Risk
3/21/2013
12:44 PM
50%
50%

Hackers Eavesdrop Using Legitimate Remote Control Software

For a decade, "TeamSpy" cyber espionage campaign has used TeamViewer software already installed on PCs to eavesdrop on communications and steal data from targets in Eastern Europe.

Anonymous: 10 Things We Have Learned In 2013
Anonymous: 10 Things We Have Learned In 2013
(click image for larger view and for slideshow)
Remote administration tool users beware: An online espionage group that's been operating for the past decade has been surreptitiously accessing legitimate TeamViewer remote administration tools already installed on PCs to remotely eavesdrop on targets.

That warning was sounded Wednesday by the Laboratory of Cryptography and System Security (CrySyS Lab) of the Budapest University of Technology and Economics in Hungary, which began investigating the espionage operation after being approached by the Hungarian National Security Authority, which detected related attacks targeting organizations inside Hungary. The two organizations have written a detailed report into the attacks, which they released Wednesday.

CrySys is well known in security circles for discovering the Duqu malware, as well as working with Kaspersky Lab to discover the complex Flame malware.

[ Twitter users must beware, too. Read MiniDuke Espionage Malware Uses Twitter To Infect PCs. ]

What's interesting about this newly discovered "covert cross-nation, cyber surveillance data theft and monitoring operation" -- in the words of a Kaspersky Lab blog entry published Wednesday -- is that instead of compromising targeted PCs with malware, it exploits the popular TeamViewer remote control, desktop sharing and file transfer software. The application and related services are free for non-commercial use, and count over 100 million users.

Dubbed the TeamSpy attacks, they remain ongoing, and have largely targeted Eastern European countries, including the Commonwealth of Independent States, which includes Russia. CrySyS said that the group behind the attacks seems to have been operating since at least 2004.

According to a CrySyS blog entry posted Wednesday, it first encountered evidence of the TeamSpy campaign when it studied recovered malware samples from November 2012, when a "Hungarian high profile governmental victim" was infected. Other high-profile victims it's identified include a Iranian high-technology firm with government ties, which was attacked in April 2010, as well as the NATO/EU embassy in Russia, a Russian industrial manufacturer, and French and Belgian research and educational organizations, all of which were successfully attacked in March 2013. Activists in Belarus also spotted attacks in 2012 that have since been tied to the TeamSpy campaign.

Information targeted by attackers has included Word documents, Excel spreadsheets, PDF files, PGP credentials and other files related to public-key cryptography, as well as filenames containing Georgian and Russian words for "secret" and "password." According to Kaspersky Lab, attackers also targeted "Apple iOS device history data from iTunes," as well as detailed information about operating systems and BIOS. Attackers could also log keystrokes and capture screenshots.

CrySyS Lab said that the types of files and documents targeted "indicates that they were looking not only for passwords, but also for cryptographic keys, which goes beyond attacks against ordinary users."

Who's behind the attacks? So far, information is scant. Much of the attack infrastructure appears to have been written in Russian. Furthermore, some of the command-and-control servers used in the attacks contained references to the politnews.org website, which CrySyS said was registered in the name of "Krepov Bogdan Serafimovich."

Security researchers have yet to detail exactly how targeted PCs running TeamViewer were compromised by attackers, other than to say that the infections appear to have resulted from a Windows installer -- built using NullSoft installer -- being executed. The two versions of this installer recovered to date were named "DSC.exe" and "TeamViewer.ico."

Those installers were used to drop malware onto compromised PCs. "The TeamSpy operations are supplemented by a variety of custom-built surveillance modules," including "reconnaissance and stealth modules," said Kaspersky Lab. Those modules have included a DLL file "that uses a vulnerability in TeamViewer v6 known as DLL-hijacking," it said. "If this file is stored in the same folder as TeamViewer.exe, then when TeamViewer is started it will show no warning, no popups, no systray icons, and will silently continue working, providing remote access to the infected machine."

But overall, Kaspersky Lab said the attack code wasn't highly sophisticated, and surmised that the choice of TeamViewer as an attack platform related to attackers' limited budget or expertise. "The toolset demonstrates clever, although lazy choices about legitimate software and certificate abuse, along with a minimal but effective effort at using simple and crude custom encryption algorithms," it said.

InformationWeek is conducting a survey on security and risk management. Take the InformationWeek 2013 Strategic Security Survey today. Survey ends March 29.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
PJS880
50%
50%
PJS880,
User Rank: Ninja
4/2/2013 | 3:44:09 PM
re: Hackers Eavesdrop Using Legitimate Remote Control Software
That is some very scary information, and the fact the hackers have been doing this for over a decade. Let me further point out the by Kaspersky Lab stating that the code is not highly sophisticated kind of pushes my buttons. I mean if it was not highly sophisticated then how did it gets through and how was it able to infect various computers. Apparently it was a little highly sophisticated then their filters to pick it up.

Paul Sprague
InformationWeek Contributor
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Tech Digest, Dec. 19, 2014
Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-3971
Published: 2014-12-25
The CmdAuthenticate::_authenticateX509 function in db/commands/authentication_commands.cpp in mongod in MongoDB 2.6.x before 2.6.2 allows remote attackers to cause a denial of service (daemon crash) by attempting authentication with an invalid X.509 client certificate.

CVE-2014-7193
Published: 2014-12-25
The Crumb plugin before 3.0.0 for Node.js does not properly restrict token access in situations where a hapi route handler has CORS enabled, which allows remote attackers to obtain sensitive information, and potentially obtain the ability to spoof requests to non-CORS routes, via a crafted web site ...

CVE-2004-2771
Published: 2014-12-24
The expand function in fio.c in Heirloom mailx 12.5 and earlier and BSD mailx 8.1.2 and earlier allows remote attackers to execute arbitrary commands via shell metacharacters in an email address.

CVE-2014-3569
Published: 2014-12-24
The ssl23_get_client_hello function in s23_srvr.c in OpenSSL 1.0.1j does not properly handle attempts to use unsupported protocols, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via an unexpected handshake, as demonstrated by an SSLv3 handshak...

CVE-2014-4322
Published: 2014-12-24
drivers/misc/qseecom.c in the QSEECOM driver for the Linux kernel 3.x, as used in Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, does not validate certain offset, length, and base values within an ioctl call, which allows attackers to gain privileges or c...

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Join us Wednesday, Dec. 17 at 1 p.m. Eastern Time to hear what employers are really looking for in a chief information security officer -- it may not be what you think.