Vulnerabilities / Threats
5/8/2012
05:06 PM
Connect Directly
RSS
E-Mail
50%
50%

Targeted Attack Infiltrates At Least 20 Companies

Attackers conducted a sustained espionage campaign against a score of private- and public-sector targets with links to policies of interest to China

Beginning in mid-2011, a widespread series of cyberattacks targeted more than a score of private firms, think tanks, and government organizations with links to policies of interest to China.

While attributing attacks to a specific actor is difficult, the attackers used a common command-and-control server to manage the exploitation and control of computers within each victim's network. In its research into the attacks -- dubbed Project Enlightenment -- security intelligence firm Cyber Squared managed to infiltrate the attackers' communications channel and gather information on the attacks, says the firm's CEO Adam Vincent.

"We were able to monitor the threat as they interacted with the victims, specifically tested their exploits, ran their exploits, potentially found their exploits were not executing, and then ran new exploits," Vincent says. "At that point, they sat back and managed the victim over time."

The targets of the attacks were diverse: A mining corporation with interests in the automotive industry. Canadian judicial offices handling the extradition of a Chinese national. A major law firm with clients all over the globe. And an international maritime group with connections to the United Nations.

While at first blush the victims appeared to have little in common, each had some link to Chinese strategic interests, Vincent says.

"A lot of work isn't on the technical side -- it was actually figuring out why: Why was a company attacked on this day," Vincent says. "We had to analyze dozens of victims in order to be able to say that this was for a certain strategic purpose."

The news of the attacks came the same week that the United States' Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) issued an alert about a sustained campaign of phishing attempts aimed at infiltrating the natural gas pipeline sector. The attacks, which started in December, appeared to have breached several utilities; alerts issued to the natural gas sector requested that companies allow the attacks to continue, apparently to aid U.S. intelligence gathering, according to an article in the Christian Science Monitor.

Such attacks appear to becoming more numerous and tenacious, says Tom Patterson, lead partner for security company CSC's consulting group.

"The attackers are looking at specifically seeing which employees at which companies are good targets for an attack," he says. "That's what our clients are seeing right now."

[Researchers revealed details of a new advanced persistent threat attack that uses a combination of methods in an effort to steal sensitive operations, exploration, and financial data from petroleum and energy companies. See 'Night Dragon' Attacks Threaten Major Energy Firms.] 

The attack discovered by Cyber Squared began in early- to mid-2011, but was not discovered until a September phishing attack targeted a policy organization that had a central role in the Taiwanese Airpower Modernization Act (TAMA). The phishing attack failed to succeed, but the organization asked Cyber Squared to investigate, says Vincent, who refrained from giving specific details of the victims of the attacks.

The TAMA organization foiled that specific attack, but a persistent adversary will mostly like get into a company's network, Vincent says.

"Anyone that a sophisticated adversary targets, the adversary knows what they have and knows they can go one step above that organization's defenses to gain a foothold," he says.

Companies in specific industries should band together and share information on attacks that target their industries, says CSC's Patterson. In addition, threat intelligence can help companies determine where they should focus their defensive efforts.

While users can help companies stave off attackers, targeted firms should not rely on their users making the right choice, says Anup Ghosh, founder and CEO of endpoint security firm Invincea.

"Many companies think, 'If I could only get my users to be smarter, then I wouldn't have this problem," he says. "But instead of blaming the users, we need to try a different tactic -- training and awareness are not going to get us there."

Of course, companies have to care about security enough to put up a good defense. In the case of Project Enlightenment, not a single victim responded to Cyber Squared's warning about their breaches. Some may have shut down the attackers based on information provided by the firm, but others continue to be compromised, Vincent says.

"They are still operating many of their espionage campaigns," he says.

Have a comment on this story? Please click "Add Your Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-6117
Published: 2014-07-11
Dahua DVR 2.608.0000.0 and 2.608.GV00.0 allows remote attackers to bypass authentication and obtain sensitive information including user credentials, change user passwords, clear log files, and perform other actions via a request to TCP port 37777.

CVE-2014-0174
Published: 2014-07-11
Cumin (aka MRG Management Console), as used in Red Hat Enterprise MRG 2.5, does not include the HTTPOnly flag in a Set-Cookie header for the session cookie, which makes it easier for remote attackers to obtain potentially sensitive information via script access to this cookie.

CVE-2014-3485
Published: 2014-07-11
The REST API in the ovirt-engine in oVirt, as used in Red Hat Enterprise Virtualization (rhevm) 3.4, allows remote authenticated users to read arbitrary files and have other unspecified impact via unknown vectors, related to an XML External Entity (XXE) issue.

CVE-2014-3499
Published: 2014-07-11
Docker 1.0.0 uses world-readable and world-writable permissions on the management socket, which allows local users to gain privileges via unspecified vectors.

CVE-2014-3503
Published: 2014-07-11
Apache Syncope 1.1.x before 1.1.8 uses weak random values to generate passwords, which makes it easier for remote attackers to guess the password via a brute force attack.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Marilyn Cohodas and her guests look at the evolving nature of the relationship between CIO and CSO.