Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

12/2/2014
02:40 PM
Connect Directly
Twitter
RSS
E-Mail
100%
0%

FBI Warning Shows Targeted Attacks Don't Just Steal Anymore

An FBI advisory points to an increasing trend of destructive malware for activist, anti-forensics purposes.

As rumors and hazy news about the hack against Sony Pictures Entertainment continue to gel into credible theories about what exactly happened and who carried out the attack, one solid detail has emerged out of the mess. In the wake of the attack, the FBI has issued a warning against "destructive" malware that some experts believe could be tied to discoveries from the Sony attack.

A Reuters report this morning first broke news of the confidential FBI "flash" warning issued to a number of businesses yesterday. The agency counsels organizations to be on the lookout for malware that wipes data from infected machines. The malicious software even deletes the master boot record, effectively bricking systems and keeping them from booting up.

The FBI did not confirm whether the warning had anything to do with the Sony attack, but the timing suggests a connection. It came very soon after news broke that Sony's email systems were down for a week following an attack that stole unreleased motion pictures and potentially even pilfered employee healthcare and salary data, according to a report today from Krebs On Security. Some theorize that the attack may have been politically motivated to punish the studio for its impending release of The Interview, a movie about two journalists enlisted by the CIA to assassinate North Korea's Kim Jong Un.

Regardless of what really happened at Sony, the FBI warning stands in its own right as a caution to be doubly wary of attacks that could not only steal or leak information, but also threaten an organization's operational continuity. Such destructive malware capabilities are hardly new; researchers have been tracking wiper behavior for some time. One of the biggest examples of this was the attack against the Saudi Aramco oil company two years ago, which wiped 30,000 PCs clean using the Shamoon malware family. However, Shamoon was just a continuation of this class of data-destroying malware.

"This ability to destroy people's computers and wipe them clean has been around a couple of decades, but it has taken mass events, probably caused by the Iranian government and its proxies, to wake people up," Richard Bejtlich, then with Mandiant and now with FireEye, told Dark Reading at the time of the Aramco attack.

That trend only seems to continue. Tom Kellermann, chief cyber security officer for Trend Micro, says the North Koreans used similar tactics last year.

"The North Koreans began this type of campaign in 2013 with the detonation of MBR Wipers. Logic bombed throughout South Korea during the 'Dark Seoul' campaign," he says. This kind of nation-state activity could be just a taste of what's to come from both terror groups and financially motivated attackers. "Elite hacker crews have used wipers as anti-forensics countermeasures. In some unique instances, they initiate the counter measure from a secondary backdoor once the initial [command-and-control] is terminated."

Though wipers are still present in a relatively small proportion of attacks, the warning from the FBI is evidence that the trend may be snowballing quickly. According to Jeff Horne, vice president of emerging solutions for Accuvant, the use of wiper functionality is "more present today than it has ever been." He says that enterprises must factor this into their incident response procedures, because dealing with this kind of malware requires a much different touch than that given to targeted attacks in the past.

"It completely changes our remediation strategy if we find a piece of code that has a kill switch inside that controls the code and destroys the network if attackers don't maintain control of the code," says Horne. "A lot of energy companies, for example, cut off their Internet connection at the first sign of attack. But they need to be cognizant that some things have a time delay in them that says, 'If I can't connect to my server after 20 hours, then I'm going to blow up.'"

That's problematic, says Ron Gula, CEO and CTO at Tenable Network Security, considering that most organizations are just now tooling up to battle malware that simply steals information.

"If attacks like those against Sony continue against other US companies, 2015 will be a year of disrupted services," he says. "Most US-based companies have been preparing to avoid an embarrassing and financially damaging loss of sensitive data through exfiltration, such as the Target breach. They are not prepared for pure destruction of data."

Ericka Chickowski specializes in coverage of information technology and business innovation. She has focused on information security for the better part of a decade and regularly writes about the security industry as a contributor to Dark Reading.  View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
News
Former CISA Director Chris Krebs Discusses Risk Management & Threat Intel
Kelly Sheridan, Staff Editor, Dark Reading,  2/23/2021
Edge-DRsplash-10-edge-articles
Security + Fraud Protection: Your One-Two Punch Against Cyberattacks
Joshua Goldfarb, Director of Product Management at F5,  2/23/2021
News
Cybercrime Groups More Prolific, Focus on Healthcare in 2020
Robert Lemos, Contributing Writer,  2/22/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Building the SOC of the Future
Building the SOC of the Future
Digital transformation, cloud-focused attacks, and a worldwide pandemic. The past year has changed the way business works and the way security teams operate. There is no going back.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-27132
PUBLISHED: 2021-02-27
SerComm AG Combo VD625 AGSOT_2.1.0 devices allow CRLF injection (for HTTP header injection) in the download function via the Content-Disposition header.
CVE-2021-25284
PUBLISHED: 2021-02-27
An issue was discovered in through SaltStack Salt before 3002.5. salt.modules.cmdmod can log credentials to the info or error log level.
CVE-2021-3144
PUBLISHED: 2021-02-27
In SaltStack Salt before 3002.5, eauth tokens can be used once after expiration. (They might be used to run command against the salt master or minions.)
CVE-2021-3148
PUBLISHED: 2021-02-27
An issue was discovered in SaltStack Salt before 3002.5. Sending crafted web requests to the Salt API can result in salt.utils.thin.gen_thin() command injection because of different handling of single versus double quotes. This is related to salt/utils/thin.py.
CVE-2021-3151
PUBLISHED: 2021-02-27
i-doit before 1.16.0 is affected by Stored Cross-Site Scripting (XSS) issues that could allow remote authenticated attackers to inject arbitrary web script or HTML via C__MONITORING__CONFIG__TITLE, SM2__C__MONITORING__CONFIG__TITLE, C__MONITORING__CONFIG__PATH, SM2__C__MONITORING__CONFIG__PATH, C__M...