The Register® — Biting the hand that feeds IT

Feeds

Icefog hit-and-run hackers uncovered in Asia

Less persistent but more focused targeted attacks hit hundreds

Supercharge your infrastructure

Kaspersky Lab has uncovered a new APT campaign aimed at pilfering secrets from governments and supply chain industrial, military, media and technology companies in Japan and South Korea.

Icefog features many of the key attributes of targeted attacks, including the spear phishing email lure to gain a foothold in the victim’s network; the use of malware which exploits known vulnerabilities; and the nabbing of email credentials and system passwords to move laterally inside the organisation.

However, where Icefog differs is that attacks are more laser focused and shorter lived than typical APTs, according to Kaspersky Lab.

The vendor had the following in its report:

Perhaps one of the most important aspects of the Icefog C&Cs is the “hit and run” nature. The attackers would set up a C&C, create a malware sample that uses it, attack the victim, infect it, and communicate with the victim machine before moving on. The shared hosting would expire in a month or two and the C&C disappears.

The nature of the attacks was also very focused - in many cases, the attackers already knew what they were looking for. The filenames were quickly identified, archived, transferred to the C&C and then the victim was abandoned.

In addition, the Icefog backdoor set – created for both Windows and Mac – is directly controlled by the attackers and its latest version is “operated by the attackers to perform actions directly on the victim’s live systems”, rather than automatically lifting data, the report added.

After sinkholing 13 of the domains used, Kaspersky said it saw connections coming from victims in a range of countries including the US, Canada, Australia and UK, but most originated in Asia.

Based on the more reliable analysis of the C&C servers used in the targeted attacks, spear phishing examples and other data collected during our research, we believe that the primary targets of the Icefog operations were in South Korea and Japan.

In total, Kaspersky spotted more than 3,600 unique infected IPs and several hundred victims.

The Icefog gang apparently tried to hit defence contractors Lig Nex1 and Selectron; shipbuilding firm like DSME Tech; Hanjin Heavy Industries; telecom operators such as Korea Telecom; media companies including Fuji TV and the Japan-China Economic Association.

Kaspersky declined to say which of those attacks was successful but it did reveal that the Icefog gang was responsible for a 2011 online attack on members of the Japanese Diet, which was thought at the time to come from China.

Although some messages and code comments in the malware used were in Chinese, Kaspersky declined to publicly blame state-sponsored actors from the Middle Kingdom, and claimed the gang was also based in Japan and South Korea. ®

5 ways to reduce advertising network latency

Whitepapers

5 ways to reduce advertising network latency
Implementing the tactics laid out in this whitepaper can help reduce your overall advertising network latency.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Email delivery: 4 steps to get more email to the inbox
This whitepaper lists some steps and information that will give you the best opportunity to achieve an amazing sender reputation.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
5 ways to prepare your advertising infrastructure for disaster
Being prepared allows your brand to greatly improve your advertising infrastructure performance and reliability that, in the end, will boost confidence in your brand.

More from The Register

next story
Chaos Computer Club: iPhone 5S finger-sniffer COMPROMISED
Anyone can touch your phone and make it give up its all
NSA in new SHOCK 'can see public data' SCANDAL!
What you say on Twitter doesn't stay on Twitter
Hundreds of hackers sought for new £500m UK cyber-bomber strike force
Britain must rm -rf its enemies or be rm -rf'ed, declares defence secretary
UK's Get Safe Online? 'No one cares' - run the blockbuster ads instead
Something like Jack Bauer's 24 ... whatever it'll take to teach kids how to bat away hackers
Would you hire a hacker to run your security? 'Yes' say Brit IT bosses
We don't have enough securo bods in the industry either, reckon gloomy BOFHs
London schoolboy cuffed for BIGGEST DDOS ATTACK IN HISTORY
Bet his parents wish he'd been playing computer games
RSA: That NSA crypto-algorithm we put in our products? Stop using that
Encryption key tool was dodgy in 2007, and still dodgy now
The NSA's hiring - and they want a CIVIL LIBERTIES officer
In other news, the Spanish Inquisition want an equal opprtunities officer
'Occupy' affiliate claims Intel bakes SECRET 3G radio into vPro CPUs
Tinfoil hat brigade say every PC is on mobile networks, even when powered down
prev story