Cyberattacks , Cybersecurity

CISA Confirms Cyberattack on Critical Chemical Security Tool

US Cyber Defense Agency Says Major Cyberattack Result of Vulnerable Ivanti Products
CISA Confirms Cyberattack on Critical Chemical Security Tool
CISA's Chemical Security Assessment Tool houses sensitive private sector chemical security plans. (Image: Shutterstock)

The U.S. cyber defense agency confirmed Monday that one of its critical tools housing private sector chemical security plans was the target of a January cyberattack that "may have resulted in the potential unauthorized access" of sensitive data.

See Also: Fortifying OT Networks: Key Benefits of Implementing Protocol Isolation

The Cybersecurity and Infrastructure Security Agency said it sent notifications Thursday to participants in the Chemical Facility Anti-Terrorism Standards program about the cybersecurity intrusion that affected the agency's Chemical Security Assessment Tool. The notifications said the agency "found no evidence of exfiltration of data" but warned the hackers may have accessed "top-screen surveys, security vulnerability assessments, site security plans, personnel surety program submissions and CSAT user accounts."

CFATS-regulated facilities are required to comply with facility personnel security measures that involve submitting personal identifiable information for vetting purposes, including name, passport number, place of birth and citizenship status. CISA urged facilities to reset passwords for individuals who had CSAT accounts to avoid possible password spraying attacks.

The agency also encouraged facilities that received the notification letters to notify individuals submitted by that facility for security vetting under the CFATS personnel survey program of the incident.

The intrusion was the result of vulnerabilities found in Ivanti VPN devices that allowed hackers to breach two gateways used by CISA, the agency told Information Security Media Group in March (see: Hackers Compromised Ivanti Devices Used by CISA). It was reported at the time that the affected systems connected to CSAT as well as the Infrastructure Protection Gateway, a portal containing data about security assessments for significant national critical infrastructure.

"CISA identified activity indicating the exploitation of vulnerabilities in Ivanti products the agency uses" in February, a spokesperson said at the time. "We continue to upgrade and modernize our systems, and there is no operational impact at this time."

CISA announced it was hosting multiple webinars for stakeholders to review the information provided in the Ivanti vulnerability notifications. The next webinar is scheduled for July 9.

Ivanti devices faced a flurry of attacks beginning in December by alleged Chinese nation-state hackers that stole account credentials stored inside Ivanti gateways. CISA gave federal agencies until February 2 to perform factory resets on all of the company's devices, though the agency later warned that hackers could preserve access to a compromised device even after a factory reset (see: Feds Face a Midnight Deadline for Resetting Ivanti Gateways). Ivanti disputed those claims.


About the Author

Chris Riotta

Chris Riotta

Managing Editor, GovInfoSecurity

Riotta is a journalist based in Washington, D.C. He earned his master's degree from the Columbia University Graduate School of Journalism, where he served as 2021 class president. His reporting has appeared in NBC News, Nextgov/FCW, Newsweek Magazine, The Independent and more.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing ot.today, you agree to our use of cookies.