[Cyberwar Central Links & Resources][Cyberwar Central][Cyberwar Central Members Area]



  << Previous Topic | Next Topic >>Return to Cyberwar Central  

Cyber-espionage operations vast yet highly focused, researcher claims

July 27 2012 at 12:13 PM

Coalde  (Login cwc.mgmt)
CWC Member


Well I suppose I should be happy about all this...apparently I am in a growth industry. Actually this really isn't news, these sort of attacks (cyber-espionage waged by countries) have been going on for decades now, the only difference is that the cost of entry is much lower these days.

security_6075697.jpgCyber-espionage operations across the Internet are extensive yet highly targeted, says a malware researcher speaking this week at the Black Hat Conference in Las Vegas. And it's not just governments targeting other governments or trying to steal corporate secrets -- private security companies also are involved in these break-ins even while claiming to offer "ethical hacking services."

By Ellen Messmer, Network World, July 25, 2012, 5:27 PM

In today's cyber-espionage, "there are hundreds of tiny little botnets," says Joe Stewart, research director at Dell SecureWorks. These command-and-control systems do one thing -- compromise targeted networks of business and government in order to learn about important information worth stealing, and then swipe it.

Unlike other types of cybercrime botnets, such as those used to perform financial theft or generate spam via many compromised machines, cyber-espionage botnets seem to be aimed only to hit certain valued targets -- such as the Japanese Ministry of Finance, which recently disclosed a data breach.

There is widespread targeting of Japan, notes Stewart in his paper released Wednesday titled "Chasing APT, " which pinpoints 200 unique families of custom malware used in cyber-espionage campaigns that many refer to as "advanced persistent threats." In fact, says Stewart, the code called "HTran" that Dell SecureWorks believes was employed by Chinese attackers in the infamous attack against RSA last year is still in use, and has been linked to attacks against entities in Japan.

Stewart says he thinks two of the largest groups involved in cyber-espionage that "share a large infrastructure" are coming out of China. But China is hardly alone, as the U.S. and Israel are also being tied to the Flame virus for cyber-espionage. And there's also the growing sense that it's not just "government-backed actors" conducting cyber-espionage.

"As it becomes increasingly revealed that more and more governments are involved in cyber-espionage and cyber-sabotage, it has the effect of legitimizing this type of activity for certain private companies," says Stewart in his "Chasing APT" report. "Other research we have conducted has uncovered a sizable cyber-espionage operation carried out by a private computer security company in an Asian country (not China) against a foreign military, presumably on behalf of the government of the country in which that company resides. This type of outsourcing of offensive hacking to contractors is to be expected given that the market demand for such skills often precludes governments from possessing that talent for very long -- however, we have discovered the scope of that company's operations also extend to using backdoors and spear-phishing to spy on companies in the U.S. and Europe, and even journalists in the same country. Ironically, this same company offers ethical hacking courses as part of their services lineup."

Dell SecureWorks isn't naming this company, but in the "Chasing APT" paper Stewart points out that "companies found to engage in this kind of activity will likely have a difficult time maintaining trusted relationships with ethical security companies and security researchers who disavow such actions against civilian targets. This will make it harder for these companies to (legally) obtain real-time cyber threat intelligence, ultimately damaging both their reputation and their ability to defend their clients' networks from attacks."

In terms of its technical analysis of APTs, SecureWorks believes that along with the 200 unique families of custom malware used in cyber-espionage intrusions, there appear to be more than 1,100 domain names registered by cyber-espionage actors for use in hosting malware command-and-control or spear-phishing, and nearly 20,000 subdomains as well for purposes such as "malware C2 resolution."

But unlike other types of criminal botnets that "can contain millions of infected computers," cyber-espionage is far more focused, with "tens of thousands of infected computers spread across hundreds of botnets, each of which may only control a few to a few hundred computers at a time," the Dell SecureWorks report concludes.



 Respond to this message   
  Respond to this message   
  << Previous Topic | Next Topic >>Return to Cyberwar Central  
Find more forums on SocietyCreate your own forum at Network54
 Copyright © 1999-2018 Network54. All rights reserved.   Terms of Use   Privacy Statement  
      free countersMember of The Internet Defense League   [Exchange Links with CWC]