Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity

    ‘Hidden Lynx’ Group Hacks for Highest Bidder: Symantec Report

    Written by

    Robert Lemos
    Published September 19, 2013
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      A professional group of hackers, likely based in China, has infiltrated government agencies, multinational companies and even security firms, using sophisticated tactics and tools, according to a report released by Symantec on Sept. 18.

      The group, dubbed “Hidden Lynx” by Symantec researchers, has attacked hundreds of organizations since the first signs of their attacks became evident in 2009. The group has recently conducted attacks against South Korea and has also attacked a number of firms in the United States’ defense industrial base, or DIB, Symantec stated in the report.

      “They are methodical in their approach and they display a skill set far in advance of some other attack groups also operating in that region, such as the Comment Crew,” Satnam Narang, a researcher at Symantec, stated in an email interview with eWEEK. “The wide variety of industries targeted and their use of supply chain organizations to reach these targets demonstrates that any organization is a potential target.”

      While the Symantec report gives new details on the group, researchers have been studying these hackers for some time. Security services firm CrowdStrike calls the group Aurora Panda—”Panda” being their lexicon for any group suspected of being based in China—for its part in Operation Aurora, a large espionage effort that stole information from more than two dozen multinational companies, including Google.

      In addition, the group was behind the attack on security giant RSA, which resulted in the company losing an important database of keys for generating the one-time passwords for its SecureID products, Dmitri Alperovitch, chief technology officer and co-founder of CrowdStrike, told eWEEK.

      “We have been tracking them very closely for many years,” Alperovitch said. “They are certainly the best hacking group that is operating out of China—very professional, very methodical, and have access to a large number of zero days.”

      The hacking group has two teams that focus on different targets, according to Symantec’s report. The first uses a customized version of the Gh0st RAT Trojan, named Backdoor.Moudoor, to compromise a large number of targets in different industries.

      The second team uses a custom attack program, dubbed Trojan.Naid by Symantec, to attack specific targets in very limited campaigns. The Naid Trojan was used both to compromise security firm Bit9 and as part of the compromise of more than two dozen multinational companies, publicly acknowledged by Google in 2009, in one of the first cyber-espionage campaigns discussed in the media. The security firm has named the two subgroups Team Moudoor and Team Naid after their primary tools.

      The compromise of security firm Bit9, leading to the leak of a digital certificate that could sign malware, has garnered a great deal of notoriety for the group. Programs signed with the certificates are considered trusted and will not be blocked by the company’s security technology.

      Because the group attacks a wide variety of targets, appears very professional and likely has between 50 and 100 skilled security experts, Symantec concluded that they are likely a company who hacks for clients.

      “The sheer variety of targets this group attacks points to them being ‘hackers for hire’—potentially offering their services to whoever can pay the highest price,” Narang said. “Given the fact this group isn’t focused on a specific industry or geographical region—they target both public and private organizations—their motivation appears to be financial gain.”

      Yet, other security experts disagree. While the group could be a company, they are most likely closely tied to the Chinese government, said CrowdStrike’s Alperovitch.

      “Whether they are a part of the government, like an intelligence agency or a military unit, I don’t know. But, I don’t believe they are just out there for anyone to hire,” he said.

      Robert Lemos
      Robert Lemos
      Robert Lemos is an award-winning journalist who has covered information security, cybercrime and technology's impact on society for almost two decades. A former research engineer, he's written for Ars Technica, CNET, eWEEK, MIT Technology Review, Threatpost and ZDNet. He won the prestigious Sigma Delta Chi award from the Society of Professional Journalists in 2003 for his coverage of the Blaster worm and its impact, and the SANS Institute's Top Cybersecurity Journalists in 2010 and 2014.

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×