Attacks/Breaches
7/9/2013
02:15 PM
50%
50%

South Korean Bank Hackers Target U.S. Military Secrets

Wiper malware APT gang has been traced to four-year military espionage campaign.

The Syrian Electronic Army: 9 Things We Know
(click image for larger view)
The Syrian Electronic Army: 9 Things We Know
The wiper malware attack against South Korean banks and broadcasters in March 2013 has been traced to an advanced persistent threat (APT) gang that's been targeting South Korean and U.S. military secrets for at least four years.

The March attacks, which culminated in the master boot record of thousands of South Korean PCs being deleted by attackers, has been dubbed "Dark Seoul." But according to a new research report published by McAfee, Dark Seoul was just one of many attacks launched as part of a long-running campaign known as Operation Troy. That name was inspired by the frequency with which the word "Troy" features in the compile path strings of the group's malware.

"The prime suspect group in these attacks is the New Romantic Cyber Army Team, which makes frequent use of Roman and classical terms in their code," said McAfee's report. McAfee said that after identifying similarities between malware variants used in disparate attacks -- including 2011 distributed denial-of-service (DDoS) attacks -- it finally identified what appears to be the gang's raison d'être.

[ How deep does U.S. hacking go? Read Snowden Says U.S. Hacking Chinese Civilians Since 2009. ]

"The missing element was military espionage," said McAfee threat researcher Ryan Sherstobitoff in a blog post. "One of the primary goals of this group was a covert military spying operation that attempted to target military forces in South Korea," including U.S. Forces Korea.

New Romantic Cyber Army Team had already claimed credit for the March wiper malware attacks, saying it had erased 180,000 South Korean PCs, in contrast to official South Korean government estimates, which said that about 32,000 PCs were affected. The hackers also boasted that prior to wiping the systems, they'd stolen information on 2.5 million members of an organization -- the name of which was blacked out by McAfee -- plus content management system information pertaining to 50 million people, as well as unspecified bank information.

McAfee said that the group's claims that it stole massive amounts of data from infected PCs appeared to be true, because in the weeks prior to the March mass wiping of master boot records, the attackers appeared to have already infected the systems and enjoyed unrestricted access. That would have allowed them ample time to mine PCs for interesting information.

Previous
1 of 2
Next
Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading December Tech Digest
Experts weigh in on the pros and cons of end-user security training.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-4807
Published: 2014-11-22
Sterling Order Management in IBM Sterling Selling and Fulfillment Suite 9.3.0 before FP8 allows remote authenticated users to cause a denial of service (CPU consumption) via a '\0' character.

CVE-2014-6183
Published: 2014-11-22
IBM Security Network Protection 5.1 before 5.1.0.0 FP13, 5.1.1 before 5.1.1.0 FP8, 5.1.2 before 5.1.2.0 FP9, 5.1.2.1 before FP5, 5.2 before 5.2.0.0 FP5, and 5.3 before 5.3.0.0 FP1 on XGS devices allows remote authenticated users to execute arbitrary commands via unspecified vectors.

CVE-2014-8626
Published: 2014-11-22
Stack-based buffer overflow in the date_from_ISO8601 function in ext/xmlrpc/libxmlrpc/xmlrpc.c in PHP before 5.2.7 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code by including a timezone field in a date, leading to improper XML-RPC encoding...

CVE-2014-8710
Published: 2014-11-22
The decompress_sigcomp_message function in epan/sigcomp-udvm.c in the SigComp UDVM dissector in Wireshark 1.10.x before 1.10.11 allows remote attackers to cause a denial of service (buffer over-read and application crash) via a crafted packet.

CVE-2014-8711
Published: 2014-11-22
Multiple integer overflows in epan/dissectors/packet-amqp.c in the AMQP dissector in Wireshark 1.10.x before 1.10.11 and 1.12.x before 1.12.2 allow remote attackers to cause a denial of service (application crash) via a crafted amqp_0_10 PDU in a packet.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Now that the holiday season is about to begin both online and in stores, will this be yet another season of nonstop gifting to cybercriminals?