Threat Intelligence

10/4/2017
06:36 PM
Connect Directly
Twitter
LinkedIn
Google+
RSS
E-Mail
50%
50%

Nation-State Attackers Steal, Copy Each Other's Tools

When advanced actors steal and re-use tools and infrastructure from other attack groups, it makes it harder to attribute cybercrime.

New research indicates cybercriminals are making attacker attribution increasingly complex by re-using tools and tactics from other hacker groups.

Researchers on the Kaspersky Lab Global Research and Analysis Team (GReAT) found evidence that sophisticated threat actors are hacking other attack groups to steal victim data, borrow tools and techniques, repurpose exploits, and compromise the same infrastructure.

The result is a major attribution challenge. Reliable threat intelligence is based on identifying patterns and tools associated with a specific threat actor. These signs help security researchers map the targets and behaviors of different attackers. When hackers start hacking one another, using the same tools, and targeting the same victims, the model breaks down.

Kaspersky believes these types of attacks are most likely to be used among nation-state backed groups targeting foreign or less competent actors. IT security researchers should know how to detect and interpret these attacks so they can present their intelligence in context.

The idea behind this research was to better understand the practice of fourth-party collection through signal intelligence (SIGINT), which involves the interception of a foreign intelligence service's computer network exploitation (CNE) activity. Researchers observed attackers' actions and in doing so, found evidence showing they actively steal from one another.

"In less technical terms, fourth-party collection is the practice of spying on a spy spying on someone else," explain GReAT researchers Juan Andrés Guerrero-Saade and Costin Raiu in a post on Kaspersky's SecureList blog.

There are two main approaches to these attacks: passive and active. Passive involves intercepting other groups' data while it's in transit between victims and command-and-control (C&C) servers. It's almost impossible to detect. Active collection, however, leaves footprints.

Active attacks involve breaking into another threat actor's malicious infrastructure. It's dangerous for attackers because it heightens the risk of detection, but it's also beneficial. The success of active collection depends on the target making operational security errors.

During their investigation of specific threat actors, the GReAT team found several pieces of evidence suggesting these active attacks are already happening in the wild. These include:

Backdoors installed in another actors' C&C infrastructure

Researchers found two examples of backdoors in hacked networks, which let attackers persistently infiltrate another group's operations. One of these instances was discovered in 2013 during an investigation of the NetTraveler attacks. Researchers obtained a server and, during their analysis, discovered a backdoor seemingly placed by another actor. It's believed the goal was to maintain prolonged access to the NetTraveler infrastructure or the stolen data.

Another was found in 2014 while investigating a hacked website used by Crouching Yeti, also known as "Energetic Bear," an APT actor active since 2010. Researchers noticed the panel managing the C&C network was modified with a tag pointing to a remote IP in China, which is believed to be a false flag. They think this was also a backdoor belonging to another group.

Sharing compromised websites

In 2016, Kaspersky found a website hacked by DarkHotel also hosted exploit scripts for another attacker. The second, which was codenamed "ScarCruft," primarily targeted Russian, Chinese, and South Korean organizations. The actor relied on watering hole and spearphishing attacks.

Targeting attackers' focus areas

By infiltrating a group with stake in a specific region or industry, attackers can benefit from another group's work and specifically target certain groups of people. It's risky for attackers to share victims in the case one group gets caught; if they do, analysis will reveal who the other threat actors were.

In November 2014, Kaspersky researchers located a server in a Middle East research institution hosted implants for advanced actors Regin, Equation Group, Turla, ItaDuke, Animal Farm, and Careto. The discovery of this server marked the beginning of the eventual discovery of the Equation Group.

Related Content:

Join Dark Reading LIVE for two days of practical cyber defense discussions. Learn from the industry’s most knowledgeable IT security experts. Check out the INsecurity agenda here.

Kelly Sheridan is Associate Editor at Dark Reading. She started her career in business tech journalism at Insurance & Technology and most recently reported for InformationWeek, where she covered Microsoft and business IT. Sheridan earned her BA at Villanova University. View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
5 Reasons the Cybersecurity Labor Shortfall Won't End Soon
Steve Morgan, Founder & CEO, Cybersecurity Ventures,  12/11/2017
Oracle Product Rollout Underscores Need for Trust in the Cloud
Kelly Sheridan, Associate Editor, Dark Reading,  12/11/2017
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Gee, these virtual reality goggles work great!!! 
Current Issue
The Year in Security: 2017
A look at the biggest news stories (so far) of 2017 that shaped the cybersecurity landscape -- from Russian hacking, ransomware's coming-out party, and voting machine vulnerabilities to the massive data breach of credit-monitoring firm Equifax.
Flash Poll
[Strategic Security Report] How Enterprises Are Attacking the IT Security Problem
[Strategic Security Report] How Enterprises Are Attacking the IT Security Problem
Enterprises are spending more of their IT budgets on cybersecurity technology. How do your organization's security plans and strategies compare to what others are doing? Here's an in-depth look.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.