|By Rich Barger||
|February 12, 2013 01:29 PM EST||
Two weeks ago the New York Times (NYT), Wall Street Journal (WSJ), Dow Jones (DJ) and Washington Post (WP) all reported being targeted and exploited by Chinese Advanced Persistent Threat (APT) groups. In most cases, the compromises had reportedly been going on for quite some time and were severe enough that the Media Industry was forced over a barrel, like so many others, to stroke a check for a multi-month "cleanup on aisle nine" incident response effort.
Since the media is a highly relational and "connected" industry, it lends itself to being especially vulnerable to this type of remote exploitation. Persistent access to media sources would be an obvious target because of the value they would provide to the Chinese. Access to timely confidential information would provide them, off the record notes, embargoed data, as well as sensitive, candid or compromising details of influential policy makers or corporate leaders to name a few.
Cyber Squared has conducted analysis within ThreatConnect.com a threat intelligence-sharing exchange, and observed two dominate trends with regards to the media and Chinese cyber threats. We have also uncovered additional targets and concluded that the recent attacks on the Media Industry are not the work of a single APT threat, but rather as many as six different threats groups. All information referenced below is available within ThreatConnect.com to vetted security representatives of the effected media organizations who may register for an account.
Painting a Bigger Picture By the Numbers:
We begin with the primary and most pervasive trend that we see. Generally, Chinese APT groups will establish attack and command and control infrastructure that mimics legitimate news websites or media organizations.
A large majority of targeted spearphishing attacks will appear to be a benign news story emailed to the target with either an attachment or a malicious link. As the victim interacts with either, their workstation and subsequently their enterprise falls victim to the APT. In most cases, the attack circumvents traditional host based anti-virus by design. Multiple threat groups use a combination of these techniques to aggressively target their victims.
In another example, we observe multiple Chinese APT groups developing and operationalizing infrastructure so tailored that it most likely indicates that the attackers have operationalized it in an effort to directly target specific media organizations, publications and or individuals, versus indirectly targeting non-media related targets.
From analysis conducted by Cyber Squared's Threat Intelligence Team, we are able to determine that at least six APT groups are targeting the Media Industry.
APT Group 1:
From mid 2012 to present, APT Group 1 used infrastructure and capabilities that were most likely used to directly target the Dow Jones, specifically the Factiva news service, as well as indirectly target countless others with malicious content which appeared to be legitimate news stories from Dow Jones, World News and the Washington Post. Targeting the Factiva service would have allowed attackers to obtain a wealth of information that could be used to target executives and journalists or react to market events and breaking news that the PRC leadership may consider unfavorable.
In early May 2012, APT Group 1 actors targeted the US think tank industry with a targeted attack from what appeared to be a prominent US Professor of East Asian History and Fulbright researcher. The message contained a malicious link to a seemingly benign Washington post article about F-16 fighter sales to Taiwan, and commentary as to the sales not being in the best interest of Taiwan. By early August 2012, APT Group 1 continued to target the US think tank industry, this time with a malicious Microsoft Word document that dropped a customized backdoor that beaconed to a secondary command and control infrastructure, closely associated with infrastructure observed in the May 2012 attack.
APT Group 2:
From late 2011 to present, Cyber Squared has observed APT Group 2 consistently using Beijing based infrastructure to possibly target and/or mimic a large named US and UK Media organization.
APT Group 3:
From mid 2012 to present, Cyber Squared has identified APT Group 3 using infrastructure to possibly target and/or mimic Philippine and Manila based news services. APT Group 3 was also observed developing infrastructure used to emulate and target a US Defense Contractor who provides direct support to the US Navy in addition to developing infrastructure which mimicked a prominent US Pacific Command (US PACOM) web portal. APT Group 3 continues to develop infrastructure with a consistent South China Sea and maritime focus.
APT Group 4:
From early 2012 to present, Cyber Squared has identified APT Group 4 using infrastructure to possibly target and/or mimic New York Times and a named Korean news service.
APT Group 5:
From late 2009 to present, Cyber Squared has identified APT Group 5 using infrastructure to possibly target and/or mimic named US, Australian, and Canadian news services. In one example, Cyber Squared observed APT Group 5 developing infrastructure that appeared to mimic a local Utah based news service in late 2012. We also observed APT Group 5 using associated infrastructure to most likely target a popular US, world news, finance, business and finance publication, in addition to numerous others within industries such as satellite communications (SATCOM), private sector defense, deep-water drilling and mining, and advanced research.
APT Group 6:
From late 2012 to present, Cyber Squared identified APT Group 6 using infrastructure to most likely target an international, multi-language US based news service that is tied to the Falun Gong, a spiritual movement outlawed in China that is often a critical of Chinese policies and human rights abuses. Access to the US based news service would provide China State Security personnel insights to the internal news cycles, confidential sources and information that may subject mainland-Chinese journalists and their sources to arrest or intimidation.
Cyber Squared has also identified APT Group 6 most likely targeting a popular international publisher of a global metals journal and metals trading news, further research identified the same group controlling infrastructure that was tailored specifically for a large Japanese steel company and a large multi-national European steel company. Remote access to these enterprises would provide the PRC timely insights into the metals market, possibly allowing them to obtain an unfair advantage in international metals trading. Cyber Squared previously observed APT Group 6 targeting US Mining, Metals companies, Aerospace and Defense organizations, Manufacturing and Fabrication, as well as Construction and Engineering companies, all of which were highlighted within our 10 January 2013 blog posting, Victim-nomics: Estimating The "Cost" of Compromise.
When a particular victim or industry reports a compromise of this nature we must also begin to look for what's below the waterline. In the case of Chinese based APT's, it is important to understand that victims need not adopt a victim mindset, or assume that they are central to the story. In many cases, there are others like them who can provide additional insights. When industries establish a community, work together, jointly collaborate and share information about their common attacker, this shared perspective of the adversary allows organizations to minimize the term and efficacy of exploitation operations. Even from a post-incident perspective, when industries collaborate around common threat intelligence leads they paint a bigger overall picture about what is really going on.
The NYT, WSJ, Dow Jones, and WP can now join the ranks of those like Google, RSA, Lockheed Martin, and Rio Tinto. While these organizations should be applauded for coming forward, it is equally important to consider that of all of these victims who self reported are not the central story to Chinese corporate espionage. There are many more victims and targets. Had these organizations implemented a community based threat intelligence-sharing program into their security strategy, perhaps the compromises would not have had been so severe. By sharing what they knew, when they knew it, they could have saved someone else from the same fate. This is no different than how a neighborhood watch works, individual homeowners working as one community jointly with local law enforcement, sharing information to keep each other and their property safe.
As of February 9th 2013, the ThreatConnect.com community was just three months old, and we are already seeing a groundswell of participation. We are currently tracking over 12,000 actionable APT threat indicators within a growing community of over 150 users and 45 organizational accounts, across numerous sectors and industries. These users and organizations are following an average of 21 threats groups. What is important is that all of these organizations have 100% control their data and can choose the data they share and with whom they share it.
ThreatConnect is enabling threat analysts to collect, analyze and share threat intelligence in a timely manner, allowing them to track and mitigate sophisticated threats that may be targeting their networks. In ThreatConnect we're bringing the framework for a community to streamline trusted sharing, all you need to bring is your desire to not be another headline.
In their Live Hack” presentation at 17th Cloud Expo, Stephen Coty and Paul Fletcher, Chief Security Evangelists at Alert Logic, provided the audience with a chance to see a live demonstration of the common tools cyber attackers use to attack cloud and traditional IT systems. This “Live Hack” used open source attack tools that are free and available for download by anybody. Attendees learned where to find and how to operate these tools for the purpose of testing their own IT infrastructure. The...
Mar. 26, 2017 03:30 AM EDT Reads: 7,247
SYS-CON Events announced today that IoT Now has been named “Media Sponsor” of SYS-CON's 20th International Cloud Expo, which will take place on June 6–8, 2017, at the Javits Center in New York City, NY. IoT Now explores the evolving opportunities and challenges facing CSPs, and it passes on some lessons learned from those who have taken the first steps in next-gen IoT services.
Mar. 26, 2017 03:30 AM EDT Reads: 3,792
SYS-CON Events announced today that Interoute, owner-operator of one of Europe's largest networks and a global cloud services platform, has been named “Bronze Sponsor” of SYS-CON's 20th Cloud Expo, which will take place on June 6-8, 2017 at the Javits Center in New York, New York. Interoute is the owner-operator of one of Europe's largest networks and a global cloud services platform which encompasses 12 data centers, 14 virtual data centers and 31 colocation centers, with connections to 195 add...
Mar. 26, 2017 03:15 AM EDT Reads: 945
SYS-CON Events announced today that MobiDev, a client-oriented software development company, will exhibit at SYS-CON's 20th International Cloud Expo®, which will take place June 6-8, 2017, at the Javits Center in New York City, NY, and the 21st International Cloud Expo®, which will take place October 31-November 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. MobiDev is a software company that develops and delivers turn-key mobile apps, websites, web services, and complex softw...
Mar. 26, 2017 01:45 AM EDT Reads: 3,678
DevOps is often described as a combination of technology and culture. Without both, DevOps isn't complete. However, applying the culture to outdated technology is a recipe for disaster; as response times grow and connections between teams are delayed by technology, the culture will die. A Nutanix Enterprise Cloud has many benefits that provide the needed base for a true DevOps paradigm.
Mar. 26, 2017 12:30 AM EDT Reads: 1,819
Information technology (IT) advances are transforming the way we innovate in business, thereby disrupting the old guard and their predictable status-quo. It’s creating global market turbulence. Industries are converging, and new opportunities and threats are emerging, like never before. So, how are savvy chief information officers (CIOs) leading this transition? Back in 2015, the IBM Institute for Business Value conducted a market study that included the findings from over 1,800 CIO interviews ...
Mar. 26, 2017 12:30 AM EDT Reads: 5,143
Virtualization over the past years has become a key strategy for IT to acquire multi-tenancy, increase utilization, develop elasticity and improve security. And virtual machines (VMs) are quickly becoming a main vehicle for developing and deploying applications. The introduction of containers seems to be bringing another and perhaps overlapped solution for achieving the same above-mentioned benefits. Are a container and a virtual machine fundamentally the same or different? And how? Is one techn...
Mar. 26, 2017 12:30 AM EDT Reads: 2,869
What sort of WebRTC based applications can we expect to see over the next year and beyond? One way to predict development trends is to see what sorts of applications startups are building. In his session at @ThingsExpo, Arin Sime, founder of WebRTC.ventures, will discuss the current and likely future trends in WebRTC application development based on real requests for custom applications from real customers, as well as other public sources of information,
Mar. 26, 2017 12:15 AM EDT Reads: 702
Keeping pace with advancements in software delivery processes and tooling is taxing even for the most proficient organizations. Point tools, platforms, open source and the increasing adoption of private and public cloud services requires strong engineering rigor - all in the face of developer demands to use the tools of choice. As Agile has settled in as a mainstream practice, now DevOps has emerged as the next wave to improve software delivery speed and output. To make DevOps work, organization...
Mar. 26, 2017 12:00 AM EDT Reads: 1,681
As businesses adopt functionalities in cloud computing, it’s imperative that IT operations consistently ensure cloud systems work correctly – all of the time, and to their best capabilities. In his session at @BigDataExpo, Bernd Harzog, CEO and founder of OpsDataStore, will present an industry answer to the common question, “Are you running IT operations as efficiently and as cost effectively as you need to?” He will expound on the industry issues he frequently came up against as an analyst, and...
Mar. 26, 2017 12:00 AM EDT Reads: 4,098
ChatOps is an emerging topic that has led to the wide availability of integrations between group chat and various other tools/platforms. Currently, HipChat is an extremely powerful collaboration platform due to the various ChatOps integrations that are available. However, DevOps automation can involve orchestration and complex workflows. In his session at @DevOpsSummit at 20th Cloud Expo, Himanshu Chhetri, CTO at Addteq, will cover practical examples and use cases such as self-provisioning infra...
Mar. 25, 2017 11:15 PM EDT Reads: 2,909
The financial services market is one of the most data-driven industries in the world, yet it’s bogged down by legacy CPU technologies that simply can’t keep up with the task of querying and visualizing billions of records. In his session at 20th Cloud Expo, Jared Parker, Director of Financial Services at Kinetica, will discuss how the advent of advanced in-database analytics on the GPU makes it possible to run sophisticated data science workloads on the same database that is housing the rich inf...
Mar. 25, 2017 10:45 PM EDT Reads: 3,610
For organizations that have amassed large sums of software complexity, taking a microservices approach is the first step toward DevOps and continuous improvement / development. Integrating system-level analysis with microservices makes it easier to change and add functionality to applications at any time without the increase of risk. Before you start big transformation projects or a cloud migration, make sure these changes won’t take down your entire organization.
Mar. 25, 2017 09:45 PM EDT Reads: 3,551
My team embarked on building a data lake for our sales and marketing data to better understand customer journeys. This required building a hybrid data pipeline to connect our cloud CRM with the new Hadoop Data Lake. One challenge is that IT was not in a position to provide support until we proved value and marketing did not have the experience, so we embarked on the journey ourselves within the product marketing team for our line of business within Progress. In his session at @BigDataExpo, Sum...
Mar. 25, 2017 08:45 PM EDT Reads: 2,752
Apache Hadoop is emerging as a distributed platform for handling large and fast incoming streams of data. Predictive maintenance, supply chain optimization, and Internet-of-Things analysis are examples where Hadoop provides the scalable storage, processing, and analytics platform to gain meaningful insights from granular data that is typically only valuable from a large-scale, aggregate view. One architecture useful for capturing and analyzing streaming data is the Lambda Architecture, represent...
Mar. 25, 2017 08:45 PM EDT Reads: 5,959