• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
new findings challenge attribution in denmark's energy sector cyberattacks

New Findings Challenge Attribution in Denmark’s Energy Sector Cyberattacks

You are here: Home / General Cyber Security News / New Findings Challenge Attribution in Denmark’s Energy Sector Cyberattacks
January 14, 2024

The cyber attacks concentrating on the energy sector in Denmark previous calendar year may well not have had the involvement of the Russia-linked Sandworm hacking group, new conclusions from Forescout present.

The intrusions, which specific around 22 Danish energy corporations in May 2023, transpired in two distinct waves, 1 which exploited a security flaw in Zyxel firewall (CVE-2023-28771) and a abide by-on activity cluster that noticed the attackers deploy Mirai botnet variants on infected hosts by using an as-however-not known first access vector.

Cybersecurity

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


The first wave took spot on May 11, while the next wave lasted from May possibly 22 to 31, 2023. In just one this sort of attack detected on Might 24, it was observed that the compromised technique was speaking with IP addresses (217.57.80[.]18 and 70.62.153[.]174) that ended up beforehand employed as command-and-command (C2) for the now-dismantled Cyclops Blink botnet.

Denmark's Energy Sector Cyberattacks

Forescout’s nearer evaluation of the attack marketing campaign, however, has unveiled that not only were the two waves unrelated, but also unlikely the function of the state-sponsored group owing to the point the 2nd wave was portion of a broader mass exploitation marketing campaign in opposition to unpatched Zyxel firewalls. It is really at the moment not recognised who is behind the twin sets of attacks.

“The campaign described as the ‘second wave’ of attacks on Denmark, started out in advance of and ongoing right after [the 10-day time period], targeting firewalls indiscriminately in a really related manner, only transforming staging servers periodically,” the company stated in a report aptly titled “Clearing the Fog of War.”

Cybersecurity

There is proof to advise that the attacks may well have begun as early as February 16 applying other known flaws Zyxel gadgets (CVE-2020-9054 and CVE-2022-30525) together with CVE-2023-28771, and persisted as late as October 2023, with the exercise singling out various entities throughout Europe and the U.S.

“This is further more proof that exploitation of CVE-2023-27881, fairly than currently being confined to Danish critical infrastructure, is ongoing and targeting exposed devices, some of which just occur to be Zyxel firewalls safeguarding critical infrastructure organizations,” Forescout extra.

Identified this post intriguing? Stick to us on Twitter  and LinkedIn to study far more special content material we post.


Some parts of this short article are sourced from:
thehackernews.com

Previous Post: «critical rce vulnerability uncovered in juniper srx firewalls and ex Critical RCE Vulnerability Uncovered in Juniper SRX Firewalls and EX Switches
Next Post: DDoS Attacks on the Environmental Services Industry Surge by 61,839% in 2023 ddos attacks on the environmental services industry surge by 61,839%»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.