Equation Group Cyberspying Activity May Date Back To The '90sEquation Group Cyberspying Activity May Date Back To The '90s
New Kaspersky Lab findings show how the 'master APT' nation-state group likely the longest-running cyber espionage gang of all, and newly discovered code artifacts include English-language clues.
March 11, 2015
The unprecedented cyber espionage operation conducted by the so-called Equation Group launched attacks mainly from a complex software platform that looks a lot like a mini operating system with carefully constructed components and plug-ins, researchers say.
Kaspersky Lab--which last month disclosed its findings on the highly advanced and well-funded nation-state actor--today published new details of the so-called EquationDrug software platform used by the group over the past 10 years. The research indicates that the Equation Group could have been active as far back as the 1990s, making it the longest-running cyber espionage group of all, according to Kaspersky Lab.
Igor Soumenkov, principal security researcher at Kaspersky Lab, says information on the timing of when the Equation Group registered command-and-control servers predate EquationDrug, and thus point to activity in the '90s. "There were also previous platforms like EquationLaser, which we didn't write much about. EquationLaser was before EquationDrug," its replacement, he says.
Researchers at Kaspersky Lab said last month that the Equation Group, which has ties to Stuxnet but predates it, were likely the "masters" over the Stuxnet attacks and provided exploits to the attackers who unleashed malware to sabotage centrifuges used for uranium enrichment at Iran's Natanz facility. While signs appear to point to the National Security Agency, Kaspersky Lab has stopped short of naming the nation-state behind the operation, but has noted a possible US connection with newly found English-language use in the code, as well as apparent East Coast business hours.
The so-called GrayFish platform, which includes plug-ins like the especially sophisticated one that reprograms hard drives, ultimately replaced EquationDrug, although EquationDrug is not yet obsolete. But Kaspersky Lab researchers still have been unable to detect any new activity from the Equation Group since 2014, likely because they've adopted an even stealthier tack, a "super-scary" prospect, according to Costin Raiu, head of Kaspersky's global research and analysis team. Raiu last month told Dark Reading that the attackers had registered new servers in 2014 and were still active, but no signs of new malware had been detected.
And no word on what the group is using in lieu of GrayFish: "We don't have any details on what software this group is using right now," Soumenkov says. "They must have implemented some better techniques to evade detection and discovery."
The Equation Group has always reused some code; Grayfish, for example, was basically an upgrade to EquationDrug, with encryption and a bootkit, as well as "well-hidden" plug-ins, he says.
Speaking of plug-ins, Kaspersky Lab today said it has found some 30 plug-ins for EquationDrug thus far, but there could be some 90 additional ones as well. All of the plugins are compatible, too, according to Soumenkov.
The plug-ins include network traffic interception, reverse DNS resolution, computer management (including start/stop processes, load drivers and libraries), file and directory management, targeted computer system information-gathering (including OS version, user name, keyboard layout, process list, and other information), network resource browsing, WMI information-gathering, cached password collection, processes enumeration, monitoring live user activity in browsers, NTFS file system access, removable storage drive monitoring, passive network backdoor, HDD and SDD firmware manipulation, keylogging, collection of browser history, as well as cached passwords and auto-fill data.
[The nation-state Equation Group compromise of most popular hard drives won't be a widespread threat, but future disk security -- and forensic integrity -- remain unclear. Read What You Need To Know About Nation-State Hacked Hard Drives.]
"The architecture of the whole framework resembles a mini-operating system with kernel-mode and user-mode components carefully interacting with each other via a custom message-passing interface. The platform includes a set of drivers, a platform core (orchestrator) and a number of plugins," Kaspersky Lab researchers wrote in a post today. "Every plugin has a unique ID and version number that defines a set of functions it can provide. Some of the plugins depend on others and might not work unless dependencies are resolved."
Kaspersky's study of EquationDrug illustrates how nation-states like the Equation Group constantly up the ante in their code, the researchers say in their new report.
Meanwhile, the researchers found references such as "Stealthfighter" and other English-speaking language in the code. "Some other names, such as kernel object and file names, abbreviations, resource code page, and several generic messages, point to English-speaking developers. Due to the limited number of such text strings, it's hard to tell reliably if the developers were native English speakers," according to the report.
About the Author(s)
You May Also Like
Hacking Your Digital Identity: How Cybercriminals Can and Will Get Around Your Authentication MethodsOct 26, 2023
Modern Supply Chain Security: Integrated, Interconnected, and Context-DrivenNov 06, 2023
How to Combat the Latest Cloud Security ThreatsNov 06, 2023
Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and PhishingNov 01, 2023
SecOps & DevSecOps in the CloudNov 06, 2023
9 Traits You Need to Succeed as a Cybersecurity Leader
The Ultimate Guide to the CISSP
Modernize your Security Operations with Human-Machine Intelligence
The Evolving Ransomware Threat: What Business Leaders Should Know About Data Leakage
Building Immunity: The 2021 Healthcare and Pharmaceutical Industry Cyber Threat Landscape Report