A notorious cyber-espionage gang is being blamed for a set of recently discovered spear-phishing attacks that aim to steal information relating to unmanned aircraft systems.
“The set of targets cover all aspects of unmanned vehicles, land, air, and sea, from research to design to manufacturing of the vehicles and their various subsystems,” said James T. Bennett, a senior threat research engineer at FireEye, in a blog post.
Furthermore, the advanced persistent threat (APT) group behind both attacks, according to FireEye, is the gang known as the “Comment Crew,” which was singled out in a recent report from Mandiant. The security firm accused the group, dubbed APT1, of being an elite Chinese military hacking unit based in Shanghai, known as the People’s Liberation Army (PLA) Unit 61398, which is suspected of having attacked at least 141 organizations across numerous industries. Chinese government officials have denied those accusations.
Regardless of the group’s sponsor, one recent set of attacks it launched targeted about a dozen organizations — across the aerospace, defense, telecommunications and government sectors — in both the United States and India, beginning in December 2011, if not earlier. But FireEye also found that the malicious infrastructure and command-and-control (C&C) servers used in the attacks are the same as those employed in a campaign known as Operation Beebus, so named for the related malware used by attackers, which was first submitted for testing to VirusTotal in April 2011. Including those spear-phishing attacks, which were discovered in February, FireEye now has a running total of 20 targets, including government-funded drone researchers in academia.
The earlier Beebus attacks involved malicious PDF and Word files — with names such as “sensor environments.doc” and “RHT_SalaryGuide_2012.pdf” — emailed to targets. The documents attempted to exploit a well-known DLL search order hijacking vulnerability in Windows and drop a malicious DLL file in the Windows directory.
In the latest series of attacks, the tactics have remained largely the same, although this time one of the decoy documents includes a reference to Pakistan’s UAV programme, while another appears to have been sent from a military email address at Joint Base Andrews in Maryland, titled “Family Planning Association of Base (FPAB).”
If a target opens the malicious document, it will attempt to exploit the Windows DLL vulnerability. If successful, the attack results in the installation of backdoor software known as Mutter, which uses what Bennett has dubbed a “hide-in-plain-sight” tactic in that the malicious file is 41 MB in size. “With rare exceptions, malware typically have a small size, usually no larger than a few hundred kilobytes,” he said. “When an investigator comes across a file [that’s] megabytes in size, he may be discouraged from taking a closer look.”
To build the 41-MB file, the malware dropper first decodes a malicious DLL file — only 140 KB in size — that’s included in the dropper’s resource file, then places the DLL file onto the compromised system, proceeding to fill its resource section with randomly generated data, Bennett explained. “This has another useful side effect of giving each DLL a unique hash, making it more difficult to identify.”
After infection, the malware will stay dormant for some period of time before attempting to exfiltrate data from the infected PC. That behavior mirrors that of the “wiper” malware that successfully exploited 48,000 systems at South Korean banks and broadcasters last month, although the malware isn’t related.
Source: Information Week