Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Management & Strategy

CrowdStrike Takes On Chinese, Russian Attack Groups in Threat Report

Feature on Crowdstrike Threat Report

Feature on Crowdstrike Threat Report

Russian attackers targeted energy sector targets and a Chinese nexus intrusion group infected foreign embassies with malware using watering hole tactics in 2013, CrowdStrike researchers found in its first-ever Global Threat Report.

CrowdStrike’s Intelligence Team tracked more than 50 different threat actor groups believed to be behind the majority of sophisticated threats against enterprises in 2013. These groups operated out of China, Iran, India, North Korea, and Russia. In its Global Threat Report, CrowdStrike identified many of the tactics, techniques, and procedures used by these groups to craft and launch sophisticated attacks against major targets around the world. CrowdStrike outlined details of how these groups carried out their attacks and what tools were used in the report, released Wednesday.

Global Threat ReportAttackers are human, which means “they make mistakes, and they have habits,” said Adam Meyers, vice-president of Intelligence at CrowdStrike, a firm focused detection and mitigation of targeted attacks. Attack tools, no matter how sophisticated, have specific “marks” that can be used to track back to the humans who created them, he said. The marks can be something like password reuse, a certain string that appears frequently in code, or even the name of the registrar hosting the domain name. These marks cannot be obfuscated and CrowdStrike researchers rely on these clues to connect different attacks and campaigns to each other.

Strategic Web Compromises

The report found that Strategic Web Compromises (SWC), where attackers infect strategic Websites as part of a watering hole attack to target a specific group of users, were a favorite attack method for groups operating out of Russia and China. The attack against the Council of Foreign Relations website in early 2013, which also compromised Capstone Turbine and Napteh Engineering & Development Co., involved three different adversaries using multiple types of malware, the report found. In March 2013, one of the attack groups compromised a Harvard University site targeting people who were concerned with military, international relations, and human rights issues in the Far East.

The Chinese group Emissary Panda carried out its own watering hole attack against foreign embassies a few months after the attack against the Department of Labor website, the report found. The group hosted a booby-trapped Microsoft Word document on the Website of a Spain-based defense manufacturer. Another watering-hole-attack affected the website for the Russian Federation’s embassy in the United States. CrowdStrike observed multiple additional SWC operations by EMISSARY PANDA using a number of compromised sites, the report found.

Attackers may prefer using SWC over spear phishing because users are getting better about identifying malicious emails and email filters make it harder for these messages to reach the user’s inbox in the first place, CrowdStrike said. In contrast, the only way to avoid being hit with SWC is to have “technical countermeasures in place to detect the SWC or prevent exploitation,” the researchers wrote.

“Spear phishing is still the most common delivery mechanism for targeted intrusion operations; however, the frequency of SWC operations is increasing. CrowdStrike believes that this tactic will remain popular among targeted intrusion adversaries, and its use will likely continue to increase in frequency,” the report said.

Energy Sector Attacks

Advertisement. Scroll to continue reading.

Energetic Bear, an adversary group out of the Russian Federation, have conducted intelligence collection operations against the energy sector since at least August 2012, the report said. There were hints that watering hole attacks were this group’s “preferred delivery vector,” although there were other attacks based on booby-trapped PDF files targeted Adobe Reader. This group used two primary remote access tools, HavexRAT and SysMain RAT, which share code and have several techniques in common, CrowdStrike said.

Russia and China Flags

While the energy sector was the primary target, CrowdStrike found that Energetic Bear had compromised hosts in 23 countries including the European government, defense contractors, energy providers, and IT providers. Other impacted groups included European, U.S., and Asian academia, European, U.S., and Middle Eastern manufacturing and construction industries, U.S. healthcare providers, non-European precision machinery tool manufacturers, and research institutes.

“Observed indicators obtained from monitoring this adversary’s activity suggest that ENERGETIC BEAR is operating out of Russia, or at least on behalf of Russia-based interests, and it is possible that their operations are carried out with the sponsorship or knowledge of the Russian state,” CrowdStrike said in its report.

Changing Tactics

CrowdStrike also included details about the various operations conducted by Deadeye Jackal, also known as the Syrian Electronic Army, including the attacks against Twitter accounts for multiple media outlets, the theft of TrueCaller.com’s database and others, and compromising DNS records for various websites including The New York Times and The Washington Post. One important thing about Deadeye Jackal was the fact that the group changed its attack methods several times over the course of the year, the report found. For example the group used spear phishing tactics to collect login credentials towards the end of the year.

“Given the observed development of DEADEYE JACKAL since May 2011, from Facebook spamming to account takeover to data exfiltration and then to more efficient targeting against third-party service providers of victims, it is quite plausible that this adversary would use the infrastructure of their previously compromised victims as a resource to support ongoing campaigns,” the report found.

Understanding Tactics, Adversaries

CrowdStrike expects that cyber-targeting will increase in 2014, and that special events, such as the World Cup, the G20 summit, the Winter Olympic Games in Sochi, Russia, and the withdrawal of U.S. Forces from Afghanistan will be of special interest to attackers.

CrowdStrike believes organizations have an “adversary problem, not a malware problem,” Meyers said. The best way to understand the types of threats the organization is facing is to focus on the tactics and tools used by the adversaries instead of getting bogged down trying to detect and identify every type of malware the group may use. Criminal groups “diverse and difficult to track, but they, too, leave human toolmarks in the binaries and tools they leverage to steal information and criminalize the Internet,” the report said.

For example, attack groups often use the same registrar. Organizations can be proactive and look for what other domains are associated with the registrar to narrow down where the attack may come from, Meyers said. The fact that Microsoft will end-of-life Windows XP in April means these adversary groups have another potential attack vector. Organizations can take steps now to proactively close off that avenue of attack, Meyers said.

The full report from Crowdstrike is available here.

Listen to the Podcast:

Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Understand how to go beyond effectively communicating new security strategies and recommendations.

Register

Join us for an in depth exploration of the critical nature of software and vendor supply chain security issues with a focus on understanding how attacks against identity infrastructure come with major cascading effects.

Register

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...

CISO Strategy

SecurityWeek spoke with more than 300 cybersecurity experts to see what is bubbling beneath the surface, and examine how those evolving threats will present...

CISO Conversations

Joanna Burkey, CISO at HP, and Kevin Cross, CISO at Dell, discuss how the role of a CISO is different for a multinational corporation...

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...

CISO Conversations

In this issue of CISO Conversations we talk to two CISOs about solving the CISO/CIO conflict by combining the roles under one person.

CISO Strategy

Security professionals understand the need for resilience in their company’s security posture, but often fail to build their own psychological resilience to stress.