Attacks/Breaches
7/9/2013
02:15 PM
50%
50%

South Korean Bank Hackers Target U.S. Military Secrets

Wiper malware APT gang has been traced to four-year military espionage campaign.

What of the WhoIs Team, which also claimed credit for the March wiper attacks? McAfee said that a wiper file traced to that group shared similarities with wiper malware used in New Romantic Cyber Army Team attacks. Still, it's unclear if the WhoIs Team is simply the same group, or another gang using repurposed malware components.

Overall, McAfee said it has tied New Romantic Cyber Army Team to Operation Troy attacks that occurred from 2009 to 2013. Malware used by the group, for example, appeared to have been employed in the 2011 "Ten Days of Rain" DDoS attacks against 40 sites affiliated with South Korean government, including U.S. Forces Korea and the U.S. Air Force Base in Kunsan, South Korea, as well as in other attacks that occurred in 2010, 2011 and 2013.

On June 25, meanwhile, the same group launched an attack against South Korean government and news websites, in part by distributing a modified installation file for the SimDisk file-sharing and storage service. That malware was distributed via the official SimDisk website, which pushes automatic updates to client software. Attackers hacked into the site and made it push not just a copy of the legitimate software, SimDisk.exe, to users, but also a disguised Trojan downloader, SimDiskup.exe.

That downloader connected to the Tor network to obtain a Trojan application called Castov that included a JPEG file that "contains a timestamp used by Castov to synchronize attacks," said a Symantec Security Response blog post. That timestamp detailed when all Castov-infected clients should send DNS requests to a South Korean government website, thus creating a DDoS attack.

Is the New Romantic Cyber Army Team simply a front for hackers in the employ of Pyongyang? According to South Korean cybersecurity experts, the March 2013 wiper attacks were traced to an IP address in the North Korean capital, which was revealed after the attacker experienced a technical glitch.

But the Troy-wielding gang has often launched their attacks under the hacktivism banner -- and the March wiper attacks, which included stealing data and holding it ransom, would appear to fit that mold. But McAfee's Sherstobitoff said that's likely just a ruse. "The Dark Seoul adversaries show a consistent pattern of psychological warfare that includes throwing off investigators by blaming the attacks on hacktivism," he said. "Both the March and June events share this feature."

Regardless of nomenclature, the attackers appear to have a grudge against both South Korea and the United States. For example, the date of the most recent attacks, June 25, was the 63rd anniversary of the start of the Korean War. "Conducting DDoS attacks and hard disk wiping on key historical dates is not new for the Dark Seoul gang," said Symantec. "They previously conducted DDoS and wiping attacks on the U.S. Independence Day as well."

Previous
2 of 2
Next
Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading December Tech Digest
Experts weigh in on the pros and cons of end-user security training.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-2382
Published: 2014-11-20
The DfDiskLo.sys driver in Faronics Deep Freeze Standard and Enterprise 8.10 and earlier allows local administrators to cause a denial of service (crash) and execute arbitrary code via a crafted IOCTL request that writes to arbitrary memory locations, related to the IofCallDriver function.

CVE-2014-3625
Published: 2014-11-20
Directory traversal vulnerability in Pivitol Spring Framework 3.0.4 through 3.2.x before 3.2.12, 4.0.x before 4.0.8, and 4.1.x before 4.1.2 allows remote attackers to read arbitrary files via unspecified vectors, related to static resource handling.

CVE-2014-8387
Published: 2014-11-20
cgi/utility.cgi in Advantech EKI-6340 2.05 Wi-Fi Mesh Access Point allows remote authenticated users to execute arbitrary commands via shell metacharacters in the pinghost parameter to ping.cgi.

CVE-2014-8493
Published: 2014-11-20
ZTE ZXHN H108L with firmware 4.0.0d_ZRQ_GR4 allows remote attackers to modify the CWMP configuration via a crafted request to Forms/access_cwmp_1.

CVE-2014-8767
Published: 2014-11-20
Integer underflow in the olsr_print function in tcpdump 3.9.6 through 4.6.2, when in verbose mode, allows remote attackers to cause a denial of service (crash) via a crafted length value in an OLSR frame.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Now that the holiday season is about to begin both online and in stores, will this be yet another season of nonstop gifting to cybercriminals?