Start your day with intelligence. Get The OODA Daily Pulse.

Information Warfare, Social Engineering, and Ransomware: A Global Situational Awareness and Threat Vector Survey

As we slide into the end of summer weekend in the U.S., we take a “bird’s eye” view of the high-threat level created by the 2024 U.S. Presidential Election.  In this post: a situational awareness and threat vector survey of information warfare, social engineering, and ransomware incidents and activities worldwide as of Friday, August 30, 2024 – including a very recent joint Cybersecurity advisory from the Federal Bureau of Investigation (FBI), Multi-State Information Sharing and Analysis Center (MS-ISAC), and Department of Health and Human Services (HHS) and context on the recent arrest of the Telegram CEO.  

Ransomware

CISA and Partners Release Advisory on RansomHub Ransomware

CISA—in partnership with the Federal Bureau of Investigation (FBI), Multi-State Information Sharing and Analysis Center (MS-ISAC), and Department of Health and Human Services (HHS)—released a joint Cybersecurity Advisory, #StopRansomware: RansomHub Ransomware. This advisory provides network defenders with indicators of compromise (IOCs), tactics, techniques, and procedures (TTPs), and detection methods associated with RansomHub activity identified through FBI investigations and third-party reporting as recently as August 2024.

RansomHub is a ransomware-as-a-service variant—formerly known as Cyclops and Knight—which has recently attracted high-profile affiliates from other prominent variants such as LockBit and ALPHV.

For a full pdf version of the joint advisory, go to this link.

More on the global ransomware epidemic:

Cognitive Infrastructure

Human Targeting/Social Engineering/Cyber Espionage

Information Warfare

The Record | Telegram CEO’s arrest sparks flurry of questions over motivation, privacy impact

When Eva Galperin heard that Pavel Durov, the founder of the popular messaging service Telegram, was arrested in Paris over the weekend, she quickly got in touch with French privacy and legal experts. Galperin, the director of cybersecurity at the Electronic Frontier Foundation and a prominent digital freedoms advocate said her immediate fear was that the French government was trying to crack down on how Telegram treats end-to-end encryption. Why it matters:

  1. Questioning the motives behind the arrest: Much debate has been sparked about the real reasons behind the arrest of Pavel Durov, founder of Telegram. Reports suggest that the arrest links to issues with data encryption methods used by the app, potentially indicating a broader crackdown on digital encryption. However, further information suggests that the charges may only relate to standard statutory paperwork issues. The reasons for the arrest thus remain obscure and disputed.
  2. Implications for moderation strategies and free speech: The arrest has ignited a debate about the responsibility of platform CEOs in content moderation. While some believe that a lax approach might foster illegal activities on the app, others argue that stricter moderation infringes on the right to free speech. The unclear situation has put digital freedom advocates in a difficult situation as they navigate between supporting civil liberties and ensuring the safety of online spaces.
  3. Possible impact on future government intervention and civil liberties: The incident brings attention to potential heavy-handed approaches by governments, which could use the arrest as a catalyst for punitive action against digital platforms, thereby threatening civil liberties and privacy rights. As such cases propel governments to assert more control over digital platforms, the arrest raises crucial questions about how these platforms and their users’ rights should be protected.

Mis-, Dis- information, Information Disorder

  • In June, Clint Watts – General Manager, Microsoft Threat Analysis Center provided a case study of how “Russia [was] ramping up malign disinformation campaigns against France, French President Emmanuel Macron, the International Olympic Committee (IOC), and this summer’s Olympic Games in Paris. While Russia has a decades-long history of targeting the Olympic Games, the Microsoft Threat Analysis Center (MTAC) has observed old tactics blending with artificial intelligence (AI) in malign activity that may intensify as the 2024 Paris Opening Ceremony approaches. These operations have two principal aims: 1) Denigrate the reputation of the IOC; and 2) Create the expectation of violence breaking out in Paris at the Games.  Several prolific Russian influence actors, which Microsoft tracks as Storm-1679 and Storm-1099, have pivoted their operations since June 2023 to focus on the Olympics.”  These insights are detailed in a special Microsoft Threat Intelligence report published today: “Russian Influence Efforts Converge on 2024 Paris Olympic Games.”
  • In July, FBI cyber-cops zapped ~1K Russian AI disinfo Twitter bots.
  • The WP reports that Iran’s PressTV and Russian outlets paid U.S. contributors who also run Grayzone,  “Experts say an overlap in funding underscores concern that the spread of falsehoods and propaganda online is entering a more complicated stage as the November election draws closer.  A top editor at an online news site aimed at Americans who has worked extensively for Russia’s Sputnik also has taken money from Iranian government-owned media, according to newly unearthed documents — a sign of how widening geopolitical alliances are making it harder to identify and trace foreign influence operations.

IT Supply Chain Disruption

Global Election Security and Integrity

The different election attack types and the threat they present (courtesy of Mandiant)

The different nations and the groups that further their causes (image courtesy Mandiant)

Additional OODA Loop Resources

For our News Briefs and Original Analysis research efforts to date on this topic, go to:

https://oodaloop.com/archive/2024/08/27/leaving-our-nation-vulnerable-to-cyber-invasion-volt-typhoons-recent-zero-day-attack-on-u-s-internet-providers/

Microsoft, CISA, NSA, FBI, and the Five Eyes on the PRC’s Advanced Persistent Threat: Volt Typhoon:  OODA Loop Contributor Emilio Iasiello provided the initial coverage of a “cluster of activity” linked to China, targeting networks across U.S. critical infrastructures and Guam:  Chinese Cyber Activities Against Critical Infrastructure Raises the Stakes in U.S.-China Relations.   As is always the case with Emilio’s weekly contribution here at OODA Loop, it is worth a read.  The advisory referenced by Emilio –  entitled People’s Republic of China State-Sponsored Cyber Actor Living off the Land to Evade Detection – dovetails with our analysis in April of the State Department turning its strategic focus towards cyber-threat vectors in Guam, Albania, and Costa Rica.

Chinese Cyber Activities Against Critical Infrastructure Raises the Stakes in U.S.-China Relations:  On May 24, 2023, the U.S. Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA), as well as the Five Eyes, issued advisories on a “cluster of activity” linked to China that has been targeting networks across U.S. critical infrastructures and Guam.  Dubbed VOLT TYPHOON, the activity has been occurring since at least 2021 according to Microsoft, who appears to have been on the forefront of reporting this activity to the U.S. government, and per its May 24 release, and has since notified private sector organizations of the threat.  Activity exhibited during the campaign indicated that the actors focused on sustained cyber espionage as opposed to more disruptive attacks, and targeted organizations in the communications, construction, education, government, information technology, manufacturing, maritime, transportation, and utility sectors.  Once gaining initial access, these actors stole credentials in order to try to gain entry into other systems.

Cyber Risks

Corporate Board Accountability for Cyber Risks: With a combination of market forces, regulatory changes, and strategic shifts, corporate boards and directors are now accountable for cyber risks in their firms. See: Corporate Directors and Risk

Geopolitical-Cyber Risk Nexus: The interconnectivity brought by the Internet has caused regional issues that affect global cyberspace. Now, every significant event has cyber implications, making it imperative for leaders to recognize and act upon the symbiosis between geopolitical and cyber risks. See The Cyber Threat

Ransomware’s Rapid Evolution: Ransomware technology and its associated criminal business models have seen significant advancements. This has culminated in a heightened threat level, resembling a pandemic’s reach and impact. Yet, there are strategies available for threat mitigation. See: Ransomware, and update.

Challenges in Cyber “Net Assessment”: While leaders have long tried to gauge both cyber risk and security, actionable metrics remain elusive. Current metrics mainly determine if a system can be compromised without guaranteeing its invulnerability. It’s imperative not just to develop action plans against risks but to contextualize the state of cybersecurity concerning cyber threats. Despite its importance, achieving a reliable net assessment is increasingly challenging due to the pervasive nature of modern technology. See: Cyber Threat

Recommendations for Action

Decision Intelligence for Optimal Choices: Numerous disruptions complicate situational awareness and can inhibit effective decision-making. Every enterprise should evaluate its data collection methods, assessment, and decision-making processes for more insights: Decision Intelligence.

Proactive Mitigation of Cyber Threats: The relentless nature of cyber adversaries, whether they are criminals or nation-states, necessitates proactive measures. It’s crucial to remember that cybersecurity isn’t solely the IT department’s or the CISO’s responsibility – it’s a collective effort involving the entire leadership. Relying solely on governmental actions isn’t advised given its inconsistent approach towards aiding industries in risk reduction. See: Cyber Defenses

The Necessity of Continuous Vigilance in Cybersecurity: The consistent warnings from the FBI and CISA concerning cybersecurity signal potential large-scale threats. Cybersecurity demands 24/7 attention, even on holidays. Ensuring team endurance and preventing burnout by allocating rest periods are imperative. See: Continuous Vigilance

Embracing Corporate Intelligence and Scenario Planning in an Uncertain Age: Apart from traditional competitive challenges, businesses also confront unpredictable external threats. This environment amplifies the significance of Scenario Planning. It enables leaders to envision varied futures, thereby identifying potential risks and opportunities. Regardless of their size, all organizations should allocate time to refine their understanding of the current risk landscape and adapt their strategies. See: Scenario Planning

Daniel Pereira

About the Author

Daniel Pereira

Daniel Pereira is research director at OODA. He is a foresight strategist, creative technologist, and an information communication technology (ICT) and digital media researcher with 20+ years of experience directing public/private partnerships and strategic innovation initiatives.