Attacks/Breaches
7/10/2014
10:32 AM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

Chinese Hackers Target Logistics & Shipping Firms With Poisoned Inventory Scanners

'ZombieZero' still actively pushing rigged handheld scanning devices, reviving concerns of doing business with Chinese tech companies.

Malware-poisoned handheld inventory scanners from China are stealing information from logistics and shipping firms as well as manufacturing companies around the globe in an attack campaign dubbed "ZombieZero" by the researchers who discovered it.

A Chinese manufacturer that sells the popular devices for scanning items shipped or transported apparently has been implanting the malware in its products, as well as via the Windows XP embedded version of the software on the scanner maker's support website. Researchers from TrapX Security, which today provided details of the attacks, say scanners with another variant of the same malware were also sold to a large robotics firm and seven other companies, which they did not name.

Logistics firms use the scanners to track shipments as they are loaded and unloaded from ships, trucks, and airplanes.

"The attackers were exfiltrating all [stolen information] to a database," says Carl Wright, general manager of TrapX. "They are very focused on manifests -- what's in it, what's the value of it."

Once the scanner is connected to the victim's wireless network, it attacks the corporate network via the server message block (SMB) protocol, and the scanned information, including origin, destination, contents, value, and shipper and recipient information, is sent to a botnet that terminates at the Lanxiang Vocational School purportedly located in the Shangdong province in China. The school has been linked to the infamous Operation Aurora cyber espionage campaign that hit Google, Adobe, Intel, and many other major US firms more than four years ago, and is located one block from the inventory scanner manufacturer in question, according to TrapX.

The botnet then sends the scanner a second piece of malware that targets the victim's corporate financial, customer, shipping, and manifest information. "That was able to take control of the ERP [enterprise resource planning] system," he says. This would, among other things, allow the attacker to make a package "disappear" or "reappear," he says. The attack targets a specific, major ERP system, says Wright, who declined to reveal the name of the product due to an investigation into the attacks.

He says it's difficult to discern if the attackers are after the logistics firms themselves or their customers.

"The exfiltration of all financial data as well as CRM data was achieved providing the attacker complete situational awareness and visibility into the shipping and logistics targets worldwide operations," TrapX said in a report it published today on the attacks.

The poisoned inventory scanners echo previous concerns raised by the US government about doing business with Chinese technology companies. Huawei, Lenovo, and ZTE were among those firms called out by US officials in the past amid concerns their products could be backdoored with cyberspying malware.

"We notified the manufacturer of the said hardware and software. They denied culpability," Wright says. "And two days ago, we saw the same APT code had morphed and hit a couple of manufacturing companies looking for other things. The same codebase."

Meanwhile in a separate development, a GAO report (PDF) warned of the vulnerability of US shipping ports to cyberattack, according to a report today in the The Wall Street Journal. The GAO says the Department of Homeland Security must do more to shore up security in maritime and other ports.

"It has been recognized for some time that the administrative and controls systems networks at shipping ports are not only vulnerable, but high-priority targets for malicious activity. Particularly concerning is the threat terrorist organizations present to these networks and the physical and information networks that are present," says Mike Brown, vice president and general manager of the global public sector at RSA. "Over the past couple of years, DHS has begun to award funding [grants] to port authorities who prioritize cyber security efforts in their grant submissions."

Meantime, TrapX says one ZombieZero victim company running 48 inventory scanners from the unnamed Chinese manufacturer found that 16 of the devices were infected with the malware. A firewall sits between the inventory scanner wireless network and the corporate network at one of its sites, and the firewall blocked the initial attack attempt. But then came a second attack via the RADMIN protocol, or port 4899, that bypassed the firewall. Nine corporate servers were infected with the cyberspying malware. Its second site was defenseless -- no firewall -- so the attack went through SMB and infiltrated the corporate network and ERP servers, according to TrapX.

"All scanner attacks targeted very specific corporate servers. The attack looked for and compromised servers that had the word 'finance' in their Host name," according to the report.

TrapX today also released a free tool for forensics investigators called Threat Inspector. "We've cobbled together some top open source tools and put in a front-end wizard that will allow any engineer to get forensics reports off infected machines," TrapX's Wright says.

The full report on ZombieZero is available here.

 

Kelly Jackson Higgins is Executive Editor at DarkReading.com. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
CharlieM299
50%
50%
CharlieM299,
User Rank: Apprentice
7/11/2014 | 12:16:47 PM
Great way to kill your business with everyone in the world.
Who will want to buy anything from China with electronics in it?
Kelly Jackson Higgins
50%
50%
Kelly Jackson Higgins,
User Rank: Strategist
7/11/2014 | 6:52:19 AM
Re: Supply Chain Attacks: Handheld Scanners to Datacenter Servers
Good point, @LUFU. I also think that politically, the US became a little less loud about it after the NSA revelations--specifically, TAO's ops.
LUFU
100%
0%
LUFU,
User Rank: Apprentice
7/10/2014 | 6:44:21 PM
Re: Supply Chain Attacks: Handheld Scanners to Datacenter Servers
@Kelly - I think concerns about using Chinese-made technology has never really abated, at least within the US defense industry. Where it has probably been downplayed somewhat has been within the commercial sector with security taking a backseat to doing business. That may change as the threats are exposed.
Kelly Jackson Higgins
100%
0%
Kelly Jackson Higgins,
User Rank: Strategist
7/10/2014 | 4:21:42 PM
Re: Supply Chain Attacks: Handheld Scanners to Datacenter Servers
@CrypTodd, I definitely had the same thoughts. This definitely has shades of TAO techniques, but with what appears to be an interest in who's shipping what and to whom. I also wonder if it will revive concerns about using Chinese-made technology that could be tainted with malware. And you're right--bad guys looking to make a buck could also employ these same techniques (if they're not already). #supplychain 
CrypTodd01
100%
0%
CrypTodd01,
User Rank: Apprentice
7/10/2014 | 3:01:06 PM
Supply Chain Attacks: Handheld Scanners to Datacenter Servers
Super-interesting article - I have not seen much in the way of supply chain compromises until this news came along.  This same attack technique (modifying firmware to go after systems) could be used against other pieces of the IT supply chain (NIC cards, server firmware).  I think some of the NSA Tailored Access Operations (TAO) catalog had similar techniques.  It is simply a matter of time before bad guys use the techniques pioneered by sophisticated state actors against other pieces of IT infrastructure that contain sensitive information (if they are not doing so already).  IT shops had better start attesting the integrity of your infrastructure or risk having it compromised. 

CrypTodd
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-6306
Published: 2014-08-22
Unspecified vulnerability on IBM Power 7 Systems 740 before 740.70 01Ax740_121, 760 before 760.40 Ax760_078, and 770 before 770.30 01Ax770_062 allows local users to gain Service Processor privileges via unknown vectors.

CVE-2014-0232
Published: 2014-08-22
Multiple cross-site scripting (XSS) vulnerabilities in framework/common/webcommon/includes/messages.ftl in Apache OFBiz 11.04.01 before 11.04.05 and 12.04.01 before 12.04.04 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors, which are not properly handled in a (1)...

CVE-2014-3525
Published: 2014-08-22
Unspecified vulnerability in Apache Traffic Server 4.2.1.1 and 5.x before 5.0.1 has unknown impact and attack vectors, possibly related to health checks.

CVE-2014-3563
Published: 2014-08-22
Multiple unspecified vulnerabilities in Salt (aka SaltStack) before 2014.1.10 allow local users to have an unspecified impact via vectors related to temporary file creation in (1) seed.py, (2) salt-ssh, or (3) salt-cloud.

CVE-2014-3587
Published: 2014-08-22
Integer overflow in the cdf_read_property_info function in cdf.c in file through 5.19, as used in the Fileinfo component in PHP before 5.4.32 and 5.5.x before 5.5.16, allows remote attackers to cause a denial of service (application crash) via a crafted CDF file. NOTE: this vulnerability exists bec...

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Three interviews on critical embedded systems and security, recorded at Black Hat 2014 in Las Vegas.