Attacks/Breaches
8/3/2011
06:07 PM
50%
50%

Shady RAT Attack Hit 72 Organizations

McAfee said that the advanced, persistent threat began in 2006, and has targeted government agencies, Olympic Committees, and numerous businesses.

Black Hat
10 Massive Security Breaches
(click image for larger view)
Slideshow: 10 Massive Security Breaches
McAfee on Tuesday issued a warning that an attack, which it's dubbed "Shady RAT" for remote access tool, successfully compromised at least 72 organizations, across 14 countries, beginning in 2006.

Victims included government agencies in the United States, Canada and South Korea, defense contractors, and International Olympic Committees in three countries. All told, 49 of the exploited organizations were located in the United States.

McAfee released a related report on Tuesday, saying it first discovered signs of the Shady RAT attack in 2009, after a forensics investigation at a defense contractor found an infection that originated from a spear-phishing attack, which contained attached malware that uses "encrypted HTML comments in Web pages that serve as a command channel to the infected machine." While McAfee didn't name the malware in question, security experts said it sounds like malware that's been traced to a group known as the "Comment Crew."

McAfee found evidence that the Shady RAT attacks began in July 2006, if not before. All told, there were eight related intrusions spotted from 2006, including attacks against a Department of Energy research laboratory, as well as steel and construction companies located in South Korea. Meanwhile, in 2007, attacks increased by 260%, expanding to 29 organizations, including multiple U.S. defense contractors. In 2008, the attack expanded to 38 organizations.

Interestingly, however, the number of attacks declined in 2009 and 2010, "likely due to the widespread availability of the countermeasures for the specific intrusion indicators used by this specific actor," according to the report. The group behind the attack responded by overhauling its command and control infrastructure, at which point McAfee lost sight of the attack in organizations' logs.

McAfee said that based on its investigation, many more organizations have likely been compromised in similar attacks. "Having investigated intrusions such as Operation Aurora and Night Dragon (systemic long-term compromise of Western oil and gas industry), as well as numerous others that have not been disclosed publicly, I am convinced that every company in every conceivable industry with significant size and valuable intellectual property and trade secrets has been compromised (or will be shortly), with the great majority of the victims rarely discovering the intrusion or its impact," said report author Dmitri Alperovitch, vice president of threat research for McAfee, in a blog posted late Tuesday.

"In fact, I divide the entire set of Fortune Global 2000 firms into two categories: those that know they've been compromised and those that don't yet know," he said.

Is Alperovitch's grandiose note justified? APTs have been cited as the cause of breaches affecting RSA SecuriID, Lockheed Martin, and Sony. Furthermore, many security experts suggest that APTs are much more widespread than companies realize.

In the case of Shady RAT, however, it's unclear what attackers actually stole. "From my reading of the 'Shady RAT' report it's unclear whether the analysis of the hackers' logs was able to differentiate between when a junior employee's computer was infected with malware, and when a PC belonging to someone in a more senior position was compromised. The seriousness of the two security breaches would be very different," said Graham Cluley, senior technology consultant at Sophos, in a blog post.

Regardless, so-called APTs are now widespread. According to a Ponemon data breach study involving 50 businesses, released earlier this week, 34% said that they'd faced APTs in 2011. But not every company surveyed may have acknowledged being attacked. Alex Stamos, CTO of security consulting company iSEC Partners, told InformationWeek at the Black Hat conference, a UBM TechWeb event, in Las Vegas on Wednesday that when it comes to APTs, "only a tenth of them are ever reported."

But as with the Night Dragon attacks that used SQL injection, social engineering, and phishing to compromise multiple oil and gas companies, Shady RAT didn't involve a new, undiscovered, or surprisingly sophisticated exploit. Rather, the attack reflects the APT status quo. "It's straight out of the playbook," Tony Sager, chief of the NSA's information assurance directorate, told InformationWeek at Black Hat.

The vendors, contractors, and other outside parties with which you do business can create a serious security risk. Here's how to keep this threat in check. Also in the new, all-digital issue of Dark Reading: Why focusing solely on your own company's security ignores the bigger picture. Download it now. (Free registration required.)

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Tech Digest, Dec. 19, 2014
Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-8893
Published: 2015-01-28
Multiple cross-site scripting (XSS) vulnerabilities in (1) mainpage.jsp and (2) GetImageServlet.img in IBM TRIRIGA Application Platform 3.2.1.x, 3.3.2 before 3.3.2.3, and 3.4.1 before 3.4.1.1 allow remote authenticated users to inject arbitrary web script or HTML via a crafted URL.

CVE-2014-8894
Published: 2015-01-28
Open redirect vulnerability in IBM TRIRIGA Application Platform 3.2.1.x, 3.3.2 before 3.3.2.3, and 3.4.1 before 3.4.1.1 allows remote authenticated users to redirect users to arbitrary web sites and conduct phishing attacks via the out parameter.

CVE-2014-8895
Published: 2015-01-28
IBM TRIRIGA Application Platform 3.2.1.x, 3.3.2 before 3.3.2.3, and 3.4.1 before 3.4.1.1 allows remote attackers to bypass intended access restrictions and read the image files of arbitrary users via a crafted URL.

CVE-2014-8917
Published: 2015-01-28
Multiple cross-site scripting (XSS) vulnerabilities in (1) dojox/form/resources/uploader.swf (aka upload.swf), (2) dojox/form/resources/fileuploader.swf (aka fileupload.swf), (3) dojox/av/resources/audio.swf, and (4) dojox/av/resources/video.swf in the IBM Dojo Toolkit, as used in IBM Social Media A...

CVE-2014-8920
Published: 2015-01-28
Buffer overflow in the Data Transfer Program in IBM i Access 5770-XE1 5R4, 6.1, and 7.1 on Windows allows local users to gain privileges via unspecified vectors.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
If youíre a security professional, youíve probably been asked many questions about the December attack on Sony. On Jan. 21 at 1pm eastern, you can join a special, one-hour Dark Reading Radio discussion devoted to the Sony hack and the issues that may arise from it.