Attacks/Breaches
7/10/2014
10:32 AM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

Chinese Hackers Target Logistics & Shipping Firms With Poisoned Inventory Scanners

'ZombieZero' still actively pushing rigged handheld scanning devices, reviving concerns of doing business with Chinese tech companies.

Malware-poisoned handheld inventory scanners from China are stealing information from logistics and shipping firms as well as manufacturing companies around the globe in an attack campaign dubbed "ZombieZero" by the researchers who discovered it.

A Chinese manufacturer that sells the popular devices for scanning items shipped or transported apparently has been implanting the malware in its products, as well as via the Windows XP embedded version of the software on the scanner maker's support website. Researchers from TrapX Security, which today provided details of the attacks, say scanners with another variant of the same malware were also sold to a large robotics firm and seven other companies, which they did not name.

Logistics firms use the scanners to track shipments as they are loaded and unloaded from ships, trucks, and airplanes.

"The attackers were exfiltrating all [stolen information] to a database," says Carl Wright, general manager of TrapX. "They are very focused on manifests -- what's in it, what's the value of it."

Once the scanner is connected to the victim's wireless network, it attacks the corporate network via the server message block (SMB) protocol, and the scanned information, including origin, destination, contents, value, and shipper and recipient information, is sent to a botnet that terminates at the Lanxiang Vocational School purportedly located in the Shangdong province in China. The school has been linked to the infamous Operation Aurora cyber espionage campaign that hit Google, Adobe, Intel, and many other major US firms more than four years ago, and is located one block from the inventory scanner manufacturer in question, according to TrapX.

The botnet then sends the scanner a second piece of malware that targets the victim's corporate financial, customer, shipping, and manifest information. "That was able to take control of the ERP [enterprise resource planning] system," he says. This would, among other things, allow the attacker to make a package "disappear" or "reappear," he says. The attack targets a specific, major ERP system, says Wright, who declined to reveal the name of the product due to an investigation into the attacks.

He says it's difficult to discern if the attackers are after the logistics firms themselves or their customers.

"The exfiltration of all financial data as well as CRM data was achieved providing the attacker complete situational awareness and visibility into the shipping and logistics targets worldwide operations," TrapX said in a report it published today on the attacks.

The poisoned inventory scanners echo previous concerns raised by the US government about doing business with Chinese technology companies. Huawei, Lenovo, and ZTE were among those firms called out by US officials in the past amid concerns their products could be backdoored with cyberspying malware.

"We notified the manufacturer of the said hardware and software. They denied culpability," Wright says. "And two days ago, we saw the same APT code had morphed and hit a couple of manufacturing companies looking for other things. The same codebase."

Meanwhile in a separate development, a GAO report (PDF) warned of the vulnerability of US shipping ports to cyberattack, according to a report today in the The Wall Street Journal. The GAO says the Department of Homeland Security must do more to shore up security in maritime and other ports.

"It has been recognized for some time that the administrative and controls systems networks at shipping ports are not only vulnerable, but high-priority targets for malicious activity. Particularly concerning is the threat terrorist organizations present to these networks and the physical and information networks that are present," says Mike Brown, vice president and general manager of the global public sector at RSA. "Over the past couple of years, DHS has begun to award funding [grants] to port authorities who prioritize cyber security efforts in their grant submissions."

Meantime, TrapX says one ZombieZero victim company running 48 inventory scanners from the unnamed Chinese manufacturer found that 16 of the devices were infected with the malware. A firewall sits between the inventory scanner wireless network and the corporate network at one of its sites, and the firewall blocked the initial attack attempt. But then came a second attack via the RADMIN protocol, or port 4899, that bypassed the firewall. Nine corporate servers were infected with the cyberspying malware. Its second site was defenseless -- no firewall -- so the attack went through SMB and infiltrated the corporate network and ERP servers, according to TrapX.

"All scanner attacks targeted very specific corporate servers. The attack looked for and compromised servers that had the word 'finance' in their Host name," according to the report.

TrapX today also released a free tool for forensics investigators called Threat Inspector. "We've cobbled together some top open source tools and put in a front-end wizard that will allow any engineer to get forensics reports off infected machines," TrapX's Wright says.

The full report on ZombieZero is available here.

 

Kelly Jackson Higgins is Senior Editor at DarkReading.com. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise Magazine, ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
CharlieM299
50%
50%
CharlieM299,
User Rank: Apprentice
7/11/2014 | 12:16:47 PM
Great way to kill your business with everyone in the world.
Who will want to buy anything from China with electronics in it?
Kelly Jackson Higgins
50%
50%
Kelly Jackson Higgins,
User Rank: Strategist
7/11/2014 | 6:52:19 AM
Re: Supply Chain Attacks: Handheld Scanners to Datacenter Servers
Good point, @LUFU. I also think that politically, the US became a little less loud about it after the NSA revelations--specifically, TAO's ops.
LUFU
100%
0%
LUFU,
User Rank: Apprentice
7/10/2014 | 6:44:21 PM
Re: Supply Chain Attacks: Handheld Scanners to Datacenter Servers
@Kelly - I think concerns about using Chinese-made technology has never really abated, at least within the US defense industry. Where it has probably been downplayed somewhat has been within the commercial sector with security taking a backseat to doing business. That may change as the threats are exposed.
Kelly Jackson Higgins
100%
0%
Kelly Jackson Higgins,
User Rank: Strategist
7/10/2014 | 4:21:42 PM
Re: Supply Chain Attacks: Handheld Scanners to Datacenter Servers
@CrypTodd, I definitely had the same thoughts. This definitely has shades of TAO techniques, but with what appears to be an interest in who's shipping what and to whom. I also wonder if it will revive concerns about using Chinese-made technology that could be tainted with malware. And you're right--bad guys looking to make a buck could also employ these same techniques (if they're not already). #supplychain 
CrypTodd01
100%
0%
CrypTodd01,
User Rank: Apprentice
7/10/2014 | 3:01:06 PM
Supply Chain Attacks: Handheld Scanners to Datacenter Servers
Super-interesting article - I have not seen much in the way of supply chain compromises until this news came along.  This same attack technique (modifying firmware to go after systems) could be used against other pieces of the IT supply chain (NIC cards, server firmware).  I think some of the NSA Tailored Access Operations (TAO) catalog had similar techniques.  It is simply a matter of time before bad guys use the techniques pioneered by sophisticated state actors against other pieces of IT infrastructure that contain sensitive information (if they are not doing so already).  IT shops had better start attesting the integrity of your infrastructure or risk having it compromised. 

CrypTodd
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-2227
Published: 2014-07-25
The default Flash cross-domain policy (crossdomain.xml) in Ubiquiti Networks UniFi Video (formerly AirVision aka AirVision Controller) before 3.0.1 does not restrict access to the application, which allows remote attackers to bypass the Same Origin Policy via a crafted SWF file.

CVE-2014-5027
Published: 2014-07-25
Cross-site scripting (XSS) vulnerability in Review Board 1.7.x before 1.7.27 and 2.0.x before 2.0.4 allows remote attackers to inject arbitrary web script or HTML via a query parameter to a diff fragment page.

CVE-2014-5100
Published: 2014-07-25
Multiple cross-site request forgery (CSRF) vulnerabilities in Omeka before 2.2.1 allow remote attackers to hijack the authentication of administrators for requests that (1) add a new super user account via a request to admin/users/add, (2) insert cross-site scripting (XSS) sequences via the api_key_...

CVE-2014-5101
Published: 2014-07-25
Multiple cross-site scripting (XSS) vulnerabilities in WeBid 1.1.1 allow remote attackers to inject arbitrary web script or HTML via the (1) TPL_name, (2) TPL_nick, (3) TPL_email, (4) TPL_year, (5) TPL_address, (6) TPL_city, (7) TPL_prov, (8) TPL_zip, (9) TPL_phone, (10) TPL_pp_email, (11) TPL_authn...

CVE-2014-5102
Published: 2014-07-25
SQL injection vulnerability in vBulletin 5.0.4 through 5.1.3 Alpha 5 allows remote attackers to execute arbitrary SQL commands via the criteria[startswith] parameter to ajax/render/memberlist_items.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Sara Peters hosts a conversation on Botnets and those who fight them.