Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Subscribe
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Subscribe
    Home Cloud
    • Cloud
    • Cybersecurity
    • Networking

    Spear-Phishing Attack on Industrial Consulting Firm Linked to Larger Campaign

    Written by

    Brian Prince
    Published June 14, 2012
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      An unsuccessful spear-phishing attempt against a company specializing in assessing industrial control systems is tied to a larger campaign believed to be emanating from China, security researchers say.

      Last week, it was revealed that an employee of Digital Bond had received an email from an account meant to impersonate CEO Dale Peterson. The message linked to a .zip file based on an old research paper the company had published.

      Further analysis by researchers at AlienVault and IOActive connects the perpetrators of the attack to attacks against other organizations.

      “Using the information extracted from the binaries and the servers involved on the attack, we were able to [identify] more files and campaigns launched by this group during the last months,” explained Jaime Biasco, labs manager at AlienVault, in a blog post.

      Among the targets in those attacks were the Japan Network Information Center and the Hong Kong University of Science and Technology.

      “We have identified that the group behind these attacks is using hacked Web servers to host the malicious configuration files,” Biasco added. “Based on the networks hosting the C&C [command-and-control] IPs (mainly universities), it is very likely that these servers are also hacked and some kind of proxy is installed on them to redirect the traffic to the real C&C server. This can be easily [achieved] using HTran or other similar software commonly used by Chinese hacker groups in this kind of campaign.”

      Other targets of these attacks include targets related to the U.S. government or U.S. defense contractors directly, providing different services, such as authentication software/hardware, industrial control systems security or strategic consulting, explained Ruben Santamarta, a researcher for IOActive.

      Despite the difficulty in trying to confirm the true source of these attacks, €œwe would like to note that code, tricks and certain infrastructure usually present in the Chinese hacking scene have been identified in this campaign,” he blogged.

      When the malicious .zip file was analyzed by the Shadowserver Foundation, researchers concluded the attack patterns were similar to what was uncovered in the Shady Rat campaign revealed by McAfee in 2011. According to McAfee’s research, Shady Rat’s roots trace back to 2006 and have affected scores of organizations ranging from defense contractors to the United Nations.

      According to Shadowserver’s Ned Moran, the similarities between Shady Rat and the attack on Digital Bond include the use of encoded commands hidden in otherwise normal-looking Web pages, as well as an overlap in the C&C infrastructure used in this attack with previous Shady RAT attacks.

      The malware used in the attack was hosted on research.digitalvortex.com. Once a system is infected, the malware is designed to create a backdoor and connect to a C&C server at hint.happyforever.com.

      “It’s a bit concerning that a company whose sole focus is securing industrial control systems should be spear-phished,” blogged Reid Wightman, a Digital Bond security consultant. “The attacker clearly went to enough trouble to try to understand ICS security lingo to get the employee to open the link, and had to compromise a DNS server. … Thankfully, the attack was unsuccessful€”paranoia pays off. It is definitely a lesson in €˜be careful what you open€™ … even if looks to be coming from Digital Bond (or your boss, as in this case), don€™t open a file if you aren€™t expecting it.”

      Brian Prince
      Brian Prince

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.