement enhanced situational intelligence they urgently need to save lives. Integrating SDS’s proven gunshot detection system with Noonlight’s SendPolice platform, ResponderLink is the first solution to automatically deliver real-time gunshot detection data to 911 call centers and first responders. When shots are detected, the 911 dispatching center, also known as the Public Safety Answering Point or PSAP, is contacted based on the gunfire location, enabling faster initiation of life-saving emergency protocols.