Search This Blog

Powered by Blogger.

Blog Archive

Labels

Footer About

Footer About

Labels

Showing posts with label Norwegian Authority. Show all posts

Pro-Russian Hackers Breach Norwegian Dam Systems

 


The Norwegian authorities have confirmed, in a development that illustrates the escalation of cyber threats on Europe's critical infrastructure, that pro-Russian hackers sabotaged a dam in April, affecting water flow for a short period of time. A remote control system linked to the dam's valve was broken in by attackers, according to the Norwegian Police Security Service (PST), which opened it for four hours after a remote attacker infiltrated the system. 

Officials say the incident was not dangerous to nearby communities, but it is part of a broader pattern of hostile cyber activity by Russia and its proxies since the invasion of Ukraine, according to officials. It has been reported that these intrusions are becoming increasingly used against Western nations as a means of spreading fear and unrest due to their increased involvement in cyber warfare. 

More than 70 incidents across Europe, ranging from cyberattacks, vandalism, arson, and attempted assassinations, have been documented by the Associated Press, which Western intelligence services have condemned as “reckless” and warned that these incidents are becoming increasingly violent. As of April 7, Norwegian authorities are now formally linking such an event to Russia, making it the first time such an attack was linked to Russia formally. 

During the intrusion, hackers gained control of a dam in Bremanger, western Norway, manipulating its systems to open a floodgate and release water at a rate of 500 litres per second. The operation continued for roughly four hours before being detected and halted. Officials confirmed that, while the surge did not pose an immediate danger to surrounding areas, the deliberate act underscored the growing vulnerability of essential infrastructure to state-linked cyber operations. 

Various Norwegian security officials have expressed concern that these incidents are a reflection of Russia's hybrid warfare campaign against Western nations, as well as a broader strategy of hybrid warfare waged against them. It has been reported to VG that cyberattacks are on the rise, often not to cause immediate damage, but rather to demonstrate the attackers' capabilities. She cautioned Norway to be on the lookout for more attempts of this type in the future.

A Norwegian intelligence service head, Nils Andreas Stensnes, has also expressed concern about this issue, stating that Russia is considered the greatest threat to the country's security. This particular dam was targeted in April, and is situated about 150 kilometres north of Bergen; and it does not produce energy. According to local media reports, the breach may have been facilitated by a weak password, which allowed the hackers to manipulate the system. 

There is a resemblance between the incident and a January 2024 cyberattack on a Texas water plant that was also linked to Kremlin-backed actors and resulted in an overflow as a result. As it stands, Bremanger's sabotage fits within a pattern that Western officials attribute to Russia as a source of disruptive activity across Europe. 

Over 70 such incidents, including vandalism and arson as well as attempted assassinations, have been documented by the Associated Press, describing them as "reckless" since the Russian invasion of Ukraine in 2015. There is a growing concern among intelligence agencies that these operations are becoming increasingly violent as time goes by. 

Hackers gained access to the dam's digital control system in April and managed to remotely increase water flow for approximately four hours without the threat of immediate danger to those around the dam. In the opinion of police attorney Terje Nedreb Michelsen, it appears that a three-minute video was circulated through Telegram of the control panel on the dam, which is emblazoned with the symbols of a pro-Russian cybercriminal group. 

It is worth noting that similar footage has appeared on social media in the past, but Norwegian police believe this is the first time in history that a pro-Russian hacker has succeeded in compromising critical water infrastructure since 2022. In analysing the incident, analysts note that cyber conflict is evolving in a way that underscores the fact that critical infrastructure, even when not directly connected to national energy grids or defence systems, is becoming an increasingly symbolic target in geopolitical conflicts. 

It is possible for hostile actors to disproportionately damage physical equipment by exploiting outdated security measures or inadequate access controls. It has been stated by experts that, as digital systems control water resources, transportation networks, and industrial facilities become more interconnected, the risk of coordinated multi-target attacks increases. 

Norway's case also illustrates how small nations face challenges when it comes to deterring and responding to cyber attacks by state-backed adversaries with vast resources and operational reach, in addition to the challenges they face. In such environments, security strategists contend that to strengthen cybersecurity, not only must people upgrade technology, but they also need to work closely with intelligence agencies, private operators, and international allies to share threat intelligence and coordinate defensive measures to protect themselves from threats. 

Although the Bremanger intrusion has been contained, it serves as a sober reminder that modern conflicts increasingly play out on the networks and control panels of civilian infrastructure and represent a frontline of conflict in the modern age.

Norwegian Authority Recovers Crypto Stolen in the North Korea Based Axie Heist


Civil authorities in Norway have announced this Thursday that they have recovered $5.9 million worth cryptocurrency. This enormous amount of crypto was apparently stolen in the Axie Infinity hack, largely believed to have been caused by the Lazarus Group, which as its ties to North Korea. 

According to the Norwegian National Authority of Investigation and Prosecution of Economic and Environmental Crime (Økokrim), this seizure is the largest-ever cryptocurrency-related money seizure ever made by Norway. 

"Økokrim are experts at following the money. This case shows that we are also good at following the money on the blockchain even though criminals use advanced techniques to avoid detection," says Marianne Bender, a senior public prosecutor. 

The firm added that that it would work in collaboration with Sky Mavis, owner of Axie Infinity game in order to get the funds back to its victims. 

Axie Infinity gives players the chance to win Ethereum. Its "flagship offering," according to Sky Mavis, is the "#1 game on Ethereum by daily, weekly, and monthly active players. 

Attackers who had access to five out of the nine private keys used by the transaction validators for Ronin Network, the Ethereum-based DeFi decentralized finance platform utilized by Sky Mavis, were able to steal $620 million in March 2022. The game, publisher describes its Ronin side chain as "a tool that allows game developers to deliver the benefits of blockchain to their players without any of the complications.

"Upon gaining access to the organization, the attackers approved cryptocurrency transactions and started promptly transferring the funds through the Ethereum-based cryptocurrency mixer Tornado Cash, which is currently the target of US sanctions. In September 2022, around $30 million worth of illicit proceeds were discovered and seized by US officials. 

The FBI and Økokrim allegedly collaborated to recover an additional $5.9 million. "This is money that can be used to finance the North Korean regime and their nuclear weapons program. It has therefore been important to trace the cryptocurrency and try to stop the assets from being converted into regular currency," explained Bender. 

More Crypto Comeuppance 

Cryptocurrency thieves with ties to the Korean peninsula had a tough day on Thursday. The same day, Terraform Labs and its wanted fugitive chief, South Korean national Do Kwon, were accused of scamming investors by the US Securities and Exchange Commission (SEC). 

"We allege that Terraform and Do Kwon failed to provide the public with full, fair, and truthful disclosure as required for a host of crypto asset securities, most notably for LUNA and Terra USD[…]We also allege that they committed fraud by repeating false and misleading statements to build trust before causing devastating losses for investors," says SEC chairman Gary Gensler. 

Moreover, the collapse of Terraform Labs' TerraUSD “stablecoin” and linked “Luna” tokens sparked the so called “crypto winter.” Since the cryptocurrency's value was tied to the US dollar, the crash was portrayed as being impossibly unlikely. But, that was not the case, and as a result, a lot of investors lost a loads of money. 

Apparently, Kwon has fled with the last known address in Singapore. While, the city-state claims he left the island in September 2022. His passport was revoked by the South Korean government and he has since been added to Interpol's Red Notice list. 

While this is going on, Terraform Labs continues announcing new findings as if it had not nearly brought about the end of the world. With its TerraLuna ecosystem, it introduced a decentralized automation layer function yesterday.