{"id":234060,"date":"2017-08-11T15:07:29","date_gmt":"2017-08-11T19:07:29","guid":{"rendered":"http:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/uncategorized\/russian-group-that-hacked-dnc-used-nsa-attack-code-in-attack-on-hotels-ars-technica.php"},"modified":"2017-08-11T15:07:29","modified_gmt":"2017-08-11T19:07:29","slug":"russian-group-that-hacked-dnc-used-nsa-attack-code-in-attack-on-hotels-ars-technica","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/nsa-2\/russian-group-that-hacked-dnc-used-nsa-attack-code-in-attack-on-hotels-ars-technica.php","title":{"rendered":"Russian group that hacked DNC used NSA attack code in attack on hotels &#8211; Ars Technica"},"content":{"rendered":"<p><p>Enlarge \/ Part of a    booby-trapped Microsoft Word document that was sent to multiple    hotels. Once infected, computers would attempt to compromise    other computers connected to the same network.    <\/p>\n<p>    FireEye  <\/p>\n<p>    A Russian government-sponsored group accused of     hacking the Democratic National Committee last year has    likely been infecting other targets of interest with the help    of a potent Windows exploit developed by, and later stolen    from, the National Security Agency, researchers said Friday.  <\/p>\n<p>    Now, researchers at security firm FireEye say they're    moderately confident the Russian hacking group known as Fancy    Bear, APT 28, and other names has also used Eternal Blue, this    time in a campaign that targeted people of interest as they    connected to hotel Wi-Fi networks. In July, the campaign    started using Eternal Blue to spread from computer to computer    inside various staff and guest networks, company researchers    Lindsay Smith and Ben Read wrote in a     blog post. While the researchers didn't directly observe    those attacks being used to infect guest computers connected to    the network, they said a related campaign from last year used    the control of hotel Wi-Fi services to obtain login credentials    from guest devices.  <\/p>\n<p>    In the earlier attack, the APT 28 members used a hacking tool    dubbed Responder to monitor and falsify NetBIOS    communications passed over the infected networks.  <\/p>\n<p>    \"Responder masquerades as the sought-out resource and causes    the victim computer to send the username and hashed password to    the attacker-controlled machine,\" the FireEye researchers    wrote. \"APT 28 used this technique to steal usernames and    hashed passwords that allowed escalation of privileges in the    victim network.\" The researchers continued:  <\/p>\n<p>      In the 2016 incident, the victim was compromised after      connecting to a hotel Wi-Fi network. Twelve hours after the      victim initially connected to the publicly available Wi-Fi      network, APT28 logged into the machine with stolen      credentials. These 12 hours could have been used to crack a      hashed password offline. After successfully accessing the      machine, the attacker deployed tools on the machine, spread      laterally through the victim's network, and accessed the      victim's OWA account. The login originated from a computer on      the same subnet, indicating that the attacker machine was      physically close to the victim and on the same Wi-Fi network.    <\/p>\n<p>      We cannot confirm how the initial credentials were stolen in      the 2016 incident; however, later in the intrusion, Responder      was deployed. Since this tool allows an attacker to sniff      passwords from network traffic, it could have been used on      the hotel Wi-Fi network to obtain a users credentials.    <\/p>\n<p>    The attack observed in July used a modified version of Eternal    Blue that was created using the Python programming language and    later made publicly available, Fire Eye researchers said in an    e-mail. The Python implementation was then compiled into an    executable file using the publicly available py2exe tool.  <\/p>\n<p>    Fancy Bear used a spear phishing campaign to distribute a    booby-trapped Microsoft Word document to several unnamed    hotels, FireEye said. Once a computer was infected, it    attempted to infect other computers connected to the same Wi-Fi    network.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>See original here:<\/p>\n<p><a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/arstechnica.com\/information-technology\/2017\/08\/dnc-hackers-from-russia-used-nsa-developed-attack-code-in-attack-on-hotels\/\" title=\"Russian group that hacked DNC used NSA attack code in attack on hotels - Ars Technica\">Russian group that hacked DNC used NSA attack code in attack on hotels - Ars Technica<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Enlarge \/ Part of a booby-trapped Microsoft Word document that was sent to multiple hotels.  <a href=\"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/nsa-2\/russian-group-that-hacked-dnc-used-nsa-attack-code-in-attack-on-hotels-ars-technica.php\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"limit_modified_date":"","last_modified_date":"","_lmt_disableupdate":"","_lmt_disable":"","footnotes":""},"categories":[261463],"tags":[],"class_list":["post-234060","post","type-post","status-publish","format-standard","hentry","category-nsa-2"],"modified_by":null,"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/234060"}],"collection":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/comments?post=234060"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/234060\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/media?parent=234060"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/categories?post=234060"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/tags?post=234060"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}