Attacks/Breaches
4/22/2013
01:23 PM
50%
50%

Chinese Hackers Seek Drone Secrets

"Comment Crew" gang that fanned fears of Chinese hacking launches malware that combs for drone technology information.

A notorious cyber-espionage gang is being blamed for a set of recently discovered spear-phishing attacks that aim to steal information relating to unmanned aerial vehicles (UAVs), better known as drones.

"The set of targets cover all aspects of unmanned vehicles, land, air, and sea, from research to design to manufacturing of the vehicles and their various subsystems," said James T. Bennett, a senior threat research engineer at FireEye, in a blog post.

Furthermore, the advanced persistent threat (APT) group behind both attacks, according to FireEye, is the gang known as the "Comment Crew," which was singled out in a recent report from Mandiant. The security firm accused the group, dubbed APT1, of being an elite Chinese military hacking unit based in Shanghai, known as the People's Liberation Army (PLA) Unit 61398, which is suspected of having attacked at least 141 organizations across numerous industries. Chinese government officials have denied those accusations.

[ U.S. intelligence agencies are using analysis software to identify security threats. Read more at Military Uses Big Data As Spy Tech. ]

Regardless of the group's sponsor, one recent set of attacks it launched targeted about a dozen organizations -- across the aerospace, defense, telecommunications and government sectors -- in both the United States and India, beginning in December 2011, if not earlier. But FireEye also found that the malicious infrastructure and command-and-control (C&C) servers used in the attacks are the same as those employed in a campaign known as Operation Beebus, so named for the related malware used by attackers, which was first submitted for testing to VirusTotal in April 2011. Including those spear-phishing attacks, which were discovered in February, FireEye now has a running total of 20 targets, including government-funded drone researchers in academia.

The earlier Beebus attacks involved malicious PDF and Word files -- with names such as "sensor environments.doc" and "RHT_SalaryGuide_2012.pdf" -- emailed to targets. The documents attempted to exploit a well-known DLL search order hijacking vulnerability in Windows and drop a malicious DLL file in the Windows directory.

In the latest series of attacks, the tactics have remained largely the same, although this time one of the decoy documents includes a reference to Pakistan's UAV program, while another appears to have been sent from a military email address at Joint Base Andrews in Maryland, titled "Family Planning Association of Base (FPAB)."

If a target opens the malicious document, it will attempt to exploit the Windows DLL vulnerability. If successful, the attack results in the installation of backdoor software known as Mutter, which uses what Bennett has dubbed a "hide-in-plain-sight" tactic in that the malicious file is 41 MB in size. "With rare exceptions, malware typically have a small size, usually no larger than a few hundred kilobytes," he said. "When an investigator comes across a file [that's] megabytes in size, he may be discouraged from taking a closer look."

To build the 41-MB file, the malware dropper first decodes a malicious DLL file -- only 140 KB in size -- that's included in the dropper's resource file, then places the DLL file onto the compromised system, proceeding to fill its resource section with randomly generated data, Bennett explained. "This has another useful side effect of giving each DLL a unique hash, making it more difficult to identify."

After infection, the malware will stay dormant for some period of time before attempting to exfiltrate data from the infected PC. That behavior mirrors that of the "wiper" malware that successfully exploited 48,000 systems at South Korean banks and broadcasters last month, although the malware isn't related.

Attend Interop Las Vegas May 6-10 and learn the emerging trends in information risk management and security. Use Priority Code MPIWK by March 22 to save an additional $200 off the early bird discount on All Access and Conference Passes. Join us in Las Vegas for access to 125+ workshops and conference classes, 300+ exhibiting companies, and the latest technology. Register today!

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
DNS Threats: What Every Enterprise Should Know
Domain Name System exploits could put your data at risk. Here's some advice on how to avoid them.
Flash Poll
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7445
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

CVE-2015-4948
Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

CVE-2015-5660
Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

CVE-2015-6003
Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

CVE-2015-6333
Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio

The cybersecurity profession struggles to retain women (figures range from 10 to 20 percent). It's particularly worrisome for an industry with a rapidly growing number of vacant positions.

So why does the shortage of women continue to be worse in security than in other IT sectors? How can men in infosec be better allies for women; and how can women be better allies for one another? What is the industry doing to fix the problem -- what's working, and what isn't?

Is this really a problem at all? Are the low numbers simply an indication that women do not want to be in cybersecurity, and is it possible that more women will never want to be in cybersecurity? How many women would we need to see in the industry to declare success?

Join Dark Reading senior editor Sara Peters and guests Angela Knox of Cloudmark, Barrett Sellers of Arbor Networks, Regina Wallace-Jones of Facebook, Steve Christey Coley of MITRE, and Chris Roosenraad of M3AAWG on Wednesday, July 13 at 1 p.m. Eastern Time to discuss all this and more.