Home Business IT Security 'Cyber mercenaries' target Japan, South Korea

Kaspersky CEO Eugene Kaspersky Kaspersky CEO Eugene Kaspersky Featured
Get all your tech news delivered to your mail box five days a week
iTWire UPDATE - it's FREE!


Security researchers have announced the discovery of a 'cyber mercenary' team which specialises in attacks on targets in Japan and South Korea, with more attacks said to come.

Russian computer security firm Kaspersky today said it has discovered 'Icefog', an Advanced Persistant Threat group apparently based in China that hits the supply chains for Western companies.

Kaspersky said the discovery reveals the emergence of small groups of cyber-mercenaries available for hire to perform surgical hit and run operations, with operations beginning in 2011 and increasing in size and scope over the last few years.

“The ‘hit and run’ nature of the Icefog attacks demonstrate a new emerging trend - smaller hit-and-run gangs that go after information with surgical precision. The attack usually lasts for a few days or weeks and after obtaining what they were looking for, the attackers clean up and leave. In the future, we predict the number of small, focused ‘APT-to-hire’ groups to grow, specialising in hit-and-run operations; a kind of ‘cyber mercenary’ team for the modern world,” Costin Raiu, Director, Global Research & Analysis Team, said.

Kaspersky researchers have sinkholed 13 of the 70+ domains used by the attackers, which helped provide statistics on the number of victims worldwide. In addition, the Icefog command and control servers maintain encrypted logs of their victims together with the various operations performed on them. These logs can sometimes help to identify the targets of the attacks and in some cases, the victims.

Andrew Mamonitis, Kaspersky Lab ANZ’s Managing Director, said that those in the business of cyber-espionage often exploit the most vulnerable entry points by using corporate networks as a platform from which to access other network channels.

“In most cases, auxiliary companies have more relaxed security parameters in place despite holding valuable data about the parent target. It is these secondary business service providers across all levels of the corporate chain which are most vulnerable to external breaches,” he said.

In addition to Japan and South Korea, many sinkhole connections in several other countries were observed, including Australia. In total, Kaspersky Lab observed more than 4,000 unique infected IPs and several hundred victims (a few dozen Windows victims and more than 350 Mac OS X victims).

Based on the list of IPs used to monitor and control the infrastructure, Kaspersky Lab’s experts assume some of the players behind this threat operation are based in at least three countries: China, South Korea and Japan.

Main Findings:

  • Based on the profiles of identified targets, the attackers appear to have an interest in the following sectors: military, shipbuilding and maritime operations, computer and software development, research companies, telecom operators, satellite operators, mass media and television.
  • Research indicates the attackers were interested in targeting defense industry contractors such as Lig Nex1 and Selectron Industrial Company, ship-building companies such as DSME Tech, Hanjin Heavy Industries, telecom operators such as Korea Telecom, media companies such as Fuji TV.
  • The attackers hijack sensitive documents and company plans, e-mail account credentials, and passwords to access various resources inside and outside the victim’s network.
  • During the operation, the attackers use the “Icefog” backdoor set (also known as “Fucobha”). Kaspersky Lab has identified versions of Icefog for both Microsoft Windows and Mac OS X.
  • While in most other APT campaigns, victims remain infected for months or even years and attackers continuously steal data, Icefog operators process victims one by one -- locating  and copying only specific, targeted information. Once the desired information has been obtained, they leave.
  • In most cases, the Icefog operators appear to know very well what they need from the victims. They look for specific filenames, which are quickly identified, and transferred to the C&C.

To read the full report with a detailed description of the backdoors, other malicious tools and stats, together with indicators of compromise, visit Securelist. A complete Icefog FAQ is also available.

ITWIRE SERIES - REVENUE-CRITICAL APPS UNDERPERFORMING?

Avoid War Room Scenarios and improve handling of critical application problems:

• Track all transactions, end-to-end, all the time and know what your users experience 24/7

• View code level details with context and repair problems quickly

• Fix problems in minutes before they wreak havoc

• Optimize your most important applications, Java, .NET, PHP, C/C++ and many more

Start your free trial today!

CLICK FOR FREE TRIAL!

ITWIRE SERIES - IS YOUR BACKUP STRATEGY COSTING YOU CLIENTS?

Where are your clients backing up to right now?

Is your DR strategy as advanced as the rest of your service portfolio?

What areas of your business could be improved if you outsourced your backups to a trusted source?

Read the industry whitepaper and discover where to turn to for managed backup

FIND OUT MORE!

David Swan

joomla statistics

David Swan is a tech journalist from Melbourne and is iTWire's Associate Editor. Having started off as a games reviewer at the tender age of 14, he now has a degree in Journalism from RMIT (with Honours) and owns basically every gadget under the sun. You can email him at david.swan@itwire.com or follow him at twitter.com/mrdavidswan

Connect