Welcome!

Article

Chinese Attacks on the Media Industry

Just the Tip of the Iceberg

Two weeks ago the New York Times (NYT), Wall Street Journal (WSJ), Dow Jones (DJ) and Washington Post (WP) all reported being targeted and exploited by Chinese Advanced Persistent Threat (APT) groups.  In most cases, the compromises had reportedly been going on for quite some time and were severe enough that the Media Industry was forced over a barrel, like so many others, to stroke a check for a multi-month "cleanup on aisle nine" incident response effort.

Since the media is a highly relational and "connected" industry, it lends itself to being especially vulnerable to this type of remote exploitation.  Persistent access to media sources would be an obvious target because of the value they would provide to the Chinese. Access to timely confidential information would provide them, off the record notes, embargoed data, as well as sensitive, candid or compromising details of influential policy makers or corporate leaders to name a few.

Operational Caveat:

Cyber Squared has conducted analysis within ThreatConnect.com a threat intelligence-sharing exchange, and observed two dominate trends with regards to the media and Chinese cyber threats.  We have also uncovered additional targets and concluded that the recent attacks on the Media Industry are not the work of a single APT threat, but rather as many as six different threats groups.   All information referenced below is available within ThreatConnect.com to vetted security representatives of the effected media organizations who may register for an account.

Painting a Bigger Picture By the Numbers:

We begin with the primary and most pervasive trend that we see. Generally, Chinese APT groups will establish attack and command and control infrastructure that mimics legitimate news websites or media organizations.

A large majority of targeted spearphishing attacks will appear to be a benign news story emailed to the target with either an attachment or a malicious link.  As the victim interacts with either, their workstation and subsequently their enterprise falls victim to the APT.  In most cases, the attack circumvents traditional host based anti-virus by design. Multiple threat groups use a combination of these techniques to aggressively target their victims.

In another example, we observe multiple Chinese APT groups developing and operationalizing infrastructure so tailored that it most likely indicates that the attackers have operationalized it in an effort to directly target specific media organizations, publications and or individuals, versus indirectly targeting non-media related targets.

From analysis conducted by Cyber Squared's Threat Intelligence Team, we are able to determine that at least six APT groups are targeting the Media Industry.

APT Group 1:

From mid 2012 to present, APT Group 1 used infrastructure and capabilities that were most likely used to directly target the Dow Jones, specifically the Factiva news service, as well as indirectly target countless others with malicious content which appeared to be legitimate news stories from Dow Jones, World News and the Washington Post.  Targeting the Factiva service would have allowed attackers to obtain a wealth of information that could be used to target executives and journalists or react to market events and breaking news that the PRC leadership may consider unfavorable.

In early May 2012, APT Group 1 actors targeted the US think tank industry with a targeted attack from what appeared to be a prominent US Professor of East Asian History and Fulbright researcher.  The message contained a malicious link to a seemingly benign Washington post article about F-16 fighter sales to Taiwan, and commentary as to the sales not being in the best interest of Taiwan.  By early August 2012, APT Group 1 continued to target the US think tank industry, this time with a malicious Microsoft Word document that dropped a customized backdoor that beaconed to a secondary command and control infrastructure, closely associated with infrastructure observed in the May 2012 attack.

APT Group 2:

From late 2011 to present, Cyber Squared has observed APT Group 2 consistently using Beijing based infrastructure to possibly target and/or mimic a large named US and UK Media organization.

APT Group 3:

From mid 2012 to present, Cyber Squared has identified APT Group 3 using infrastructure to possibly target and/or mimic Philippine and Manila based news services.  APT Group 3 was also observed developing infrastructure used to emulate and target a US Defense Contractor who provides direct support to the US Navy in addition to developing infrastructure which mimicked a prominent US Pacific Command (US PACOM) web portal.  APT Group 3 continues to develop infrastructure with a consistent South China Sea and maritime focus.

APT Group 4:

From early 2012 to present, Cyber Squared has identified APT Group 4 using infrastructure to possibly target and/or mimic New York Times and a named Korean news service.

APT Group 5:

From late 2009 to present, Cyber Squared has identified APT Group 5 using infrastructure to possibly target and/or mimic named US, Australian, and Canadian news services.  In one example, Cyber Squared observed APT Group 5 developing infrastructure that appeared to mimic a local Utah based news service in late 2012.  We also observed APT Group 5 using associated infrastructure to most likely target a popular US, world news, finance, business and finance publication, in addition to numerous others within industries such as satellite communications (SATCOM), private sector defense, deep-water drilling and mining, and advanced research.

APT Group 6:

From late 2012 to present, Cyber Squared identified APT Group 6 using infrastructure to most likely target an international, multi-language US based news service that is tied to the Falun Gong, a spiritual movement outlawed in China that is often a critical of Chinese policies and human rights abuses.  Access to the US based news service would provide China State Security personnel insights to the internal news cycles, confidential sources and information that may subject mainland-Chinese journalists and their sources to arrest or intimidation.

Cyber Squared has also identified APT Group 6 most likely targeting a popular international publisher of a global metals journal and metals trading news, further research identified the same group controlling infrastructure that was tailored specifically for a large Japanese steel company and a large multi-national European steel company.  Remote access to these enterprises would provide the PRC timely insights into the metals market, possibly allowing them to obtain an unfair advantage in international metals trading.  Cyber Squared previously observed APT Group 6 targeting US Mining, Metals companies, Aerospace and Defense organizations, Manufacturing and Fabrication, as well as Construction and Engineering companies, all of which were highlighted within our 10 January 2013 blog posting, Victim-nomics: Estimating The "Cost" of Compromise.

Conclusion:

When a particular victim or industry reports a compromise of this nature we must also begin to look for what's below the waterline.  In the case of Chinese based APT's, it is important to understand that victims need not adopt a victim mindset, or assume that they are central to the story.  In many cases, there are others like them who can provide additional insights. When industries establish a community, work together, jointly collaborate and share information about their common attacker, this shared perspective of the adversary allows organizations to minimize the term and efficacy of exploitation operations.  Even from a post-incident perspective, when industries collaborate around common threat intelligence leads they paint a bigger overall picture about what is really going on.

The NYT, WSJ, Dow Jones, and WP can now join the ranks of those like Google, RSA, Lockheed Martin, and Rio Tinto. While these organizations should be applauded for coming forward, it is equally important to consider that of all of these victims who self reported are not the central story to Chinese corporate espionage. There are many more victims and targets.  Had these organizations implemented a community based threat intelligence-sharing program into their security strategy, perhaps the compromises would not have had been so severe. By sharing what they knew, when they knew it, they could have saved someone else from the same fate.  This is no different than how a neighborhood watch works, individual homeowners working as one community jointly with local law enforcement, sharing information to keep each other and their property safe.

As of February 9th 2013, the ThreatConnect.com community was just three months old, and we are already seeing a groundswell of participation.  We are currently tracking over 12,000 actionable APT threat indicators within a growing community of over 150 users and 45 organizational accounts, across numerous sectors and industries.  These users and organizations are following an average of 21 threats groups.  What is important is that all of these organizations have 100% control their data and can choose the data they share and with whom they share it.

ThreatConnect is enabling threat analysts to collect, analyze and share threat intelligence in a timely manner, allowing them to track and mitigate sophisticated threats that may be targeting their networks.  In ThreatConnect we're bringing the framework for a community to streamline trusted sharing, all you need to bring is your desire to not be another headline.

More Stories By Rich Barger

Rich is the Chief Intelligence Officer for Cyber Squared and the ThreatConnect Intelligence Research Team (TCIRT) Director.

Latest Stories
Most technology leaders, contemporary and from the hardware era, are reshaping their businesses to do software. They hope to capture value from emerging technologies such as IoT, SDN, and AI. Ultimately, irrespective of the vertical, it is about deriving value from independent software applications participating in an ecosystem as one comprehensive solution. In his session at @ThingsExpo, Kausik Sridhar, founder and CTO of Pulzze Systems, discussed how given the magnitude of today's application ...
Modern software design has fundamentally changed how we manage applications, causing many to turn to containers as the new virtual machine for resource management. As container adoption grows beyond stateless applications to stateful workloads, the need for persistent storage is foundational - something customers routinely cite as a top pain point. In his session at @DevOpsSummit at 21st Cloud Expo, Bill Borsari, Head of Systems Engineering at Datera, explored how organizations can reap the bene...
With tough new regulations coming to Europe on data privacy in May 2018, Calligo will explain why in reality the effect is global and transforms how you consider critical data. EU GDPR fundamentally rewrites the rules for cloud, Big Data and IoT. In his session at 21st Cloud Expo, Adam Ryan, Vice President and General Manager EMEA at Calligo, examined the regulations and provided insight on how it affects technology, challenges the established rules and will usher in new levels of diligence arou...
You know you need the cloud, but you're hesitant to simply dump everything at Amazon since you know that not all workloads are suitable for cloud. You know that you want the kind of ease of use and scalability that you get with public cloud, but your applications are architected in a way that makes the public cloud a non-starter. You're looking at private cloud solutions based on hyperconverged infrastructure, but you're concerned with the limits inherent in those technologies. What do you do?
Sanjeev Sharma Joins June 5-7, 2018 @DevOpsSummit at @Cloud Expo New York Faculty. Sanjeev Sharma is an internationally known DevOps and Cloud Transformation thought leader, technology executive, and author. Sanjeev's industry experience includes tenures as CTO, Technical Sales leader, and Cloud Architect leader. As an IBM Distinguished Engineer, Sanjeev is recognized at the highest levels of IBM's core of technical leaders.
Recently, WebRTC has a lot of eyes from market. The use cases of WebRTC are expanding - video chat, online education, online health care etc. Not only for human-to-human communication, but also IoT use cases such as machine to human use cases can be seen recently. One of the typical use-case is remote camera monitoring. With WebRTC, people can have interoperability and flexibility for deploying monitoring service. However, the benefit of WebRTC for IoT is not only its convenience and interopera...
In his general session at 21st Cloud Expo, Greg Dumas, Calligo’s Vice President and G.M. of US operations, discussed the new Global Data Protection Regulation and how Calligo can help business stay compliant in digitally globalized world. Greg Dumas is Calligo's Vice President and G.M. of US operations. Calligo is an established service provider that provides an innovative platform for trusted cloud solutions. Calligo’s customers are typically most concerned about GDPR compliance, application p...
Mobile device usage has increased exponentially during the past several years, as consumers rely on handhelds for everything from news and weather to banking and purchases. What can we expect in the next few years? The way in which we interact with our devices will fundamentally change, as businesses leverage Artificial Intelligence. We already see this taking shape as businesses leverage AI for cost savings and customer responsiveness. This trend will continue, as AI is used for more sophistica...
The 22nd International Cloud Expo | 1st DXWorld Expo has announced that its Call for Papers is open. Cloud Expo | DXWorld Expo, to be held June 5-7, 2018, at the Javits Center in New York, NY, brings together Cloud Computing, Digital Transformation, Big Data, Internet of Things, DevOps, Machine Learning and WebRTC to one location. With cloud computing driving a higher percentage of enterprise IT budgets every year, it becomes increasingly important to plant your flag in this fast-expanding busin...
SYS-CON Events announced today that Synametrics Technologies will exhibit at SYS-CON's 22nd International Cloud Expo®, which will take place on June 5-7, 2018, at the Javits Center in New York, NY. Synametrics Technologies is a privately held company based in Plainsboro, New Jersey that has been providing solutions for the developer community since 1997. Based on the success of its initial product offerings such as WinSQL, Xeams, SynaMan and Syncrify, Synametrics continues to create and hone inn...
Smart cities have the potential to change our lives at so many levels for citizens: less pollution, reduced parking obstacles, better health, education and more energy savings. Real-time data streaming and the Internet of Things (IoT) possess the power to turn this vision into a reality. However, most organizations today are building their data infrastructure to focus solely on addressing immediate business needs vs. a platform capable of quickly adapting emerging technologies to address future ...
No hype cycles or predictions of a gazillion things here. IoT is here. You get it. You know your business and have great ideas for a business transformation strategy. What comes next? Time to make it happen. In his session at @ThingsExpo, Jay Mason, an Associate Partner of Analytics, IoT & Cybersecurity at M&S Consulting, presented a step-by-step plan to develop your technology implementation strategy. He also discussed the evaluation of communication standards and IoT messaging protocols, data...
Product connectivity goes hand and hand these days with increased use of personal data. New IoT devices are becoming more personalized than ever before. In his session at 22nd Cloud Expo | DXWorld Expo, Nicolas Fierro, CEO of MIMIR Blockchain Solutions, will discuss how in order to protect your data and privacy, IoT applications need to embrace Blockchain technology for a new level of product security never before seen - or needed.
In his session at 21st Cloud Expo, Raju Shreewastava, founder of Big Data Trunk, provided a fun and simple way to introduce Machine Leaning to anyone and everyone. He solved a machine learning problem and demonstrated an easy way to be able to do machine learning without even coding. Raju Shreewastava is the founder of Big Data Trunk (www.BigDataTrunk.com), a Big Data Training and consulting firm with offices in the United States. He previously led the data warehouse/business intelligence and B...
The past few years have brought a sea change in the way applications are architected, developed, and consumed—increasing both the complexity of testing and the business impact of software failures. How can software testing professionals keep pace with modern application delivery, given the trends that impact both architectures (cloud, microservices, and APIs) and processes (DevOps, agile, and continuous delivery)? This is where continuous testing comes in. D