Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

7/9/2013
06:48 PM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

Cyberspies Posing As Hacktivists Waged Cyberattacks To Steal South Korean, U.S. Military Intel

Four-year cyberespionage campaign tied to wave of attacks on South Korea- -- all to steal military secrets

Attackers long have used distributed denial-of-service (DDoS) attacks as cover for more nefarious hacking activity. But it turns out the recent high-profile DDoS and data destruction attacks on major South Korean banks, media outlets, and other entities were also a glaring example of such subterfuge, as cyberespionage actors posed as hacktivists knocking websites offline and wiping hard drives -- while in the background quietly stealing military secrets about South Korea and the U.S.

The so-called Dark Seoul DDoS and data annihilation attack on South Korean entities on March 20 has now been tied to earlier campaigns against South Korean targets, as well as the most recent attacks on June 25, according to new research by McAfee. The attacks are all part of a four-year effort to steal information about South Korean military and government operations that McAfee has dubbed Operation Troy, which also targeted U.S. Forces Korea, Republic of Korea, the Korean Department of Defense, and the U.S. Department of Defense, according to McAfee. "The attacks on South Korean targets were actually the conclusion of a covert espionage campaign," according to McAfee's report.

Waves of cyberattacks on South Korean banks and media networks at 2 p.m. local time on March 20 wiped the hard drives of tens of thousands of computers and defaced machines with a message from "The WhoIs Team." Network provider LG + U's website was defaced as well. Another group that went by the name NewRomanic Cyber Army Team via a pop-up Web message on some of the victim sites claimed to have in its possession personal data stolen from the victim organizations.

Most recently, South Korean universities were hit by massive malware infections. Aviv Raff, CTO at Seculert, said the malware used in the attacks -- PinkStats -- had been in use for more than four years, targeting various nation-states and organizations worldwide. While Raff didn't find any direct connection to the March 20 attacks, he noted that PinkStats was written by Chinese-speaking attackers, so the plot thickens on whether North Korea, China, or a combination thereof are the perpetrators of the attacks on South Korea.

Meanwhile, all of the loud and destructive hacking and claiming of responsibility posing as hacktivist activity was a ruse to hide old-fashioned cyberespionage. And the series of attacks against South Korea were all waged by one well-heeled and sophisticated entity, McAfee researchers say. "The main takeaway here is what we saw on June 25, March 20, and previous attacks [on South Korea] were not just isolated incidents: There was more to those than the destructive component and [disruption of website] availability," says Jim Walter, manager of the McAfee Threat Intelligence Service (MTIS) for the Office of the CTO. "These things are tied together."

Walter says the systems the attackers wiped already had been under their control for some time, thanks to the Operation Troy's botnet and sophisticated malware. "It took a certain amount of coordination for the [March destruction] on that number of machines," he says.

Symantec last month concluded the gang behind the DarkSeoul attacks had been in action for four years in attacks on South Korea, including the June 25 attacks -- the anniversary of the start of the Korean war -- the March attacks on banks and media outlets, and the May attacks on South Korean banks.

"Symantec expects the DarkSeoul attacks to continue and, regardless of whether the gang is working on behalf of North Korea or not, the attacks are both politically motivated and have the necessary financial support to continue acts of cybersabotage on organizations in South Korea ... the DarkSeoul gang is almost unique in its ability to carry out such high-profile and damaging attacks over several years," Symantec researchers said in a blog post last month. A Symantec spokesperson said the company at this time has no other information to share about the attacks beyond that research note.

[Spearphishing email discovered as a possible initial attack vector, malicious Android mobile clue found. See South Korea Attackers Set Time Bomb For Data-Destroying Malware.]

Malware used in the attacks is tied to code first created in 2009, and the attackers from the start were attempting to pilfer intelligence from South Korea military targets. The remote access Trojan employed in the attacks and the malware for wiping the Master Boot Record (MBR) of the targeted computers were both compiled in late January, according to McAfee's findings. And victim zero was infected via a spearphishing attack prior to March 20.

The Trojan dropper was compiled just a few hours before the March attack, wiping the MBRs within minutes after it was unleashed.

The attackers also used an encrypted network and automated reconnaissance tools to sniff out "specific military information" on the victims' networks, according to McAfee's findings.

Darin Dutcher, cyberthreat researcher with Trend Micro, says the correlation of similar tools across the various attacks is interesting. "The correlation of similar tools across differing attacks over time are notable. Whether this is due to a concerted campaign by a single threat actor posing as multiple groups against a target or multiple threat actors using similar tools can be difficult to prove," Dutcher says.

McAfee's Walter won't conclude the attacks are nation-state-sponsored, but the characteristic earmarks of such an entity are there: "The level of sophistication alone, and the tools and tactics they utilized" rule out hacktivists, he says. The malware's time of compilation, distribution, and execution was well-coordinated and the work of a sophisticated group, he says.

"And their complex use of encryption through HTTP and IRC channels ... it's a level well above what we typically see from an everyday hacktivist group," he says.

So why destroy the victims' data? "It's similar to what we saw in Shamoon. Once the compromise was discovered, and [people] started tracking it back ... that's when those machines were wiped," he says. "It can be a similar situation on 3/20: Some people were starting to get [alerted] to what was going on, or a piece of the puzzle was discovered, and the safest [thing for the attackers] was to wipe the machines and get out," he says.

The data-destruction phase can signify the end of an attack campaign if the mission has been met, for instance, notes Trend Micro's Dutcher. "But it can also mean that those were the calculated and expendable exploited resources for that point in time, meaning that more actions can be expected be expected in the future," he says.

Researchers haven't closed the book on the cyberespionage campaign just yet. "Some of this is still unfolding," Walter says. "Some pieces may become more clear as we continue down this path, such as why the [South Korean] media components were so interesting" to the attackers, he says.

The full report by McAfee on Operation Troy is available here (PDF) for download.

Have a comment on this story? Please click "Add Your Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message. Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Threaded  |  Newest First  |  Oldest First
For Cybersecurity to Be Proactive, Terrains Must Be Mapped
Craig Harber, Chief Technology Officer at Fidelis Cybersecurity,  10/8/2019
A Realistic Threat Model for the Masses
Lysa Myers, Security Researcher, ESET,  10/9/2019
USB Drive Security Still Lags
Dark Reading Staff 10/9/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
2019 Online Malware and Threats
2019 Online Malware and Threats
As cyberattacks become more frequent and more sophisticated, enterprise security teams are under unprecedented pressure to respond. Is your organization ready?
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-17545
PUBLISHED: 2019-10-14
GDAL through 3.0.1 has a poolDestroy double free in OGRExpatRealloc in ogr/ogr_expat.cpp when the 10MB threshold is exceeded.
CVE-2019-17546
PUBLISHED: 2019-10-14
tif_getimage.c in LibTIFF through 4.0.10, as used in GDAL through 3.0.1 and other products, has an integer overflow that potentially causes a heap-based buffer overflow via a crafted RGBA image, related to a "Negative-size-param" condition.
CVE-2019-17547
PUBLISHED: 2019-10-14
In ImageMagick before 7.0.8-62, TraceBezier in MagickCore/draw.c has a use-after-free.
CVE-2019-17501
PUBLISHED: 2019-10-14
Centreon 19.04 allows attackers to execute arbitrary OS commands via the Command Line field of main.php?p=60807&type=4 (aka the Configuration > Commands > Discovery screen).
CVE-2019-17539
PUBLISHED: 2019-10-14
In FFmpeg before 4.2, avcodec_open2 in libavcodec/utils.c allows a NULL pointer dereference and possibly unspecified other impact when there is no valid close function pointer.