Attacks/Breaches
6/24/2013
09:48 PM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

South Korean Universities Targeted By Chinese-Speaking Hackers

'PinkStats' malware has been used for hacking nation-state targets for four years

A newly discovered attack tool used by multiple groups of Chinese-speaking attackers has infected more than 1,000 machines in South Korea -- mainly universities and other academic institutions.

The so-called PinkStats malware family has been in use over the past four years, targeting various nation-states and organizations around the globe, according to Aviv Raff, CTO at Seculert, which studied the malware and posted its findings today.

"This is the first proof that there are Chinese-speaking attackers targeting [South Korea] entities," says Raff, who stopped short at confirming the attackers were from China. Even so, he says it's likely that they are Chinese: "These type of custom-made tools are usually created by the people speaking the language used in the tool, [such as where] Mahdi used Farsi strings," he says.

There's no evidence, either, to confirm that PinkStats was also used in the attacks earlier this year on South Korean banks, media networks, and an ISP that wiped hard drives and attached drives of infected machines. They also crippled targeted organizations for hours, and the machines weren't able to reboot. There was speculation of a North Korea or China connection to the attacks.

[Researchers confirm data-destroying malware that hit South Korean media and banks doesn't completely erase data. See Data Can Be Recovered From South Korea Data-Wiping Attacks. ]

PinkStats is a Trojan downloader that can install additional malware components. It camouflages itself by posing as a Web statistics or counter service in its communications to the command-and-control server and in the attacker's administrative panel login window.

In the South Korean attack, PinkStats also downloaded a typical Chinese hacking tool called zxarps that acts as a worm to spread in the victim's local network, via address resolution protocol (ARP) poisoning. The malicious iFrame it injects includes an ActiveX file digitally signed by Thwate. Seculert says the signature was valid as of May 8 and uses "Microsoft Corporation" as the product name and "Liaocheng YuanEr Technology CO., ltd.," as the publisher name -- a phony South Korean company.

PinkStats also installs a DDoS malware tool that goes by "Win8.exe" and poses as South Korean antivirus company AhnLab's V3 Light Framework software. "Up until now, the adversary did not seem to send any specific instructions to the installed DDoS malware. However, with the recent incidents of DDoS attacks against South Korean infrastructure, it is reasonable to assume that this state could change anytime soon," Seculert said in its blog post.

Seculert's Raff says the attackers were trying to amass as much computing power as possible from the South Korean universities. They deployed an additional worm tool that spreads the PinkStats malware within the local university network," he says, probably in order to use the machines for DDoS attacks.

Raff says his firm discovered the PinkStats malware while analyzing one of its customer's logs. That analysis led to Seculert finding evidence of the South Korean attacks. What makes PinkStats unique is that it's a downloader posing as a legitimate Web statistics service. "So even if someone will try to investigate the URL of the malware communication and [get] to the login page, he will see a page saying that is a login for 'statistics administration,'" he says.

Other attacks using PinkStats have downloaded information-stealing Trojans as well, he says.

"It really depends on the group using this tool, and the intent of their current operation and phase," Raff says.

Have a comment on this story? Please click "Add Your Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message. Kelly Jackson Higgins is Senior Editor at DarkReading.com. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise Magazine, ... View Full Bio

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-0972
Published: 2014-08-01
The kgsl graphics driver for the Linux kernel 3.x, as used in Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, does not properly prevent write access to IOMMU context registers, which allows local users to select a custom page table, and consequently write ...

CVE-2014-2627
Published: 2014-08-01
Unspecified vulnerability in HP NonStop NetBatch G06.14 through G06.32.01, H06 through H06.28, and J06 through J06.17.01 allows remote authenticated users to gain privileges for NetBatch job execution via unknown vectors.

CVE-2014-3009
Published: 2014-08-01
The GDS component in IBM InfoSphere Master Data Management - Collaborative Edition 10.0 through 11.0 and InfoSphere Master Data Management Server for Product Information Management 9.0 and 9.1 does not properly handle FRAME elements, which makes it easier for remote authenticated users to conduct ph...

CVE-2014-3302
Published: 2014-08-01
user.php in Cisco WebEx Meetings Server 1.5(.1.131) and earlier does not properly implement the token timer for authenticated encryption, which allows remote attackers to obtain sensitive information via a crafted URL, aka Bug ID CSCuj81708.

CVE-2014-3534
Published: 2014-08-01
arch/s390/kernel/ptrace.c in the Linux kernel before 3.15.8 on the s390 platform does not properly restrict address-space control operations in PTRACE_POKEUSR_AREA requests, which allows local users to obtain read and write access to kernel memory locations, and consequently gain privileges, via a c...

Best of the Web
Dark Reading Radio