Novetta Leads Malware Interdiction w Partners Microsoft, FireEye, Cisco, & More!Novetta Leads Malware Interdiction w Partners Microsoft, FireEye, Cisco, & More!
Coalition Seeks to Move Beyond Singular Threat Reporting toward Large-scale Proactive and Cooperative Interdiction Efforts Against Threat Groups
October 14, 2014
Washington, D.C. – October 14, 2014 – Novetta Solutions, LLC (“Novetta”), a leader in advanced analytics technology solutions, today announced it is leading a cyber security coalition developed to interdict malware used by advanced threat groups. In July, Novetta selected strategic cyber security industry partners, including Cisco, FireEye, F-Secure, iSIGHT Partners, Microsoft, Symantec, Tenable, ThreatConnect, ThreatTrack Security, Volexity and other industry leaders to participate in the coalition.
Utilizing partner capabilities for the large-scale coordinated detection and remediation of malware, the objective of the coalition is to remediate the adverse impact of professional cyber espionage groups and other threat actors.
Novetta strategically teamed with the security industry leaders to execute coordinated, effective remediation and disruption of activities tied to several families of malware used by advanced threat actor groups across the globe. The effort was originally focused on the HiKit family of malware with plans to expand out to address other tools used by a particular threat actor group. The coalition’s efforts were tied to Microsoft’s Malware Software Removal Tool (MSRT) and other coalition signature and product updates to be released on October 14, 2014. A comprehensive report covering this family of malware as well as technical details and additional insight into attribution will be released by the coalition on October 28th, 2014.
The targeted threat actor group under this effort has designed and used several tools and techniques that focus on remaining undetected by security researchers and law enforcement authorities while allowing attackers to quickly compromise and expand within targeted networks. The observed targets of these attacks are large public network infrastructure providers, holders of extensive IP portfolios, and government entities from various countries in Asia and the United States. Technical details to be released in the comprehensive report, as well as the Executive Summary, indicates that this threat actor group operates out of China. Their motives appear to be oriented toward large-scale technology theft and intelligence gathering.
“We felt it was important to take action proactively in coordination with our coalition security industry partners. The cumulative effect of such coordinated approaches could prove quite disruptive to the adversaries in question and mitigate some of the threat activity that plagues the joint customer base of this coalition,” said Novetta CEO Peter B. LaMontagne. “Novetta’s unique capabilities are centered around years of experience in identifying, tracking, reverse engineering, and creating network based detection and decoding of threats that are typically considered the high end of the threat actor spectrum.”
Novetta asserted that it wanted to ensure that the public was made aware of both this targeted threat actor group and that the coalition is taking every step to remediate this threat through coordinated analysis, distribution of information, and coordinated action with its trusted industry partners.
This initiative is one of the first efforts under the Microsoft supported Coordinated Malware Eradication (CME) program which aims to bring organizations in cyber security and in other industries together to change the game against malware.
This initiative, led and coordinated by Novetta, seeks to go beyond reporting of malware and put into action tools and an approach that will better protect coalition customers. To date, the operation has acquired an extensive set of malware samples associated with this actor group, constructed an in-depth knowledge base of the malware family and associated tool chain, and has begun the process of shipping developed signatures and remediation recommendations to industry partners for internal and external consumption and use. This coordinated effort provides a broader view and access to more data than if efforts had been undertaken by any one partner alone. “This is akin to an ‘open source software’ approach for cyber threat mitigation—the adversaries share and retool their malware. We need to do the same on the defensive side,” commented LaMontagne.
Novetta and its partners have published several preliminary triage reports to outline this Advanced Persistent Threat group and several of the malware families it uses, and plan to release a comprehensive technical report by October 28, 2014. That technical report will include a high level overview of the threat actor group, some of the targeted industries they attacked, an overview of malware families they used and their capabilities. In addition, the report will include an in-depth review of the Tactics, Techniques, and Procedures (TTP’s) of this group and who we believe they could be based on this larger narrative. As a result of this effort, Novetta and its coalition partners encourage other security vendors to not just analyze and report on these types of threats, but to also work within industry circles to share their finished and raw technical analysis with those in the industry who are able and willing to take action.
About Novetta Solutions
Headquartered in McLean, VA with over 600 employees across the US, Novetta has over two decades of experience solving problems of national significance through advanced analytics for government and commercial enterprises worldwide. Novetta’s Cyber Analytics, Identity Analytics and Social Analytics capabilities enable customers to find clarity from the complexity of ‘big data’ at the scale and speed needed to drive enterprise and mission success. Visit www.novetta.com for more information.
Hacking Your Digital Identity: How Cybercriminals Can and Will Get Around Your Authentication MethodsOct 26, 2023
Modern Supply Chain Security: Integrated, Interconnected, and Context-DrivenNov 06, 2023
How to Combat the Latest Cloud Security ThreatsNov 06, 2023
Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and PhishingNov 01, 2023
SecOps & DevSecOps in the CloudNov 06, 2023
Passwords Are Passe: Next Gen Authentication Addresses Today's Threats
How to Deploy Zero Trust for Remote Workforce Security
How to Use Threat Intelligence to Mitigate Third-Party Risk
Everything You Need to Know About DNS Attacks
How Enterprises Are Managing Application Security Risks in a Heightened Threat Environment