European govt air-gapped systems breached using custom malware

Breach mechanism and what actually went wrong

  • Core vector: USB drives shuttled between internet-connected and “air-gapped” systems.
  • Malware on the online machine altered the USB: hid the latest-used folder, replaced it with an executable using the same name and a folder icon, relying on users to click it.
  • Many see this as a very old, basic trick (akin to fake “.jpg.exe” files) rather than sophisticated firmware or side-channel magic.
  • Key failure: users could run arbitrary executables from removable media on a “secure” system.

What “air-gapped” really means (and doesn’t)

  • Several argue these systems weren’t meaningfully air-gapped if writable USB media could move both ways.
  • Others note this matches common definitions: no network link, but data transfer via physical media is allowed.
  • One quote shared: an air gap is effectively “a high-latency connection” because humans and media bridge it.

Removable-media practices and alternatives

  • Many recommend one-way mechanisms (data diodes, cut TX wires, optical links) or read-only media (CD/DVD-R with read-only drives) for import only.
  • Some argue air-gapped networks should never let data out; USB devices should be destroyed or retained after entry.
  • Suggestions include:
    • Disable or epoxy USB ports, allow only specific device classes (e.g., HID).
    • Use dedicated, heavily-audited transfer tools, or QR/aux/serial-based minimal protocols.
    • Employ write blockers on USB forensics-style.
  • Others caution that even QR and custom links can be exploited at the application layer.

OS, AV, and architecture choices

  • Many criticize using standard Windows desktops for high-security air-gapped systems, especially with default behaviors (hidden extensions, rich icons, autorun history).
  • Alternatives suggested: hardened Linux/BSD, security-focused OSs like Qubes, minimal templates, and strict execution policies (no binaries off external media).
  • Debate over AV on air-gapped systems: some see it as necessary due to data import; others call AV itself a high-privilege attack surface and sometimes “security theater.”

Human factors and security culture

  • Broad agreement that humans and incentives remain the weakest link: exceptions for VIPs, convenience over rigor, and poor adherence to procedures.
  • Some argue security can eventually be “largely solved” at the technical layer; others insist socio-organizational pressures will keep creating vulnerabilities.

Attribution and reporting

  • Skepticism toward inferring Russian involvement from a single protocol naming convention; seen as weak evidence and poor journalistic practice.