Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats //

Advanced Threats

3/11/2015
01:30 PM
Connect Directly
Google+
Twitter
RSS
E-Mail
100%
0%

Equation Group Cyberspying Activity May Date Back To The '90s

New Kaspersky Lab findings show how the 'master APT' nation-state group likely the longest-running cyber espionage gang of all, and newly discovered code artifacts include English-language clues.

The unprecedented cyber espionage operation conducted by the so-called Equation Group launched attacks mainly from a complex software platform that looks a lot like a mini operating system with carefully constructed components and plug-ins, researchers say.

Kaspersky Lab--which last month disclosed its findings on the highly advanced and well-funded nation-state actor--today published new details of the so-called EquationDrug software platform used by the group over the past 10 years. The research indicates that the Equation Group could have been active as far back as the 1990s, making it the longest-running cyber espionage group of all, according to Kaspersky Lab.

Igor Soumenkov, principal security researcher at Kaspersky Lab, says information on the timing of when the Equation Group registered command-and-control servers predate EquationDrug, and thus point to activity in the '90s. "There were also previous platforms like EquationLaser, which we didn't write much about. EquationLaser was before EquationDrug," its replacement, he says.

Researchers at Kaspersky Lab said last month that the Equation Group, which has ties to Stuxnet but predates it, were likely the "masters" over the Stuxnet attacks and provided exploits to the attackers who unleashed malware to sabotage centrifuges used for uranium enrichment at Iran's Natanz facility. While signs appear to point to the National Security Agency, Kaspersky Lab has stopped short of naming the nation-state behind the operation, but has noted a possible US connection with newly found English-language use in the code, as well as apparent East Coast business hours.

The so-called GrayFish platform, which includes plug-ins like the especially sophisticated one that reprograms hard drives, ultimately replaced EquationDrug, although EquationDrug is not yet obsolete. But Kaspersky Lab researchers still have been unable to detect any new activity from the Equation Group since 2014, likely because they've adopted an even stealthier tack, a "super-scary" prospect, according to Costin Raiu, head of Kaspersky's global research and analysis team. Raiu last month told Dark Reading that the attackers had registered new servers in 2014 and were still active, but no signs of new malware had been detected.

And no word on what the group is using in lieu of GrayFish: "We don't have any details on what software this group is using right now," Soumenkov says. "They must have implemented some better techniques to evade detection and discovery."

The Equation Group has always reused some code; Grayfish, for example, was basically an upgrade to EquationDrug, with encryption and a bootkit, as well as "well-hidden" plug-ins, he says.

Speaking of plug-ins, Kaspersky Lab today said it has found some 30 plug-ins for EquationDrug thus far, but there could be some 90 additional ones as well. All of the plugins are compatible, too, according to Soumenkov.

The plug-ins include network traffic interception, reverse DNS resolution, computer management (including start/stop processes, load drivers and libraries), file and directory management, targeted computer system information-gathering (including OS version, user name, keyboard layout, process list, and other information), network resource browsing, WMI information-gathering, cached password collection, processes enumeration, monitoring live user activity in browsers, NTFS file system access, removable storage drive monitoring, passive network backdoor, HDD and SDD firmware manipulation, keylogging, collection of browser history, as well as cached passwords and auto-fill data.

[The nation-state Equation Group compromise of most popular hard drives won't be a widespread threat, but future disk security -- and forensic integrity -- remain unclear. Read What You Need To Know About Nation-State Hacked Hard Drives.]

"The architecture of the whole framework resembles a mini-operating system with kernel-mode and user-mode components carefully interacting with each other via a custom message-passing interface. The platform includes a set of drivers, a platform core (orchestrator) and a number of plugins," Kaspersky Lab researchers wrote in a post today. "Every plugin has a unique ID and version number that defines a set of functions it can provide. Some of the plugins depend on others and might not work unless dependencies are resolved."

Kaspersky's study of EquationDrug illustrates how nation-states like the Equation Group constantly up the ante in their code, the researchers say in their new report.

Meanwhile, the researchers found references such as "Stealthfighter" and other English-speaking language in the code. "Some other names, such as kernel object and file names, abbreviations, resource code page, and several generic messages, point to English-speaking developers. Due to the limited number of such text strings, it's hard to tell reliably if the developers were native English speakers," according to the report.

Kelly Jackson Higgins is Executive Editor at DarkReading.com. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Kelly Jackson Higgins
50%
50%
Kelly Jackson Higgins,
User Rank: Strategist
3/12/2015 | 11:22:59 AM
Re: Fascinating stuff..
Kaspersky Lab has done some fascinating research on this, @Marilyn. I know there's more to come from them, so we'll continue to learn more about this operation in the coming months. Thanks. 
Marilyn Cohodas
50%
50%
Marilyn Cohodas,
User Rank: Strategist
3/12/2015 | 11:14:12 AM
Fascinating stuff..
Great reporting & analysis Kelly. Keep up the good work on this fascinating and important topic. Can't wait for more.... 
10 Ways to Keep a Rogue RasPi From Wrecking Your Network
Curtis Franklin Jr., Senior Editor at Dark Reading,  7/10/2019
The Security of Cloud Applications
Hillel Solow, CTO and Co-founder, Protego,  7/11/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Building and Managing an IT Security Operations Program
As cyber threats grow, many organizations are building security operations centers (SOCs) to improve their defenses. In this Tech Digest you will learn tips on how to get the most out of a SOC in your organization - and what to do if you can't afford to build one.
Flash Poll
The State of Ransomware
The State of Ransomware
Ransomware has become one of the most prevalent new cybersecurity threats faced by today's enterprises. This new report from Dark Reading includes feedback from IT and IT security professionals about their organization's ransomware experiences, defense plans, and malware challenges. Find out what they had to say!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-13611
PUBLISHED: 2019-07-16
An issue was discovered in python-engineio through 3.8.2. There is a Cross-Site WebSocket Hijacking (CSWSH) vulnerability that allows attackers to make WebSocket connections to a server by using a victim's credentials, because the Origin header is not restricted.
CVE-2019-0234
PUBLISHED: 2019-07-15
A Reflected Cross-site Scripting (XSS) vulnerability exists in Apache Roller. Roller's Math Comment Authenticator did not property sanitize user input and could be exploited to perform Reflected Cross Site Scripting (XSS). The mitigation for this vulnerability is to upgrade to the latest version of ...
CVE-2018-7838
PUBLISHED: 2019-07-15
A CWE-119 Buffer Errors vulnerability exists in Modicon M580 CPU - BMEP582040, all versions before V2.90, and Modicon Ethernet Module BMENOC0301, all versions before V2.16, which could cause denial of service on the FTP service of the controller or the Ethernet BMENOC module when it receives a FTP C...
CVE-2019-6822
PUBLISHED: 2019-07-15
A Use After Free: CWE-416 vulnerability exists in Zelio Soft 2, V5.2 and earlier, which could cause remote code execution when opening a specially crafted Zelio Soft 2 project file.
CVE-2019-6823
PUBLISHED: 2019-07-15
A CWE-94: Code Injection vulnerability exists in ProClima (all versions prior to version 8.0.0) which could allow an unauthenticated, remote attacker to execute arbitrary code on the targeted system in all versions of ProClima prior to version 8.0.0.