Trends in Targeted Attacks: 2013

FireEye has been busy over the last year. We have tracked
malware-based espionage campaigns and published research papers on
numerous advanced threat actors. We chopped through Poison
Ivy
, documented a cyber
arms dealer
, and revealed that Operation
Ke3chang
had targeted Ministries of Foreign Affairs in Europe.

Worldwide, security experts made many breakthroughs in cyber defense
research in 2013. I believe the two biggest stories were Mandiant’s APT1
report
and the ongoing Edward Snowden revelations, including the
revelation that the U.S. National Security Agency (NSA) compromised
50,000 computers
around the world as part of a global espionage campaign.

In this post, I would like to highlight some of the outstanding
research from 2013.


Trends in Targeting

Targeted malware attack reports tend to focus on intellectual
property theft within specific industry verticals. But this year,
there were many attacks that appeared to be related to nation-state
disputes, including diplomatic espionage and military conflicts.

Conflict

Where kinetic conflict and nation-state disputes arise, malware is
sure to be found. Here are some of the more interesting cases
documented this year:

  • Middle East: continued attacks targeting the Syrian
    opposition; further activity by Operation
    Molerats
    related to Israel and Palestinian territories.
  • India and Pakistan: tenuous relations in physical world equate
    to tenuous relations in cyberspace. Exemplifying this trend was the
    Indian malware group Hangover,
    the ByeBye
    attacks against Pakistan, and Pakistan-based attacks
    against India.
  • Korean peninsula: perhaps
    foreshadowing future conflict, North Korea was likely behind the Operation
    Troy
    (also known as DarkSeoul)
    attacks on South Korea that included defacements, distributed
    denial-of-service (DDoS) attacks, and malware that wiped hard disks.
    Another campaign, Kimsuky,
    may also have a North Korean connection.
  • China: this was
    the source of numerous attacks, including the ongoing Surtr
    campaign, against the Tibetan and Uygur communities, which targeted
    MacOS
    and Android.

Diplomacy

Malware continues to play a key role in espionage in the Internet
era. Here are some examples that stood out this year:

  • The Snowden documents revealed that NSA and GCHQ deployed key
    logging malware
    during the G20 meeting in 2009.
  • In
    fact, G20 meetings have long been targets for foreign intelligence
    services, including this year’s G20
    meeting in Russia.
  • The Asia-Pacific Economic
    Cooperation (APEC)
    and The Association of Southeast Asian Nations (ASEAN)
    are also frequent targets.
  • FireEye announced that Operation
    Ke3chang
    compromised at least five Ministries of Foreign Affairs
    in Europe.
  • Red
    October
    , EvilGrab,
    and Nettraveler
    (aka RedStar) targeted both diplomatic missions and commercial
    industries.


Technical Trends

Estimations of “sophistication” often dominate the coverage of
targeted malware attacks. But what I find interesting is that simple
changes made to existing malware are often more than enough to evade
detection. Even more surprising is that technically “unsophisticated”
malware is often found in the payload of “sophisticated” zero-day
exploits. And this year quite a number of zero-days were used in
targeted attacks.

Exploits

Quite a few zero-day exploits appeared in the wild this year,
including eleven discovered by FireEye. These exploits included
techniques to bypass ASLR and application sandboxes. The exploits that
I consider the most significant are the following:

Evasion

The malware samples used by several advanced persistent threat (APT)
actors were slightly modified this year, possibly as an evasive
response to increased scrutiny, in order to avoid detection. For
example, there were changes to Aumlib
and Ixeshe
, which are malware families associated with APT12,
the group behind attacks on the New
York Times
. When APT1 (aka Comment Crew) returned
after their activities were exposed, they also used modified malware.
In addition, Terminator
(aka FakeM),
and Sykipot
were modified.

Threat Actors

Attribution is a tough problem, and the term itself has multiple meanings.
Some use it to refer to an ultimate benefactor, such as a
nation-state. Others use the term to refer to malware authors, or
command-and-control (CnC) operators. This year, I was fascinated by
published research about exploit and malware dealers and targeted
attack contractors (also known as cyber “hitmen”), because it further
complicates the traditional “state-sponsored” analysis that we’ve
become accustomed to.

  • Dealers — The malware and exploits used in targeted attacks
    are not always exclusively available to one threat actor. Some are
    supplied by commercial entities such as FinFisher,
    which has been reportedly used against activists around the world,
    and HackingTeam,
    which sells spyware to governments and law enforcement agencies.
    FireEye discovered a likely cyber
    arms dealer
    that is connected to no fewer than 11 APT
    campaigns – however, the relationship between the supplier and those
    who use the malware remains unclear. Another similar cluster, known
    as the Maudi
    Operation
    , was also documented this year.
  • Hitmen — Although this analysis is still highly speculative,
    some threat actors, such as Hidden
    Lynx
    , may be “hackers for hire”, tasked with breaking into
    targets and acquiring specific information. Others, such as IceFog,
    engage in “hit and run” attacks, including the propagation of
    malware in a seemingly random fashion. Another group, known as Winnti,
    tries to profit by targeting gaming companies with malware (PlugX)
    that is normally associated with APT activity. In one of the
    weirdest cases I have seen, malware known as “MiniDuke”,
    which is reminiscent of some “old school” malware developed by 29A,
    was used in multiple attacks around the world.

My colleagues at FireEye have put forward some interesting stealthy
techniques in the near future. In any case, 2014 will no doubt be
another busy year for those of us who research targeted malware attacks.

Share this post

Share on facebook
Share on linkedin
Share on print
Share on email

Subscribe to our Monthly Cyber Security Digest

Get monthly content to keep you up to date on the latest news and tips