• We’re Hiring
  • Request Demo
  • Support
  • Login
  • Product keyboard_arrow_down
  • Solutions keyboard_arrow_down
  • Customers
  • Partners
  • Blog
  • Resources keyboard_arrow_down
  • Get started arrow_forward
  • Product
  • apps
    Overview
    Learn more about threat intelligence powered by machine learning
  • blur_on
    Technology
    See how collection from an unrivaled breadth of sources powers risk insights
  • developer_board
    Integrations
    Combine threat intelligence with your existing security technology
  • announcement
    Services
    Let our team of world-class analysts help you apply threat intelligence
  • device_hub
    API
    Connect to our real-time threat data through a flexible rest API
  • create
    Training
    Become an expert in threat intelligence through our educational programs
  • Solutions
    people By Role
  • Incident Response
  • Security Leadership
  • Security Operations
  • Threat Analysis
  • Vulnerability Management
  • extension By Need
  • Brand Monitoring
  • Dark Web Monitoring
  • Indicator Enrichment
  • Threat Hunting
  • Threat Intelligence Platform
  • Threat Intelligence Feeds
  • business By Industry
  • Energy
  • Financial Services
  • Government
  • Healthcare
  • Retail
  • Resources
  • email
    Cyber Daily
    Join over 35,000 subscribers who get daily threat insights by email
  • mic
    Podcasts
    Listen to our podcast to supercharge your threat intelligence knowledge
  • ondemand_video
    Webinars
    Watch live and on-demand webinars to hear from industry experts
  • chrome_reader_mode
    White Papers
    Read our white papers to keep up with the latest threat intelligence advice
  • menu
    close
    • Product
      • Overview
      • Technology
      • Services
      • Integrations
      • API
      • Training
    • Solutions
      • Threat Analysis
      • Security Operations
      • Incident Response
      • Vulnerability Management
      • Security Leadership
      • Indicator Enrichment
      • Brand Monitoring
      • Threat Hunting
      • Cyber Risk Trends
      • Threat Intelligence Feeds
      • Financial Services
      • Healthcare
      • Retail
      • Energy
      • Government
    • Customers
    • Partners
    • Resources
      • Cyber Daily
      • Webinars
      • Podcasts
      • White Papers
    • Login
    Military Reaper Drone Documents Leaked on the Dark Web
    Recorded Future Blog

    Military Reaper Drone Documents Leaked on the Dark Web

    By Andrei Barysevich on July 10, 2018

    Insikt Group

    Scope Note: Initial analysis into the leak of sensitive military information regarding the MQ-9 Reaper unmanned aerial vehicle was initiated as the result of analysts monitoring criminal activity on deep and dark web forums and marketplaces. Direct threat actor interaction allowed Insikt Group analysts to discover other leaked military information available from the same threat actor. Once identified, searches in Recorded Future revealed the extent of the actor’s activities.

    Executive Summary

    On June 1, 2018, while monitoring criminal actor activities on the deep and dark web, Recorded Future’s Insikt Group identified an attempted sale of what we believe to be highly sensitive U.S. Air Force documents. Specifically, an English-speaking hacker claimed to have access to export-controlled documents pertaining to the MQ-9 Reaper unmanned aerial vehicle (UAV). Insikt analysts engaged the hacker and confirmed the validity of the compromised documents. Insikt Group identified the name and country of residence of an actor associated with a group we believe to be responsible. This analysis is available to our customers via Insikt’s blog. We continue to assist law enforcement in their investigation.

    Key Judgements

    • Recorded Future identified a newly registered member of a hacking forum attempting to sell highly sensitive documents about the U.S. military MQ-9 Reaper drone.
    • Following the first incident, the threat actor acknowledged another breach involving a large number of military documents from an unidentified officer.
    • The documents contained a second dataset including the M1 Abrams maintenance manual, a tank platoon training course, a crew survival course, and documentation on improvised explosive device (IED) mitigation tactics.
    • Insikt Group analysts learned that the attacker used a widely known tactic of gaining access to vulnerable Netgear routers with improperly setup FTP login credentials.

    Recorded Future Timeline of Actor Activity

    Actor’s activity timeline in Recorded Future.

    Background

    Manufactured by General Atomics, the MQ-9 Reaper is regarded as one of the most advanced and lethal military technology commissioned in the past two decades. According to open sources, Reaper was first introduced in 2001 and is currently used by the U.S. Air Force, the U.S. Navy, the CIA, U.S. Customs and Border Protection, NASA, and the militaries of several other countries.

    In 2006, then Chief of Staff of the United States Air Force General T. Michael Moseley said, “We’ve moved from using UAVs primarily in intelligence, surveillance, and reconnaissance roles before Operation Iraqi Freedom, to a true hunter-killer role with the Reaper.”

    Reaper Maintenance Training Documents

    Reaper maintenance training documents stolen by the hacker.

    Threat Analysis

    It is not uncommon to uncover sensitive data like personally identifiable information (PII), login credentials, financial information, and medical records being offered for sale on the dark web. However, it is incredibly rare for criminal hackers to steal and then attempt to sell military documents on an open market.

    Original Advertisement on Dark Web

    Original advertisement posted on the dark web.

    In the weeks following the initial advertisement, Insikt Group analysts established and maintained direct contact with the hacker, learning that a previously disclosed FTP vulnerability in Netgear routers was exploited to gain access. Utilizing Shodan’s popular search engine, the actors scanned large segments of the internet for high-profile misconfigured routers that use a standard port 21 to hijack all valuable documents from compromised machines.

    Utilizing the above-mentioned method, the hacker first infiltrated the computer of a captain at 432d Aircraft Maintenance Squadron Reaper AMU OIC, stationed at the Creech AFB in Nevada, and stole a cache of sensitive documents, including Reaper maintenance course books and the list of airmen assigned to Reaper AMU. While such course books are not classified materials on their own, in unfriendly hands, they could provide an adversary the ability to assess technical capabilities and weaknesses in one of the most technologically advanced aircrafts.

    The captain whose computer was compromised recently completed the Cyber Awareness Challenge and should have been aware of the required actions to prevent unauthorized access. In this case, setting the FTP password.

    Certificate of Completion

    The Cyber Awareness Challenge certificate of completion.

    Following his advertisement for the Reaper drone documents, the threat actor put yet another set of military documents up for sale. Unfortunately, this time the source was never disclosed to Recorded Future. However, judging by the content, they appear to be stolen from the Pentagon or from a U.S. Army official. More than a dozen various training manuals describe improvised explosive device defeat tactics, an M1 ABRAMS tank operation manual, a crewman training and survival manual, and tank platoon tactics. As with the previous documents, none represent classified materials, although most can be distributed to U.S. government agencies and their contractors only.

    Convoy Risk Mitigation Procedures

    Convoy risk mitigation procedures described in the IED manual.

    During the Insikt Group analyst’s engagement with the actor, he professed that on days he was not hunting for his next victim, he entertained himself by watching sensitive live footage from border surveillance cameras and airplanes. The actor was even bragging about accessing footage from a MQ-1 Predator flying over Choctawhatchee Bay in the Gulf of Mexico.

    Aircraft Video Footage Screenshot

    Screenshot of the aircraft video footage showcased by the hacker.

    Technical Analysis

    In early 2016, several security researchers publicly announced that Netgear routers with remote data access capabilities were susceptible to malicious attacks if the default FTP authentication credentials were not updated. Despite it being two years since the vulnerability was first acknowledged, the problem remains widespread. During our recent research, Recorded Future identified more than 4,000 routers susceptible to the attack.

    Shodan Scan Results

    Shodan scan results with more than 4,000 potentially vulnerable systems identified.

    As Netgear previously reported, the steps described below are sufficient to protect the device from malicious attacks.

    1. Launch an internet browser from a computer or wireless device that is connected to the network.
    2. Type in http://www.routerlogin.net or http://www.routerlogin.com. A login screen will display.
    3. The user name is admin. The default password is password. However, to prevent unauthorized access, make sure to update the password by using a random combination of letters, numbers, and symbols. The user name and password are case sensitive.
    4. Select ADVANCED > USB Functions > ReadySHARE Storage.
    5. Select FTP.
    6. Click Apply.

    Netgear FTP Credentials Setup Process

    Netgear FTP credentials setup process.

    Outlook

    As current compromises have shown, even those who should be adept to common security hygiene practices are not immune to rudimentary attacks, resulting in incidents with dire consequences. Although private industries have really stepped up their security efforts in recent years, investing heavily both in the infrastructure and workforce education, the government is consistently lagging behind when it comes to the security training of its employees and protection of state secrets. Sadly, very few understand the importance of properly securing wireless access points (WAP), and even fewer use strong passwords and understand how to spot phishing emails.

    The military response teams will determine the exact ramifications of both breaches. However, the fact that a single hacker with moderate technical skills was able to identify several vulnerable military targets and exfiltrate highly sensitive information in a week’s time is a disturbing preview of what a more determined and organized group with superior technical and financial resources could achieve.

    Up next:
    RedAlpha: New Campaigns Discovered Targeting the Tibetan Community

    The Insikt Group analyzes new malware targeting the Tibetan community and provides a detailed analysis of RedAlpha campaigns and associated infrastructure.

    Analysis
    2 months AGO
    Juan Andrés Guerrero-Saade and Sanil Chohan
    Cyber Daily Banner
    listRecent Posts
    • Collaborate Confidently With Analyst Notes in Recorded Future

      By Avia Navickas

      on September 6, 2018

    • 4 Ways Machine Learning Produces Actionable Threat Intelligence

      By Zane Pokorny

      on September 5, 2018

    • Russia’s Vulnerability Database Focuses Inward

      By Amanda McKeon

      on September 4, 2018

    • Applying Improv Techniques to Threat Intelligence

      By David Peduto

      on August 31, 2018

    • Managing Gap’s Threat Intelligence Needs With an All-in-One Solution

      By Zane Pokorny

      on August 30, 2018

    Copyright © 2018 Recorded Future, INC.
    Product
  • Overview
  • Technology
  • Integrations
  • Services
  • API
  • Resources
  • Blog
  • Cyber Daily
  • Podcasts
  • Webinars
  • White Papers
  • Company
  • About
  • Events
  • Press
  • Contact
  • Jobs
  • Information
  • Support
  • FAQ
  • Terms
  • Privacy
  • Cookies
  • Copyright © 2018 Recorded Future, INC.
    closeclose