{"id":211607,"date":"2017-08-14T11:56:55","date_gmt":"2017-08-14T15:56:55","guid":{"rendered":"http:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/russian-hackers-used-leaked-nsa-hacking-tool-to-spy-on-hotel-guests-cso-online\/"},"modified":"2017-08-14T11:56:55","modified_gmt":"2017-08-14T15:56:55","slug":"russian-hackers-used-leaked-nsa-hacking-tool-to-spy-on-hotel-guests-cso-online","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/nsa-2\/russian-hackers-used-leaked-nsa-hacking-tool-to-spy-on-hotel-guests-cso-online\/","title":{"rendered":"Russian hackers used leaked NSA hacking tool to spy on hotel guests &#8211; CSO Online"},"content":{"rendered":"<p><p>        Ms. Smith (not her real name) is a freelance writer and        programmer with a special and somewhat personal interest in        IT privacy and security issues.      <\/p>\n<p>          Your message has been sent.        <\/p>\n<p>          There was an error emailing this page.        <\/p>\n<p>      A Russian government-sponsored cyber-espionage group has been      accused of using a leaked NSA hacking tool in attacks against      one Middle Eastern and at least seven European hotels in      order to spy on guests.    <\/p>\n<p>      Why reinvent the wheel, or a hacking tool, when the NSA      created such an effective one? The NSAs EternalBlue was      leaked online by the Shadow Brokers in April. Now the      security firm FireEye says it has a moderate confidence      that Fancy Bear, or APT28, the hacking group linked to the      Russian government and accused of       hacking the Democratic National Committee last year,      added EternalBlue to its arsenal in order to spy on and to      steal credentials from guests at European and Middle Eastern      hotels.    <\/p>\n<p>      In a campaign aimed at the hospitality industry, attackers      leveraged a malicious document in spear-phishing emails. The      hostile hotel form, which Microsoft      Threat Intelligence Center General Manager John Lambert      tweetedabout in July, appeared to be a hotel reservation      document. If macros were allowed to run on the computers used      by the hotel employees who opened it, then Fancy Bears      Gamefish malware would be installed.    <\/p>\n<p>      Fancy Bear, according to a report by FireEye, used novel techniques      involving the EternalBlue exploit and the open-source tool      Responder to spread laterally through networks and likely      target travelers. Once inside the network of a hospitality      company, APT28 sought out machines that controlled both guest      and internal Wi-Fi networks.    <\/p>\n<p>      The Gamefish malware would download and run EternalBlue to      spread to computers that were connected to corporate and      guest Wi-Fi networks. After gaining access, Fancy Bear      deployed Responder, which listens for broadcasts      from victim computers attempting to connect to network      resources. Responder, FireEye explained, masquerades as the      sought-out resource and causes the victim computer to send      the username and hashed password to the attacker-controlled      machine.    <\/p>\n<p>      Its definitely a new technique for Fancy Bear, FireEyes cyber-espionage researcher Ben Read      told Wired. Its a much more passive way to collect on      people. You can just sit there and intercept stuff from the      Wi-Fi traffic.    <\/p>\n<p>      While FireEye didnt observe business travelers credentials      being stolen via hotel Wi-Fi networks in July, the security      firm cited a similar hotel attack by Fancy Bear in 2016.    <\/p>\n<p>        In the 2016 incident, the victim was compromised after        connecting to a hotel Wi-Fi network. Twelve hours after the        victim initially connected to the publicly available Wi-Fi        network, APT28 logged into the machine with stolen        credentials. These 12 hours could have been used to crack a        hashed password offline. After successfully accessing the        machine, the attacker deployed tools on the machine, spread        laterally through the victim's network, and accessed the        victim's OWA account. The login originated from a computer        on the same subnet, indicating that the attacker machine        was physically close to the victim and on the same Wi-Fi        network.      <\/p>\n<p>      The latest hotel attacks, FireEye added, are \"the first time      we have seen APT28 incorporate this exploit [EternalBlue]      into their intrusions. While the investigation is still      going on, FireEye told Reuters it is moderately      confident that Fancy Bear is behind the attacks. We just      don't have the smoking gun yet.    <\/p>\n<p>      The targeted hotels were not named, but they were described      as the type where valuable guests would stay. FireEye told      Wired, These were not super expensive places, but also not      the Holiday Inn. Theyre the type of hotel a distinguished      visitor would stay in when theyre on corporate travel or      diplomatic business.    <\/p>\n<p>      FireEye wants travelers, such as business and government      personnel, to be aware of the threats like having their      information and credentials passively collected when      connecting to a hotels Wi-Fi. While traveling abroad,      high-value targets should take extra precautions to secure      their systems and data. Publicly accessible Wi-Fi networks      present a significant threat and should be avoided whenever      possible.    <\/p>\n<p>      Wired suggested the safest approach for travelers is to bring      their own hotspot and altogether skip connecting to the      hotels Wi-Fi.    <\/p>\n<p>        Ms. Smith (not her real name) is a freelance writer and        programmer with a special and somewhat personal interest in        IT privacy and security issues.      <\/p>\n<p>    Sponsored Links  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Read more:<br \/>\n<a target=\"_blank\" href=\"http:\/\/www.csoonline.com\/article\/3215189\/security\/russian-hackers-used-nsa-s-leaked-eternalblue-exploit-to-spy-on-hotel-guests.html\" title=\"Russian hackers used leaked NSA hacking tool to spy on hotel guests - CSO Online\">Russian hackers used leaked NSA hacking tool to spy on hotel guests - CSO Online<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Ms.  <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/nsa-2\/russian-hackers-used-leaked-nsa-hacking-tool-to-spy-on-hotel-guests-cso-online\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":8,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[94881],"tags":[],"class_list":["post-211607","post","type-post","status-publish","format-standard","hentry","category-nsa-2"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/211607"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=211607"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/211607\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=211607"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=211607"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=211607"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}