The cybercrime underground has fractured into pro-Ukraine and pro-Russia
camps, with the latter increasingly focused on critical national
infrastructure (CNI) targets in the West, according to a new report from Accenture.
埃森哲(Accenture)的一份新报告显示,地下网络犯罪已分裂为亲乌克兰和亲俄罗斯阵营,后者越来越关注西方的关键国家基础设施(CNI)目标。
The consulting giant’s Accenture Cyber Threat Intelligence (ACTI) arm
warned that the ideological schism could spell mounting risk for Western
organizations as pro-Kremlin criminal groups adopt quasi-hacktivist
tactics to choose their next victims.
这家咨询巨头的埃森哲(Accenture)网络威胁情报公司(ACTI)警告称,意识形态分歧可能意味着西方组织面临越来越大的风险,因为亲克里姆林宫的犯罪团伙采取了准黑客主义策略来选择他们的下一个受害者。
Organizations in the government, media, finance, insurance, utilities and
resources sectors should be braced for more attacks, said ACTI.
ACTI
表示,政府、媒体、金融、保险、公用事业和资源部门的组织应该准备好应对更多的攻击。
“This targeted intent has led some actors to exclusively sell their
services, such as network accesses, to pro-Russian actors; it has led
other actors to extend discounts to pro-Russian actors interested in
buying their accesses but has also caused those same actors to refrain
from selling accesses associated with Russian entities,” the report continued.
“这种有针对性的意图导致一些行为体专门向亲俄罗斯行为体出售其服务,比如网络访问;
它导致其他行为体向有兴趣购买访问权的亲俄罗斯行为体提供折扣,但也导致这些行为体不再出售与俄罗斯实体有关的访问权,”报告继续写道。
“Moreover, it is likely that pro-Russian actors are foregoing available
attacks against non-Western entities to centralize their focus and
resources.”
“此外,亲俄罗斯的行为者很可能放弃针对非西方实体的可用攻击,以集中其重点和资源。”
Attacks on CNI had fallen out of favor on the cybercrime underground after
high-profile outages at companies like Colonial Pipeline attracted the
attention of the US government. However, threat actors are now likely to
feel emboldened to go after such targets as they seek to punish ‘enemies
of Russia,’ according to ACTI.
由于 Colonial Pipeline 等公司的高调停运事件引起了美国政府的注意,针对 CNI
的攻击已经不再受到地下网络犯罪的青睐。然而,根据 ACTI
的说法,威胁行为者现在可能会更大胆地追击这些目标,因为他们试图惩罚“俄罗斯的敌人”。
It may also lead to a return of ransomware groups to the mainstream
underground after some admin forum administrators banned them following
the Colonial breach. This could further help them scale, acquire tools,
recruit affiliates and buy access, ACTI argued.
它也可能导致勒索软件集团回到主流地下后,一些管理论坛管理员禁止他们后,殖民地的破坏。ACTI
认为,这可以进一步帮助他们扩大规模、收购工具、招募分支机构和购买渠道。
However, it’s not all one-way traffic. The report cited a poll on one
forum asking if members were now prepared to attack Russia-aligned
Commonwealth of Independent States (CIS) countries. While 83% said no, a
surprisingly large 17% said they were, indicating pro-Ukraine sentiment.
然而,它并不都是单向的。这份报告引用了一个论坛上的民意调查,询问成员国现在是否准备攻击与俄罗斯结盟的独立国家联合体国家。虽然83%
的人说不,但令人惊讶的是,17% 的人说他们是,这表明了亲乌克兰的情绪。
One popular site, RaidForums, expressed its support for Ukraine and
promptly had its main domain seized.
一个受欢迎的网站,RaidForums,表达了对乌克兰的支持,并迅速占领了它的主要域名。
“Pro-Ukrainian actors are refusing to sell, buy, or collaborate with
Russian-aligned actors and are increasingly attempting to target Russian
entities in support of Ukraine,” ACTI said.
“亲乌克兰的行为者拒绝出售、购买或与俄罗斯联盟的行为者合作,并且越来越多地试图将俄罗斯实体作为支持乌克兰的目标,”ACTI
说。