|By Rich Barger||
|February 12, 2013 01:29 PM EST||
Two weeks ago the New York Times (NYT), Wall Street Journal (WSJ), Dow Jones (DJ) and Washington Post (WP) all reported being targeted and exploited by Chinese Advanced Persistent Threat (APT) groups. In most cases, the compromises had reportedly been going on for quite some time and were severe enough that the Media Industry was forced over a barrel, like so many others, to stroke a check for a multi-month "cleanup on aisle nine" incident response effort.
Since the media is a highly relational and "connected" industry, it lends itself to being especially vulnerable to this type of remote exploitation. Persistent access to media sources would be an obvious target because of the value they would provide to the Chinese. Access to timely confidential information would provide them, off the record notes, embargoed data, as well as sensitive, candid or compromising details of influential policy makers or corporate leaders to name a few.
Cyber Squared has conducted analysis within ThreatConnect.com a threat intelligence-sharing exchange, and observed two dominate trends with regards to the media and Chinese cyber threats. We have also uncovered additional targets and concluded that the recent attacks on the Media Industry are not the work of a single APT threat, but rather as many as six different threats groups. All information referenced below is available within ThreatConnect.com to vetted security representatives of the effected media organizations who may register for an account.
Painting a Bigger Picture By the Numbers:
We begin with the primary and most pervasive trend that we see. Generally, Chinese APT groups will establish attack and command and control infrastructure that mimics legitimate news websites or media organizations.
A large majority of targeted spearphishing attacks will appear to be a benign news story emailed to the target with either an attachment or a malicious link. As the victim interacts with either, their workstation and subsequently their enterprise falls victim to the APT. In most cases, the attack circumvents traditional host based anti-virus by design. Multiple threat groups use a combination of these techniques to aggressively target their victims.
In another example, we observe multiple Chinese APT groups developing and operationalizing infrastructure so tailored that it most likely indicates that the attackers have operationalized it in an effort to directly target specific media organizations, publications and or individuals, versus indirectly targeting non-media related targets.
From analysis conducted by Cyber Squared's Threat Intelligence Team, we are able to determine that at least six APT groups are targeting the Media Industry.
APT Group 1:
From mid 2012 to present, APT Group 1 used infrastructure and capabilities that were most likely used to directly target the Dow Jones, specifically the Factiva news service, as well as indirectly target countless others with malicious content which appeared to be legitimate news stories from Dow Jones, World News and the Washington Post. Targeting the Factiva service would have allowed attackers to obtain a wealth of information that could be used to target executives and journalists or react to market events and breaking news that the PRC leadership may consider unfavorable.
In early May 2012, APT Group 1 actors targeted the US think tank industry with a targeted attack from what appeared to be a prominent US Professor of East Asian History and Fulbright researcher. The message contained a malicious link to a seemingly benign Washington post article about F-16 fighter sales to Taiwan, and commentary as to the sales not being in the best interest of Taiwan. By early August 2012, APT Group 1 continued to target the US think tank industry, this time with a malicious Microsoft Word document that dropped a customized backdoor that beaconed to a secondary command and control infrastructure, closely associated with infrastructure observed in the May 2012 attack.
APT Group 2:
From late 2011 to present, Cyber Squared has observed APT Group 2 consistently using Beijing based infrastructure to possibly target and/or mimic a large named US and UK Media organization.
APT Group 3:
From mid 2012 to present, Cyber Squared has identified APT Group 3 using infrastructure to possibly target and/or mimic Philippine and Manila based news services. APT Group 3 was also observed developing infrastructure used to emulate and target a US Defense Contractor who provides direct support to the US Navy in addition to developing infrastructure which mimicked a prominent US Pacific Command (US PACOM) web portal. APT Group 3 continues to develop infrastructure with a consistent South China Sea and maritime focus.
APT Group 4:
From early 2012 to present, Cyber Squared has identified APT Group 4 using infrastructure to possibly target and/or mimic New York Times and a named Korean news service.
APT Group 5:
From late 2009 to present, Cyber Squared has identified APT Group 5 using infrastructure to possibly target and/or mimic named US, Australian, and Canadian news services. In one example, Cyber Squared observed APT Group 5 developing infrastructure that appeared to mimic a local Utah based news service in late 2012. We also observed APT Group 5 using associated infrastructure to most likely target a popular US, world news, finance, business and finance publication, in addition to numerous others within industries such as satellite communications (SATCOM), private sector defense, deep-water drilling and mining, and advanced research.
APT Group 6:
From late 2012 to present, Cyber Squared identified APT Group 6 using infrastructure to most likely target an international, multi-language US based news service that is tied to the Falun Gong, a spiritual movement outlawed in China that is often a critical of Chinese policies and human rights abuses. Access to the US based news service would provide China State Security personnel insights to the internal news cycles, confidential sources and information that may subject mainland-Chinese journalists and their sources to arrest or intimidation.
Cyber Squared has also identified APT Group 6 most likely targeting a popular international publisher of a global metals journal and metals trading news, further research identified the same group controlling infrastructure that was tailored specifically for a large Japanese steel company and a large multi-national European steel company. Remote access to these enterprises would provide the PRC timely insights into the metals market, possibly allowing them to obtain an unfair advantage in international metals trading. Cyber Squared previously observed APT Group 6 targeting US Mining, Metals companies, Aerospace and Defense organizations, Manufacturing and Fabrication, as well as Construction and Engineering companies, all of which were highlighted within our 10 January 2013 blog posting, Victim-nomics: Estimating The "Cost" of Compromise.
When a particular victim or industry reports a compromise of this nature we must also begin to look for what's below the waterline. In the case of Chinese based APT's, it is important to understand that victims need not adopt a victim mindset, or assume that they are central to the story. In many cases, there are others like them who can provide additional insights. When industries establish a community, work together, jointly collaborate and share information about their common attacker, this shared perspective of the adversary allows organizations to minimize the term and efficacy of exploitation operations. Even from a post-incident perspective, when industries collaborate around common threat intelligence leads they paint a bigger overall picture about what is really going on.
The NYT, WSJ, Dow Jones, and WP can now join the ranks of those like Google, RSA, Lockheed Martin, and Rio Tinto. While these organizations should be applauded for coming forward, it is equally important to consider that of all of these victims who self reported are not the central story to Chinese corporate espionage. There are many more victims and targets. Had these organizations implemented a community based threat intelligence-sharing program into their security strategy, perhaps the compromises would not have had been so severe. By sharing what they knew, when they knew it, they could have saved someone else from the same fate. This is no different than how a neighborhood watch works, individual homeowners working as one community jointly with local law enforcement, sharing information to keep each other and their property safe.
As of February 9th 2013, the ThreatConnect.com community was just three months old, and we are already seeing a groundswell of participation. We are currently tracking over 12,000 actionable APT threat indicators within a growing community of over 150 users and 45 organizational accounts, across numerous sectors and industries. These users and organizations are following an average of 21 threats groups. What is important is that all of these organizations have 100% control their data and can choose the data they share and with whom they share it.
ThreatConnect is enabling threat analysts to collect, analyze and share threat intelligence in a timely manner, allowing them to track and mitigate sophisticated threats that may be targeting their networks. In ThreatConnect we're bringing the framework for a community to streamline trusted sharing, all you need to bring is your desire to not be another headline.
Fifty billion connected devices and still no winning protocols standards. HTTP, WebSockets, MQTT, and CoAP seem to be leading in the IoT protocol race at the moment but many more protocols are getting introduced on a regular basis. Each protocol has its pros and cons depending on the nature of the communications. Does there really need to be only one protocol to rule them all? Of course not. In his session at @ThingsExpo, Chris Matthieu, co-founder and CTO of Octoblu, walk you through how Oct...
Oct. 24, 2016 08:15 AM EDT Reads: 3,140
SYS-CON Events announced today that Embotics, the cloud automation company, will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Embotics is the cloud automation company for IT organizations and service providers that need to improve provisioning or enable self-service capabilities. With a relentless focus on delivering a premier user experience and unmatched customer support, Embotics is the fas...
Oct. 24, 2016 08:00 AM EDT Reads: 830
DevOps is speeding towards the IT world like a freight train and the hype around it is deafening. There is no reason to be afraid of this change as it is the natural reaction to the agile movement that revolutionized development just a few years ago. By definition, DevOps is the natural alignment of IT performance to business profitability. The relevance of this has yet to be quantified but it has been suggested that the route to the CEO’s chair will come from the IT leaders that successfully ma...
Oct. 24, 2016 07:30 AM EDT Reads: 16,429
The Internet of Things (IoT), in all its myriad manifestations, has great potential. Much of that potential comes from the evolving data management and analytic (DMA) technologies and processes that allow us to gain insight from all of the IoT data that can be generated and gathered. This potential may never be met as those data sets are tied to specific industry verticals and single markets, with no clear way to use IoT data and sensor analytics to fulfill the hype being given the IoT today.
Oct. 24, 2016 07:30 AM EDT Reads: 2,545
More and more brands have jumped on the IoT bandwagon. We have an excess of wearables – activity trackers, smartwatches, smart glasses and sneakers, and more that track seemingly endless datapoints. However, most consumers have no idea what “IoT” means. Creating more wearables that track data shouldn't be the aim of brands; delivering meaningful, tangible relevance to their users should be. We're in a period in which the IoT pendulum is still swinging. Initially, it swung toward "smart for smar...
Oct. 24, 2016 07:15 AM EDT Reads: 915
@ThingsExpo has been named the Top 5 Most Influential M2M Brand by Onalytica in the ‘Machine to Machine: Top 100 Influencers and Brands.' Onalytica analyzed the online debate on M2M by looking at over 85,000 tweets to provide the most influential individuals and brands that drive the discussion. According to Onalytica the "analysis showed a very engaged community with a lot of interactive tweets. The M2M discussion seems to be more fragmented and driven by some of the major brands present in the...
Oct. 24, 2016 05:45 AM EDT Reads: 11,375
Traditional on-premises data centers have long been the domain of modern data platforms like Apache Hadoop, meaning companies who build their business on public cloud were challenged to run Big Data processing and analytics at scale. But recent advancements in Hadoop performance, security, and most importantly cloud-native integrations, are giving organizations the ability to truly gain value from all their data. In his session at 19th Cloud Expo, David Tishgart, Director of Product Marketing ...
Oct. 24, 2016 05:15 AM EDT Reads: 2,516
The Quantified Economy represents the total global addressable market (TAM) for IoT that, according to a recent IDC report, will grow to an unprecedented $1.3 trillion by 2019. With this the third wave of the Internet-global proliferation of connected devices, appliances and sensors is poised to take off in 2016. In his session at @ThingsExpo, David McLauchlan, CEO and co-founder of Buddy Platform, discussed how the ability to access and analyze the massive volume of streaming data from millio...
Oct. 24, 2016 05:00 AM EDT Reads: 3,096
WebRTC has had a real tough three or four years, and so have those working with it. Only a few short years ago, the development world were excited about WebRTC and proclaiming how awesome it was. You might have played with the technology a couple of years ago, only to find the extra infrastructure requirements were painful to implement and poorly documented. This probably left a bitter taste in your mouth, especially when things went wrong.
Oct. 24, 2016 05:00 AM EDT Reads: 5,536
SYS-CON Events announced today that Pulzze Systems will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Pulzze Systems, Inc. provides infrastructure products for the Internet of Things to enable any connected device and system to carry out matched operations without programming. For more information, visit http://www.pulzzesystems.com.
Oct. 24, 2016 05:00 AM EDT Reads: 2,499
Without lifecycle traceability and visibility across the tool chain, stakeholders from Planning-to-Ops have limited insight and answers to who, what, when, why and how across the DevOps lifecycle. This impacts the ability to deliver high quality software at the needed velocity to drive positive business outcomes. In his general session at @DevOpsSummit at 19th Cloud Expo, Eric Robertson, General Manager at CollabNet, will discuss how customers are able to achieve a level of transparency that e...
Oct. 24, 2016 05:00 AM EDT Reads: 861
SYS-CON Events announced today that Interface Masters Technologies, a leader in Network Visibility and Uptime Solutions, will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Interface Masters Technologies is a leading vendor in the network monitoring and high speed networking markets. Based in the heart of Silicon Valley, Interface Masters' expertise lies in Gigabit, 10 Gigabit and 40 Gigabit Eth...
Oct. 24, 2016 04:45 AM EDT Reads: 3,327
Successful digital transformation requires new organizational competencies and capabilities. Research tells us that the biggest impediment to successful transformation is human; consequently, the biggest enabler is a properly skilled and empowered workforce. In the digital age, new individual and collective competencies are required. In his session at 19th Cloud Expo, Bob Newhouse, CEO and founder of Agilitiv, will draw together recent research and lessons learned from emerging and established ...
Oct. 24, 2016 04:30 AM EDT Reads: 1,320
Enterprise IT has been in the era of Hybrid Cloud for some time now. But it seems most conversations about Hybrid are focused on integrating AWS, Microsoft Azure, or Google ECM into existing on-premises systems. Where is all the Private Cloud? What do technology providers need to do to make their offerings more compelling? How should enterprise IT executives and buyers define their focus, needs, and roadmap, and communicate that clearly to the providers?
Oct. 24, 2016 04:30 AM EDT Reads: 2,504
One of biggest questions about Big Data is “How do we harness all that information for business use quickly and effectively?” Geographic Information Systems (GIS) or spatial technology is about more than making maps, but adding critical context and meaning to data of all types, coming from all different channels – even sensors. In his session at @ThingsExpo, William (Bill) Meehan, director of utility solutions for Esri, will take a closer look at the current state of spatial technology and ar...
Oct. 24, 2016 04:00 AM EDT Reads: 1,721