Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

5/4/2018
04:50 PM
Connect Directly
Twitter
LinkedIn
RSS
E-Mail
50%
50%

Report: China's Intelligence Apparatus Linked to Previously Unconnected Threat Groups

Multiple groups operating under the China state-sponsored Winnti umbrella have been targeting organizations in the US, Japan, and elsewhere, says ProtectWise.

Multiple previously unconnected Chinese threat actors behind numerous cyber campaigns aimed at organizations in the United States, Japan, and other countries over the past several years are actually operating under the control of the country's state intelligence apparatus.

An investigation by security vendor ProtectWise has shown that the groups operating under the so-called Winnti umbrella since at least 2009 share a common goal, common infrastructure, and often the same tactics, techniques, and procedures.

Many of the Winnti umbrella's initial attack targets have been software and gaming companies. Winnti threat groups also have shown a proclivity to attack smaller organizations with the intent of finding and stealing code-signing certificates, which they have then used to sign malware directed against higher-value targets.

Like almost every other threat actor, members of the Winnti umbrella typically have tended to use phishing lures to gain initial access to a target organization's networks, says ProtectWise. The groups have then used publicly available tools like Metasploit and Cobalt Strike or custom malware to expand their access and maintain a presence on the compromised network.

ProtectWise's report is based on its review of data from active compromises at multiple organizations, its analysis of external infrastructure used in attacks, and other telemetry.

The data set shows that the Winnti umbrella is a loosely organized collection of China-based threat actors that are currently being actively supported by intelligence agencies in the nation. Over the years, threat groups under the Winnti umbrella have been referred to by names such as BARIUM, GREF, PassCV, and Wicked Panda. Another member of the Winnti umbrella, with the alias LEAD, has for some time been associated with attacks on online gaming, telecom, and high-tech organizations.

"While inside knowledge of their operations is quite limited from any external research such as this, we can still assess with confidence that the various groups are functioning in a singular direction for a greater overall mission," says Tom Hegel, senior threat researcher at ProtectWise. Evidence suggests that Chinese intelligence agencies are supplying all the necessary resources to members of the Winnti umbrella, including finances and human skills.

Though each group within the Winnti umbrella has operated individually, the lines between them are often blurred because of the manner in which they have shared infrastructure, tactics, and tools. Winnti itself is a name that Kaspersky Lab created in a 2013 report on the group and of its targeting of organizations in the gaming industry to steal code-signing certificates, source code, technical documentation, and digital currencies.

In 2014, Novetta published a report on the group — which the vendor calls Axiom — and its links to China's intelligence organizations. The report cited Axiom's potential connections to Operation Aurora, a 2010 China-hosted campaign targeted at major US tech firms, including Google and Yahoo. Other entities that have reported at various times about Winnti's operations include Trend Micro, Citizen Lab, and Cylance.

ProtectWise says its report is the first to make public the previously unreported links that exist between the multiple Chinese state intelligence operations and the fact that they were all operating under the aegis of the Winnti umbrella.

"The various operations conducted by the Winnti umbrella and the associated entities vary depending on the target and their importance," Hegel says. The earlier-stage attacks against gaming and software companies seek internal tooling and code-signing certificates.

Based on ProtectWise's research and from other public research, the early-stage attacks appear to be a preparation for later attacks on more valuable targets.

"Attacks against high-value targets tend to be seeking information beneficial to the Chinese government, such as attacks on journalists, which present a threat to the Chinese government," he says.

Many of the group's targets have included high-tech companies, almost certainly because of the valuable data such firms can possess.

The Winnti umbrella's long-term goals appear to be political in nature. Some of its campaigns, for instance, have involved mimicking various Chinese-language news websites that normally are unavailable from within the country because of their content, Hegel says. A recent campaign involved sending phishing lures with the theme of strengthening sanctions against North Korea to unknown targets.

Attacks against some high-value technology companies have involved a political agenda as well, but ProtectWise is not at liberty to share specific details, Hegel says.

Related Content:

 

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year ... View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 7/28/2020
Q&A: How Systemic Racism Weakens Cybersecurity
Kelly Jackson Higgins, Executive Editor at Dark Reading,  7/22/2020
Cybersecurity Lessons from the Pandemic
Monica Verma, CISO and Board Member of Cloud Security Alliance Norway,  7/22/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: ...your gonna need a bigger castle
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Threat from the Internet—and What Your Organization Can Do About It
The Threat from the Internet—and What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-16094
PUBLISHED: 2020-07-28
In imap_scan_tree_recursive in Claws Mail through 3.17.6, a malicious IMAP server can trigger stack consumption because of unlimited recursion into subdirectories during a rebuild of the folder tree.
CVE-2020-5377
PUBLISHED: 2020-07-28
Dell EMC OpenManage Server Administrator (OMSA) versions 9.4 and prior contain multiple path traversal vulnerabilities. An unauthenticated remote attacker could potentially exploit these vulnerabilities by sending a crafted Web API request containing directory traversal character sequences to gain f...
CVE-2020-15899
PUBLISHED: 2020-07-28
Grin 3.0.0 before 4.0.0 has insufficient validation of data related to Mimblewimble.
CVE-2020-15419
PUBLISHED: 2020-07-28
This vulnerability allows remote attackers to disclose sensitive information on affected installations of Veeam ONE 10.0.0.750_20200415. Authentication is not required to exploit this vulnerability. The specific flaw exists within the Reporter_ImportLicense class. Due to the improper restriction of ...
CVE-2020-15416
PUBLISHED: 2020-07-28
This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of NETGEAR R6700 V1.0.4.84_10.0.58 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the httpd service, which listens on TCP port 80 by default...