Attacks/Breaches
5/16/2017
02:30 PM
Connect Directly
Twitter
Twitter
RSS
E-Mail
50%
50%

New Threat Research Shows Vietnam a Rising Force in Cyberespionage

FireEye report on APT32 puts evidence together of a group attacking private and public targets for the sake of Vietnamese state interests.

Forget China and Russia. New evidence out this week suggests that a new font of cyberespionage has woken up from different nation-state source than the usual suspects: Vietnam.

According to research released by FireEye, a patchwork of evidence from three years of disparate malicious activities points to a group that's been focusing its targeted operations to benefit Vietnamese state interests. Putting the pieces together indicates that Vietnam could be a rising player in cyberespionage.

According to FireEye, OceanLotusGroup - or APT32 as FireEye has dubbed the group - since 2014 primarily has been targeting large multinational businesses with interests in Vietnam and headquarters in German, China, the Philippines, the US, the UK, and Vietnam.

"Since at least 2014, FireEye has observed APT32 targeting foreign corporations with a vested interest in Vietnam’s manufacturing, consumer products, and hospitality sectors," writes Nick Carr, senior manager of security consulting and incident response for Mandiant, a FireEye company. "Furthermore, there are indications that APT32 actors are targeting peripheral network security and technology infrastructure corporations, as well as consulting firms that may have connections with foreign investors."

Some of the attacks FireEye investigations are considering potentially coming at the hands of the group include a 2014 compromise of a European corporation prior to constructing a manufacturing facility in Vietnam, plus attacks in 2016 against a global hospitality industry developer with plans to expand into the country and against foreign consumer products corporations.

Most recently in 2017, the group likely compromised the Vietnamese offices of a global consulting firm. Additionally, FireEye believes that APT32 has targeted foreign governments and Vietnamese dissidents and journalists since 2013. This includes an attack that year that was reported on by the Electronic Frontier Foundation against journalists, activists, and dissidents.

At the time, EFF's Eva Galperin and Morgan Marquis-Boire wrote that evidence of Vietnam's cyberespionage goes back even farther than the 2013 attack that used techniques that match APT32's playbook.

"Malware is a tool that most states have their toolbox, and Vietnam is no exception. For the last several years, the communist government of Vietnam has used malware and RATs to spy on journalists, activists, dissidents, and bloggers, while it cracks down on dissent," they wrote. "Vietnam's Internet spying campaign dates back to at least March 2010."

Most recently, FireEye says that playbook has been to use malware that uses ActiveMime files and social engineering to get victims to enable macros in multilingual documents that then initialize downloads of malicious payloads. This is combined with relentless spearphishing attacks against victims to continue to deliver malicious attachments to their systems. To track the efficacy of their phishing efforts they used the same kind of cloud-based email analytics software that corporations use to keep track of marketing campaigns. 

"In some instances, APT32 abandoned direct email attachments altogether and relied exclusively on this tracking technique with links to their ActiveMime lures hosted externally on legitimate cloud storage services," Carr wrote. "To enhance visibility into the further distribution of their phishing lures, APT32 utilized the native web page functionality of their ActiveMime documents to link to external images hosted on APT32 monitored infrastructure."

Once a foothold is established on systems using PowerShell-based tools, APT32 regularly clears select event-log entries and uses the Invoke-Obfuscation framework to hide these tools and signs of their activity. The group goes to great lengths to maintain stealthy persistence. For example, in one case FireEye found that the group compromised the McAfee ePO infrastructure to make it so that victims pulled a malicious payload directly from the ePO server through McAfee's proprietary protocol.

According to FireEye, APT32's signature malware payloads include WINDSHIELD, KOMPROGO, SOUNDBITE, and PHOREAL.

FireEye analysis says all of this infrastructure and activity is likely to carry out a number of political and economic objectives. This includes using longstanding private sector compromises as a platform for law enforcement, intellectual property theft and economic espionage. It also includes threatening political activism and free speech in Vietnam and throughout the Vietnam diaspora worldwide. 

"APT32 demonstrates how accessible and impactful offensive capabilities can be with the proper investment and the flexibility to embrace newly-available tools and techniques," writes Carr. "As more countries utilize inexpensive and efficient cyber operations, there is a need for public awareness of these threats and renewed dialogue around emerging nation-state intrusions that go beyond public sector and intelligence targets."

Related Content:

Ericka Chickowski specializes in coverage of information technology and business innovation. She has focused on information security for the better part of a decade and regularly writes about the security industry as a contributor to Dark Reading.  View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
Dark Reading Live EVENTS
INsecurity - For the Defenders of Enterprise Security
A Dark Reading Conference
While red team conferences focus primarily on new vulnerabilities and security researchers, INsecurity puts security execution, protection, and operations center stage. The primary speakers will be CISOs and leaders in security defense; the blue team will be the focus.
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: No, no, no! Have a Unix CRON do the pop-up reminders!
Current Issue
Security Vulnerabilities: The Next Wave
Just when you thought it was safe, researchers have unveiled a new round of IT security flaws. Is your enterprise ready?
Flash Poll
The Impact of a Security Breach 2017
The Impact of a Security Breach 2017
Despite the escalation of cybersecurity staffing and technology, enterprises continue to suffer data breaches and compromises at an alarming rate. How do these breaches occur? How are enterprises responding, and what is the impact of these compromises on the business? This report offers new data on the frequency of data breaches, the losses they cause, and the steps that organizations are taking to prevent them in the future.
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.