Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

Java 'Icefog' Malware Variant Infects US Businesses

APT attack campaign uses tough-to-detect Java backdoor to compromise US oil company and two other organizations.

9 Notorious Hackers Of 2013
9 Notorious Hackers Of 2013
(Click image for larger view and for slideshow.)

Beware Java-based malware that's been used to exploit at least three US-based organizations.

That warning of a new advanced persistent threat (APT) attack campaign came via Kaspersky Lab, which said that it's traced a malicious Java archive (a.k.a. JAR) file to eight infected systems inside three US-based organizations, which it declined to name. "Based on the IP address, one of the victims was identified as a very large American independent oil and gas corporation, with operations in many other countries," Kaspersky Lab researchers Costin Raiu, Vitaly Kamluk, and Igor Soumenkov said in a joint blog post Tuesday. "As of today, all victims have been notified about the infections. Two of the victims have removed it already."

The attacks have been tied to the Icefog APT attack campaign, which historically has used Windows Preinstallation Environment files to infect targets.

What's unusual about the latest attacks is that the "Javafog" malware used by attackers was, as the name implies, written in Java. Furthermore, it includes only basic functionality, such as the ability to upload files to a designated server, as well as change the command-and-control (C&C) server to which it reports. "The backdoor doesn't do much else," according to Kaspersky Lab. "It allows the attackers to control the infected system and download files from it. Simple, yet very effective."

[Will US tech businesses pay a steep price for government surveillance? See NSA Fallout: Why Foreign Firms Won’t Buy American Tech.]

Why bother with a backdoor written in Java? "Malware written in Java code, like the Javafog Trojan, is extremely difficult to detect and therefore can remain stealthy for longer periods of time," says Dana Tamir in an email. Tamir is director of enterprise security at IBM-owned Trusteer, which sells a number of products that employ Java. As of Tuesday, the malware was being spotted by only three out of 47 antivirus engines on VirusTotal.

Blocking Java-based malware isn't difficult, provided businesses can eradicate older versions of the Java browser plug-in. "To prevent Java exploits and malware-based infiltrations, it is important to restrict execution only to known trusted Java files," says Tamir. "Organizations should at least restrict execution to files that have been signed by trusted vendors, or downloaded from trusted domains."

Patching known vulnerabilities is also a must. Indeed, at least one of the Javafog infections resulted from attackers exploiting known vulnerabilities in systems inside targeted organizations. "In one particular case, we observed the attack commencing by exploiting a Microsoft Office vulnerability, followed by the attackers attempting to deploy and run Javafog, with a different C&C," the Kaspersky Lab researchers said. "We can assume that based on their experience, the attackers found the Java backdoor to be more stealthy and harder to notice, making it more attractive for long-term operations."

If so, that would represent a changeup in the tactics being employed by the group behind the normal "smash and grab" Icefog attack campaign, which Kaspersky Lab discovered in September 2013. Kaspersky Lab said it has targeted "government institutions, military contractors, maritime, and ship-building groups." Previously the majority of targets were located in Japan and South Korea.

Whereas most APT campaigns employ "low and slow" attacks to create an undetected, long-term presence inside a targeted network, Icefog attacks differ. Notably, attackers appeared to be grabbing what they wanted and then ceasing their attack. Kaspersky Lab said that modus operandi suggested that the attackers were a "cybermercenary group" intent on stealing only designated bits of information.

If so, who commissioned the Icefog campaign? According to threat intelligence firm CrowdStrike, which refers to the attack campaign as "Dagger Panda," it's being run from China, which suggests that the hackers for hire have the backing of the Chinese government.

Last year, Adam Meyers, CrowdStrike's head of intelligence, said that China's five-year plan to modernize its infrastructure, including adding more deep-sea military capabilities, appeared to tie to a series of cyberattacks against US targets. Those attacks resulted in the theft of information pertaining to satellite technology, torpedoes, naval antennas, radar, and a naval ballistic-missile defense system, amongst other technology, all of which would be useful for improving deep-sea operations.

Icefog-related attacks date to at least 2011. That's when related malware was first discovered, which exfiltrated data from infected systems via email, and which was used to successfully infect systems inside both the Japanese House of Representatives and House of Councillors. Subsequent versions of Icefog added C&C capabilities and script-based proxy servers. A Mac OS X version dubbed "Macfog" also appeared to have been used to successfully infect several hundred Mac systems.

Kaspersky Lab said that although it only recently verified Javafog's existence, the underlying JAR file dates to Nov. 30, 2012, which suggests that it was in use for some time before being discovered, and that it may tie to long-term operations against US targets. "This brings another dimension to the Icefog gang's operations, which appear to be more diverse than initially thought," the Kaspersky Lab researchers said.

Mathew Schwartz is a freelance writer, editor, and photographer, as well the InformationWeek information security reporter.

Next-gen intrusion-prevention systems have fuller visibility into applications and data. But do newer firewalls make IPS redundant? Also in the The IPS Makeover issue of Dark Reading Tech Digest: Find out what our 2013 Strategic Security Survey respondents have to say about IPS and firewalls. (Free registration required.)

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
BryanB881
50%
50%
BryanB881,
User Rank: Apprentice
1/16/2014 | 8:32:33 PM
Targeted Attacks are the Strongest Attacks
I think this kind of attack is more common than the public knows.  Corporate and Nation State sponsered espionage will continue to rise.  If a company, particulary a manufacturing/processing compnay has valuable trade secrets there are millions to be made by finding those out.  Once it's founds out a company uses antivirus X and Firewall Y high level programmers can buy the same set up and test agaisnt it until they have the perfect worm. 

IT budgets will grow to protect from this.  Security is going to be layered.  White/black lists.  Multi scanning with a variety of AV engines.  Sandboxing.  Of course employeed education has to be there too. 
Where Businesses Waste Endpoint Security Budgets
Kelly Sheridan, Staff Editor, Dark Reading,  7/15/2019
US Mayors Commit to Just Saying No to Ransomware
Robert Lemos, Contributing Writer,  7/16/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Now this is the worst micromanagment I've seen.
Current Issue
Building and Managing an IT Security Operations Program
As cyber threats grow, many organizations are building security operations centers (SOCs) to improve their defenses. In this Tech Digest you will learn tips on how to get the most out of a SOC in your organization - and what to do if you can't afford to build one.
Flash Poll
The State of IT Operations and Cybersecurity Operations
The State of IT Operations and Cybersecurity Operations
Your enterprise's cyber risk may depend upon the relationship between the IT team and the security team. Heres some insight on what's working and what isn't in the data center.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-17210
PUBLISHED: 2019-07-20
An issue was discovered in PrinterOn Central Print Services (CPS) through 4.1.4. The core components that create and launch a print job do not perform complete verification of the session cookie that is supplied to them. As a result, an attacker with guest/pseudo-guest level permissions can bypass t...
CVE-2019-12934
PUBLISHED: 2019-07-20
An issue was discovered in the wp-code-highlightjs plugin through 0.6.2 for WordPress. wp-admin/options-general.php?page=wp-code-highlight-js allows CSRF, as demonstrated by an XSS payload in the hljs_additional_css parameter.
CVE-2019-9229
PUBLISHED: 2019-07-20
An issue was discovered on AudioCodes Mediant 500L-MSBR, 500-MBSR, M800B-MSBR and 800C-MSBR devices with firmware versions F7.20A to F7.20A.251. An internal interface exposed to the link-local address 169.254.254.253 allows attackers in the local network to access multiple quagga VTYs. Attackers can...
CVE-2019-12815
PUBLISHED: 2019-07-19
An arbitrary file copy vulnerability in mod_copy in ProFTPD up to 1.3.5b allows for remote code execution and information disclosure without authentication, a related issue to CVE-2015-3306.
CVE-2019-13569
PUBLISHED: 2019-07-19
A SQL injection vulnerability exists in the Icegram Email Subscribers & Newsletters plugin through 4.1.7 for WordPress. Successful exploitation of this vulnerability would allow a remote attacker to execute arbitrary SQL commands on the affected system.