Incident: Stealthy Hack by Sandworm Group via Centreon Monitoring Tool

Published Date: 2021-02-15

Postmortem Analysis
Timeline 1. The software failure incident involving the hacking of targets in France using the IT monitoring tool Centreon occurred between late 2017 and 2020 as reported in Article [111074].
System 1. IT monitoring tool called Centreon [Article 111074]
Responsible Organization 1. The Russian military hackers known as Sandworm, a group within Russia's GRU military intelligence agency, were responsible for causing the software failure incident by exploiting the IT monitoring tool Centreon [Article 111074].
Impacted Organization 1. IT firms and particularly web hosting companies in France [Article 111074] 2. Telecom providers Orange and OptiComm, IT consulting firm CGI, defense and aerospace firm Thales, steel and mining firm ArcelorMittal, Airbus, Air France KLM, logistics firm Kuehne + Nagel, nuclear power firm EDF, and the French Department of Justice [Article 111074]
Software Causes 1. Exploitation of an IT monitoring tool called Centreon by hackers linked to Sandworm, resulting in breaches in several French organizations [Article 111074]. 2. Presence of two different pieces of malware on compromised servers running Centreon: a publicly available backdoor called PAS and another known as Exaramel, previously used by Sandworm [Article 111074]. 3. Use of outdated and insecure versions of Centreon's open-source software by victims, allowing connections from outside the organization's network [Article 111074].
Non-software Causes 1. Exploitation of an IT monitoring tool called Centreon [111074] 2. Insecure deployment of an open-source version of Centreon's software [111074]
Impacts 1. The software failure incident involving the hacking of French organizations using the IT monitoring tool Centreon had impacts such as compromising servers, with malware found on them including a publicly available backdoor called PAS and another known as Exaramel [Article 111074]. 2. The incident raised concerns about potential disruptive effects, as Sandworm, the group behind the intrusion, is known for destructive operations [Article 111074]. 3. The affected organizations, mostly IT firms and web hosting companies, faced security breaches that went undetected for as long as three years [Article 111074]. 4. The incident highlighted the importance of ensuring the security of software installations and complying with security guidelines to prevent such intrusions [Article 111074].
Preventions 1. Regularly updating and maintaining software to ensure it is current and secure could have prevented the software failure incident [Article 111074]. 2. Implementing proper security measures and guidelines, such as following ANSSI's guidelines for a Healthy Information System, could have helped prevent the intrusion [Article 111074]. 3. Ensuring that internet-facing servers running critical software are securely configured and not allowing connections from outside the organization's network could have mitigated the risk of exploitation [Article 111074].
Fixes 1. Updating the obsolete version of Centreon's open-source software to the latest version or contacting Centreon and its network of certified partners for assistance [Article 111074].
References 1. French information security agency ANSSI [Article 111074] 2. Centreon, the IT monitoring tool affected by the hack [Article 111074] 3. Slovakian cybersecurity firm ESET [Article 111074] 4. Security firm DomainTools [Article 111074] 5. Centreon spokesperson [Article 111074] 6. NSA (National Security Agency) [Article 111074] 7. Security firm FireEye [Article 111074]

Software Taxonomy of Faults

Category Option Rationale
Recurring one_organization (a) The software failure incident having happened again at one_organization: The incident involving the exploitation of the IT monitoring tool Centreon by hackers linked to Sandworm in France is reminiscent of a previous incident involving the GRU hacking French targets. In 2016, GRU hackers posing as Islamic extremists destroyed the network of France's TV5 television network [111074]. This suggests a pattern of aggressive hacking targeting French organizations by the same threat actors. (b) The software failure incident having happened again at multiple_organization: The article does not mention any specific instances of the same software failure incident happening at multiple organizations.
Phase (Design/Operation) design, operation (a) The software failure incident related to the design phase can be seen in the article where hackers exploited an IT monitoring tool called Centreon, which had been running on servers of various French organizations. The hackers managed to breach these organizations by compromising servers running Centreon, which had been sold by the firm of the same name based in Paris. The French information security agency ANSSI found two different pieces of malware on these servers, indicating a breach that went undetected for as long as three years [111074]. (b) The software failure incident related to the operation phase is evident in the same article where it was mentioned that the victims of the hacking campaign were using an open-source version of Centreon's software that the company hadn't supported for more than five years. Additionally, these victims had deployed the software insecurely, including allowing connections from outside the organization's network. This operational misuse of the software contributed to the success of the hacking campaign [111074].
Boundary (Internal/External) within_system, outside_system (a) within_system: The software failure incident related to the hacking campaign exploiting the IT monitoring tool Centreon in France was primarily within the system. The hackers compromised servers running Centreon's software, exploiting vulnerabilities within the system to carry out the intrusion campaign [111074]. The French information security agency ANSSI found malware on the compromised servers, indicating that the breach originated from within the system itself [111074]. Additionally, the statement from Centreon mentioned that the victims were using an open-source version of Centreon's software that had not been supported for more than five years, suggesting internal system weaknesses contributed to the incident [111074]. (b) outside_system: The software failure incident was also influenced by factors outside the system. The hackers with links to Sandworm, a group within Russia's GRU military intelligence agency, were responsible for the intrusion campaign, indicating external threat actors were involved in the attack [111074]. The hackers exploited internet-facing servers running Centreon's software inside the victims' networks, which could be considered an external factor affecting the system [111074]. The article also mentions similarities with another warning about Sandworm targeting internet-facing machines running the Exim email client, indicating external threats targeting vulnerable systems [111074].
Nature (Human/Non-human) non-human_actions, human_actions (a) The software failure incident in this case appears to be related to non-human actions, specifically the exploitation of an IT monitoring tool called Centreon by hackers with links to Sandworm, a group within Russia's GRU military intelligence agency [111074]. The hackers stealthily hacked targets in France by compromising servers running Centreon software, using malware like PAS and Exaramel. The intrusion campaign went undetected for as long as three years, indicating that the failure was due to factors introduced without human participation. (b) The failure was not directly attributed to human actions in terms of introducing the contributing factors. However, it is worth noting that the victims were using an open-source version of Centreon's software that the company hadn't supported for more than five years and were deployed insecurely, allowing connections from outside the organization's network [111074]. This insecure deployment could be considered a human action that indirectly contributed to the software failure incident.
Dimension (Hardware/Software) software (a) The articles do not mention any hardware-related failure incidents. [Article 111074] (b) The software failure incident reported in the articles is related to a breach that occurred by exploiting an IT monitoring tool called Centreon. The hackers compromised servers running Centreon software and planted malware on them, including a backdoor called PAS and another known as Exaramel. The breach was not due to a hardware failure but rather due to vulnerabilities in the software that allowed unauthorized access and compromise. [Article 111074]
Objective (Malicious/Non-malicious) malicious (a) The software failure incident described in the article is malicious in nature. The incident involved hackers linked to Sandworm, a group within Russia's GRU military intelligence agency, stealthily hacking targets in France by exploiting an IT monitoring tool called Centreon. The hackers compromised servers running Centreon with malware, including a backdoor called PAS and another known as Exaramel, which Sandworm has used in previous intrusions [Article 111074]. The article also mentions that Sandworm is known for destructive operations, and the end goal of most Sandworm operations is to cause a noticeable disruptive effect [Article 111074]. (b) The incident was not non-malicious as it involved intentional hacking activities by a group with a history of destructive cyberattacks.
Intent (Poor/Accidental Decisions) unknown (a) The intent of the software failure incident: The software failure incident involving the hacking of French organizations through the exploitation of the IT monitoring tool Centreon by hackers linked to Sandworm (Russian military hackers) does not seem to be a result of poor decisions. The incident appears to be a deliberate and stealthy intrusion campaign carried out over several years with the use of sophisticated malware and techniques. The hackers compromised servers running Centreon and targeted specific organizations, including IT firms and web hosting companies, indicating a strategic and intentional effort to breach these entities [Article 111074].
Capability (Incompetence/Accidental) development_incompetence (a) The software failure incident related to development incompetence is evident in the article as the French security agency ANSSI warned that hackers with links to Sandworm, a group within Russia's GRU military intelligence agency, had breached several French organizations by exploiting an IT monitoring tool called Centreon. The agency described the victims as "mostly" IT firms and particularly web hosting companies. The intrusion campaign dated back to late 2017 and continued until 2020, indicating a prolonged period of undetected compromise [Article 111074]. (b) The software failure incident related to accidental factors is not explicitly mentioned in the provided article.
Duration temporary The software failure incident related to the hacking campaign involving the exploitation of the IT monitoring tool Centreon by hackers linked to Sandworm was temporary in nature. The French information security agency ANSSI reported that the intrusion campaign began in late 2017 and continued until 2020, lasting for approximately three years [Article 111074]. This indicates that the software failure incident was not permanent but rather temporary, as it was ongoing for a specific duration before being detected and addressed.
Behaviour other (a) crash: The software failure incident described in the article does not involve a crash where the system loses state and does not perform any of its intended functions. Instead, the hackers stealthily hacked targets in France by exploiting an IT monitoring tool called Centreon and compromised servers running Centreon's software [111074]. (b) omission: The software failure incident does not involve a failure due to the system omitting to perform its intended functions at an instance(s). The hackers successfully breached several French organizations by exploiting vulnerabilities in the IT monitoring tool Centreon [111074]. (c) timing: The software failure incident does not involve a failure due to the system performing its intended functions correctly, but too late or too early. The hackers were able to exploit the vulnerabilities in Centreon and carry out the intrusion campaign over a period of three years without being detected [111074]. (d) value: The software failure incident does not involve a failure due to the system performing its intended functions incorrectly. The hackers compromised servers running Centreon's software and planted malware on them, indicating a successful intrusion rather than incorrect functioning of the software itself [111074]. (e) byzantine: The software failure incident does not involve a failure due to the system behaving erroneously with inconsistent responses and interactions. The hackers' actions were deliberate and coordinated, leading to a successful breach of several French organizations using the Centreon IT monitoring tool [111074]. (f) other: The behavior of the software failure incident can be categorized as a targeted and stealthy cyber intrusion where the attackers exploited vulnerabilities in the Centreon software to gain unauthorized access to the systems of various organizations. The incident involved the use of specific malware tools and techniques linked to the Sandworm hacking group, indicating a sophisticated and coordinated attack [111074].

IoT System Layer

Layer Option Rationale
Perception None None
Communication None None
Application None None

Other Details

Category Option Rationale
Consequence property, non-human (d) property: People's material goods, money, or data was impacted due to the software failure The software failure incident involving the hacking of French organizations through the exploitation of the IT monitoring tool Centreon resulted in the compromise of servers running Centreon software. The hackers managed to infiltrate several French organizations, mostly IT firms and web hosting companies, and remained undetected for as long as three years. The compromised servers were found to contain two different pieces of malware, including a publicly available backdoor called PAS and another known as Exaramel. The victims of the hacking campaign included telecom providers, IT consulting firms, defense and aerospace companies, steel and mining firms, airlines, logistics firms, nuclear power firms, and government agencies [111074].
Domain information (a) The failed system was intended to support the information industry. The software failure incident involved the exploitation of an IT monitoring tool called Centreon, which was used by various organizations, including IT firms, web hosting companies, and other entities in the information sector [Article 111074].

Sources

Back to List