Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Threat Intelligence

3/1/2016
04:21 AM
Connect Directly
Twitter
RSS
E-Mail
50%
50%

Chinese Threat Intel Start-up Finds DarkHotel Exploiting Chinese Telecom

New China-based threat intelligence company ThreatBook wants to be the 'trusted contact in China.'

SAN FRANCISCO, RSA Conference -- The DarkHotel threat group is targeting executives at telecommunications companies in North Korea and China, already compromising at least one, according to researchers at Beijing-based threat intelligence start-up ThreatBook.

In operation since 2007, DarkHotel is named for their habit of exploiting executives while they were using unsecured hotel WiFi networks, a behavior the group has since abandoned. In this campaign, which ThreatBook refers to as DarkHotel Operation 8651, the group is using spearphishing messages with malicious documents attached -- specifically, a crafted SWF file embedded as a downloadable link in a Word document.

The SWF file exploits Adobe Flash vulnerability CVE-2015-8651. According to ThreatBook, the earliest infections associated with that bug and this campaign are Dec. 24. Adobe released an out-of-band patch for it Dec. 28.

The payload, update.exe, is a Trojan downloader, disguised as a component of OpenSSL. It then uses a variety of anti-detection measures, including anti-sandbox, and anti-anti-virus, as well as just-in-time decryption.

Feng Xue and Hong Jia, friends from their days working at Microsoft, first had the idea to start ThreatBook in May. After a hurried meeting at the Beijing airport Starbucks during Jia's two-hour layover en route to Redmond, Wash., the two quit their jobs -- Jia as principal anti-virus research manager at Microsoft and Feng as CISO of Amazon.cn -- and launched ThreatBook in June.

"I never thought I would leave [Microsoft]," says Jia. "The career path was quite good and I love Microsoft."

"I got excited and I could not sleep," says Xue.

The idea that hooked Xue and Jia was realizing that there was no threat intelligence market in China, but the need for one was great.

"Threat intelligence is not just a tool, it's a new wave. A trend," says Xue.

ThreatBook uncovered information about the identity and intentions of the XCodeGhost authors in October. This week they are exhibiting at RSA, introducing their security threat analysis platform and Threat Intelligence Center.

Xue says that at previous positions he's held there was a lack of understanding of China's unique landscape. He'd have to spend some of time at old jobs educating colleagues about, for example, enormous cybersecurity incidents in China that are so underreported in the West that they aren't even mentioned in yearly wrap-ups of top global attacks. "I feel sometimes frustrated," Xue says.

Jia says this is one of the things she wants ThreatBook to be able to fix. She says their focus is China-focused threat intelligence, and they're very open to exchanging information with other companies and other organizations.

"Our company is a bridge," she says. "We want to be the trusted contact in China."

Related Content:

 

Interop 2016 Las Vegas

Find out more about security threats at Interop 2016, May 2-6, at the Mandalay Bay Convention Center, Las Vegas. Register today and receive an early bird discount of $200.

Sara Peters is Senior Editor at Dark Reading and formerly the editor-in-chief of Enterprise Efficiency. Prior that she was senior editor for the Computer Security Institute, writing and speaking about virtualization, identity management, cybersecurity law, and a myriad ... View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 8/14/2020
Lock-Pickers Face an Uncertain Future Online
Seth Rosenblatt, Contributing Writer,  8/10/2020
Hacking It as a CISO: Advice for Security Leadership
Kelly Sheridan, Staff Editor, Dark Reading,  8/10/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
7 New Cybersecurity Vulnerabilities That Could Put Your Enterprise at Risk
In this Dark Reading Tech Digest, we look at the ways security researchers and ethical hackers find critical vulnerabilities and offer insights into how you can fix them before attackers can exploit them.
Flash Poll
The Changing Face of Threat Intelligence
The Changing Face of Threat Intelligence
This special report takes a look at how enterprises are using threat intelligence, as well as emerging best practices for integrating threat intel into security operations and incident response. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-17475
PUBLISHED: 2020-08-14
Lack of authentication in the network relays used in MEGVII Koala 2.9.1-c3s allows attackers to grant physical access to anyone by sending packet data to UDP port 5000.
CVE-2020-0255
PUBLISHED: 2020-08-14
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2020-10751. Reason: This candidate is a duplicate of CVE-2020-10751. Notes: All CVE users should reference CVE-2020-10751 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidenta...
CVE-2020-14353
PUBLISHED: 2020-08-14
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2017-18270. Reason: This candidate is a duplicate of CVE-2017-18270. Notes: All CVE users should reference CVE-2017-18270 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidenta...
CVE-2020-17464
PUBLISHED: 2020-08-14
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.
CVE-2020-17473
PUBLISHED: 2020-08-14
Lack of mutual authentication in ZKTeco FaceDepot 7B 1.0.213 and ZKBiosecurity Server 1.0.0_20190723 allows an attacker to obtain a long-lasting token by impersonating the server.