The Role of Malware in Reported Cyber Espionage: A Review of the Impact and Mechanism
Abstract
:1. Introduction
1.1. Background Knowledge and Related Work
- Cyberwar: It is not easy to distinguish an act of war performed in cyber space, as war is defined as a violent conflict between groups for political, economic or philosophical reasons. With this in mind, does defacing a website or infecting a computer with malware constitute an act of war? The authors argue that cyberwar requires a consequential impact in the physical world: to qualify as cyber war, the means may be virtual, but the impact should be real.
- Cyber espionage: This appears to be more easily defined as theft of intellectual property and company secrets in cyberspace. Cyber espionage is a means for intelligence gathering.
- Cybercrime: This is described as the most pervasive of the three, where criminal acts involving a computer or network are committed.
1.1.1. Difference in Malware for Crime and Espionage
Cyber Espionage | Cyber Crime | |
---|---|---|
Main Incentives | Information Gathering | Monetary gain, Vandalism |
Targets | Few | Many |
Malware Design | Tailored | Generic |
Knowledge Required | Industry specific, IT security, Culture and language | IT security |
Resources Required | Many | Few |
Engineering Complexity | High | Low |
1.1.2. The Attribution Problem
2. Methodology and Scope
- It must hold relevance to malware usage in industrial espionage and information gathering.
- The primary sources reviewed for this paper are technical reports from renowned security vendors and both peer reviewed journal and conference articles. A note on this is that most of the published literature within in this area is technical reports from security companies, and we therefore chose these as a primary source.
- Secondary sources reviewed include non-peer-reviewed sources, including other technical reports, subject books, white-papers and miscellaneous articles.
- The literature must describe attack vectors, malware function (information gathering) and targets.
- There is much exaggeration and (dis)information concerning APTs from different media. Therefore, the minimum requirement for an APT to be included in this report is that it is described in detail in a technical report from a renowned vendor.
3. Review of Published Industry Cyber Espionage Cases
3.1. Mandiant’s APT1: PLA Unit 61398
3.2. Red October
3.3. Stuxnet
3.4. Duqu
3.5. Flame
3.6. GhostNet
3.7. Mahdi
3.8. Shamoon
3.9. Gauss
- Hijacks browser sessions and steals password, cookies and browser history (Gauss module);
- Collects information about network connections, processes, folders, BIOS, CMOS RAM, local network and removable devices;
- Infects USB drives with a spy module in order to steal information from other computers;
- Interacts with C&C server, uploading stolen information and download additional modules.
3.10. BundesTrojaner
3.11. Political Espionage in Hong Kong
3.12. Careto
- Stealth rootkit to hide its files and network traffic;
- Sophisticated information-gathering tools to enumerate hardware and software configurations, including intercepting keystrokes, network and Wi-Fi traffic, Skype conversations, screenshots and to monitor file operations;
- User account information stealing;
- Theft of PGP and encryption keys;
- Uploading of user files;
- Downloading of new and updated malware.
3.13. Icefog
3.14. Dragonfly/Energetic Bear
3.15. Regin
4. Taxonomy of Published Major Cyber Espionage Incidents
- Impact (see Table 2): (i)“country” categorizes which countries were attacked; (ii) “target institutions” describes the reported target(s) for the attack; this category will in general be incomplete, as there will always be unrecorded events; (iii) “alleged origins” contains the likely origins of the attackers, based on information gathered on probable origins of the attack; (iv) “alleged motivation” contains gathered information about the possible underlying factors for the espionage campaign, such as financial or political; lastly, (v) “data collection” in which we categorize the type of information that the malware steals.
APT/Malware name | Year | Impact: Country | Impact: Targeted Institutions | Impact: Alleged Origins | Impact: Alleged Motivation |
---|---|---|---|---|---|
GhostNet | 2009 | India, Tibet (Dalai Lama), UN | Government (ministries of foreign affairs), embassies, business, academic computer systems | China | Political |
Stuxnet | 2010 | Iran | Iran’s nuclear program | USA, Israel | Delaying Iran Nuclear Program |
Duqu | 2011 | International (Europe and Middle East) | Various international companies (undisclosed) | USA, Israel | Gather information on future targets (?) |
BundesTrojaner | 2011 | Germany | German citizens/suspects | German Government | Law enforcement |
Icefog | 2011 | Japan and South Korea | Government institutions, military contractors, maritime, telecom, industrial/high-tech companies and mass-media. | Chinese Speaking hacker group | Unknown |
Political Espionage | 2011 | Hong-Kong (China) | High-ranking politicians | Likely regional actor | Political and/or financial |
Mahdi | 2012 | Iran, Israel, Afghanistan, and Middle East | Critical infrastructure companies, financial services, government embassies | Iranian | Unknown |
Shamoon | 2012 | Saudi Arabia, Saudi Aramco | Energy industry (oil) | Cutting Sword of Justice/ Arab youth group | Sabotage |
Gauss | 2012 | Lebanon and Middle East | (Lebanese) banking industry | USA, Israel | Unknown |
Flame | 2012 | Middle East, discovered internationally | Governmental Organizations, Educational institutions and private individuals | USA (CIA, NSA), Israel | Gather information on Iran’s nuclear program (?) |
APT1 | 2006 | International | Major industries | Chinese Military, PLA Unit 61398 | Financial, competitive |
2013 | |||||
Red October | 2013 | International | International embassies and governments (main targets) | Russian hacker group (?) | Political |
Careto | 2014 | International | Government institutions, diplomatic offices and embassies, energy, oil and gas companies, research organizations and activists. | Spanish-speaking country | Unknown |
Dragonfly/Energetic Bear | 2014 | Europe and North America | Aviation, defense and energy industries | Eastern Europe | Intelligence gathering |
Regin | 2011, Disc | Major: Russia, Saudi-Arabia, Minor: Pakistan, Austria, India, Afghanistan, Iran, Belgium, Ireland, Mexico | Telecom operators, government institutions, multinational political bodies, financial institutions, research institutions, hospitality, crypto-researchers | GCHQ? | Intelligence gathering, facilitate other types of attacks |
2014, Rep |
- Mechanism (see Table 3): (i) “dropper” contains a high-level description of the initial attack vector, how the system was initially compromised and the tools involved in establishing control over the system; (ii) “automatic propagation” describes any malware features present for self-propagation; (iii) “target OS/apps” describes which operating systems and applications the APT/malware targeted; (iv) “infection rates” describes the reported infections of each malware; (v) “mechanism: estimated complexity” gives our subjective rating of campaign complexity from our point of view based on the reviewed literature, within the subjective scale high-medium-low.
APT/Malware name | Mechanism: Dropper | Mechanism: Automatic Propagation | Mechanism: Target OS/Apps | Mechanism: Estimated Infection Rates (Known) | Mechanism: Estimated Complexity |
---|---|---|---|---|---|
GhostNet | Spear phishing, drive by attacks, gh0st RAT | Propagates through Email contact lists | MS Windows/Word | 1295 infections | Medium |
Stuxnet | USB stick, zero day | USB stick, zero day, self-propagation in LANs | MS Windows, Industrial control systems | Unknown | High |
Duqu | Spear phishing e-mails, zero day, RAT, zero day | No | MS Windows/Word | Around 20 unique infections | High |
BundesTrojaner | Manually delivered, RAT | No | MS Windows | Few individuals | Low |
Icefog | Spear phishing, e-mail attachments and websites, RAT | No | MS Windows/Word, Hangui Word Processor | More than 430 unique infections | High |
Political Espionage | Spear phishing, e-mail attachments, RAT | Unknown | MS Windows/ ord | Few | Medium |
Mahdi | Spear phishing, e-mail attachments, RAT | No | MS Windows/PowerPoint, jpg, PDF viewer | 800 in the Middle-East | Low |
Shamoon | Unknown (possiblyinsider attack) | Through networkshares | MS Windows NT | 30,000 infections in Saudi Aramco | Medium |
Gauss | Unknown, RAT | not found | MS Windows | Over 2000 infections | High |
Flame | Unknown, RAT | Several self-propagation methods | MS Windows | About 1000 unique infections | High |
APT1, PLA Unit 61398 | Spear phishing, e-mail attachments, RAT | No | MS Windows | 141 organizations, spanning 20 industries, 900 servers, 849 IP addresses | High |
Red October | Spear phishing, e-mail attachments, RAT | Not found | MS Windows/Word and Excel and PDF viewer | Over 300 unique systems. | High |
Careto | Spear phishing w/ linksto website, RAT | No | MS Windows, Linux, iOS, Android | 380 infections/31 countries | High |
Dragonfly/Energetic Bear | Spear phishing, email attachments, watering hole, spam campaigns, compromising 3rd party software components | Lateral movement and second stage tools | MS Windows/iExplorer PDF documents 3rd party servers | Unknown | High |
Regin | Spear phishing, watering hole, RAT (Unconfirmed) | Unconfirmed | MS Windows platforms and domain controllers, GSM base station controllers | Unknown | High |
5. Common Factor Analysis of Cyber Espionage Attacks
5.1. Impact
5.2. Mechanisms
5.3. General Phases of a Malware Espionage Attack
- (1)
- Reconnaissance phase: The attacker does an in-depth recon of the target and gathers information that has the potential of being used in the coming attack. For the social engineering part of the attack, this information includes names of employees and managers, meeting schedules, in general anything that can help the attacker design an attack to trick humans, e.g., spear phishing email, watering hole attack or to trick someone to run an infected USB memory drive. This phase also includes gathering of information about the target’s systems and technical vulnerabilities. This phase requires resources within both technical security expertise and industry knowledge, but reconnaissance functions can to partially be automated.
- (2)
- Preparation phase: Making use of the gathered information, the attacker(s) design their attack. This attack usually has an element of social engineering and a technical element, such as an email to a certain individual containing a document with an embedded zero-day exploit. The designed attachment is such that it increases the probability of the recipient opening it. However, the attack can also be a more passive attack, such as watering hole or the “fire and forget” strategy employed by Stuxnet. The watering hole is a way of infecting organizations that have proven resilient towards other types of attack.For narrowly-targeted attacks, this development phase requires a considerate amount of both time and resources and knowledge of human psychology, and language and culture are crucial when the attack involves aspects of social engineering. Expert knowledge of the industry and its systems is required to be able to gather the targeted information, e.g., if the target is industrial control systems, while considerable engineering and programming skills is required to program the malware.
- (3)
- Attack phase: The attackers launch their attack and attempt to infect the targets. Upon successful infection, the attacker can scan the network for other vulnerable machines and/or services to further increase access to the system and escalate privileges. Additional modules are also deployed for intelligence gathering. It seems seldom for automatic self-propagation mechanisms to be present in APT malware (exceptions to this are, e.g., GhostNet, Stuxnet and Flame), so propagation is likely to be conducted under the control of the attacker to maintain stealth. There has also been reports of APTs compromising non-sensitive servers within the target country to stage the attack. This is part of an attack strategy to avoid detection, as communication between domestic institutions will look like legitimate traffic.
- (4)
- Information collection phase: The attacker scans the infected machine(s) and gathers information. Many malwares come with a predetermined set of file types to look for on the infected system, such as Microsoft Office documents, pdfs and pictures. Several malwares also come with functionalities for wiretapping VoIP conversations, taking screen shots and logging key strokes. This phase requires the attackers to know what information to look for and to maintain stealth. It also requires knowledge of the local language.
- (5)
- Data exfiltration phase: The stolen information is packed into archives and usually encrypted on the infected system. The information is usually transmitted via several proxies to hide the identity of the attacker. In other instances, we see the information being downloaded and stored on compromised Internet servers.
- (6)
- Maintenance and wiping phase: This is the phase where the attacker maintains control over the infected systems and monitors for new valuable information to steal. We also saw from several advanced malwares that they contained a self-wiping function that was remotely controlled by the owners. This function, usually triggered within hours of the initial discovery of the malware, wipes the malware infection from the victim’s systems and deletes as many traces as possible of the infection.
6. Discussion
7. Conclusion
Acknowledgments
Conflicts of Interest
References
- TechTerms.com. Malware Definition. Available online: http://techterms.com/definition/malware (accessed on 12 May 2014).
- Li, F.; Lai, A.; Ddl, D. Evidence of Advanced Persistent Threat: A case study of malware for political espionage. In Proceedings of the 2011 6th International Conference on Malicious and Unwanted Software (MALWARE), Fajardo, PR, USA, 18–19 October 2011; pp. 102–109.
- Virvilis, N.; Gritzalis, D. The big four-What we did wrong in advanced Persistent Threat detection? In Proceedings of the 2013 Eighth International Conference on Availability, Reliability and Security (ARES), Regensburg, Germany, 2–6 September 2013; pp. 248–254.
- Bencsáth, B.; Pék, G.; Buttyán, L.; Félegyházi, M. The cousins of stuxnet: Duqu, flame, and gauss. Future Internet 2012, 4, 971–1003. [Google Scholar] [CrossRef]
- McGraw, G.; Fick, N. Separating Threat from the Hype: What Washington Needs to Know About Cyber Security. Am. Cyber Future Secur. Prosper. Inf. Age 2011, 2, 43–54. [Google Scholar]
- Felt, A.P.; Finifter, M.; Chin, E.; Hanna, S.; Wagner, D. A survey of mobile malware in the wild. In Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, Chicago, IL, USA, 17–21 October 2011; pp. 3–14.
- Deibert, R.; Rohozinski, R. Tracking GhostNet: Investigating a Cyber Espionage Network; Technical report; Information Warfare Monitor: Toronto, ON, Canada, 2009. [Google Scholar]
- Beyond the Breach—Mandiant Report; Mandiant: Alexandria, VA, USA, 2014.
- APT1 Exposing One of China’s Cyber Espionage Units–Mandiant Report; Mandiant: Alexandria, VA, USA, 2013.
- GReAT. Red October—Diplomatic Cyber Attacks Investigation; Technical report; Kaspersky Labs: Moscow, Russian, 2013. [Google Scholar]
- Langner, R. Stuxnet: Dissecting a cyberwarfare weapon. IEEE Secur. Priv. 2011, 9, 49–51. [Google Scholar] [CrossRef]
- Falliere, N.; Murchu, L.O.; Chien, E. W32. Stuxnet Dossier; Technical report; Symantec Corporation: Cupertino, CA, USA, 2011. [Google Scholar]
- Bencsáth, B.; Pék, G.; Buttyán, L.; Félegyházi, M. Duqu: Analysis, detection, and lessons learned. In Proceedings of the ACM European Workshop on System Security (EuroSec), Bern, Switzerland, 10 April 2012.
- W32.Duqu—The Precursor to the Next Stuxnet; Symantec Corporation: Cupertino, CA, USA, 2011.
- Fidler, D.P. Tinker, Tailor, Soldier, Duqu: Why cyber espionage is more dangerous than you think. Int. J. Crit. Infrastruct. Prot. 2012, 5, 28–29. [Google Scholar] [CrossRef]
- Bencsáth, B.; Pék, G.; Buttyán, L.; Félegyházi, M. Duqu: A Stuxnet-like Malware Found in the Wild; CrySyS Lab: Budapest, Hungary, 2011. [Google Scholar]
- Cherry, S. Sons of Stuxnet. Available online: http://spectrum.ieee.org/podcast/telecom/security/sons-of-stuxnet (accessed on 13 May 2015).
- Munro, K. Deconstructing Flame: The limitations of traditional defences. Comput. Fraud Secur. 2012, 2012, 8–11. [Google Scholar] [CrossRef]
- Bencsáth, B.; Buttyán, L.; Félegyházi, M.; Pék, G. sKyWIper (aka Flame aka Flamer): A Complex Malware for Targeted Attacks; CrySyS Lab: Budapest, Hungary, 2012. [Google Scholar]
- Gostev, A. The Flame: Questions and Answers. Available online: https://securelist.com/blog/incidents/34344/the-flame-questions-and-answers-51/ (accessed on 13 May 2015).
- Walter, J. “Flame Attacks”: Briefing and Indicators of Compromise; Technical report; McAfee Labs: Santa Clara, CA, USA, 2012. [Google Scholar]
- GReAT. Resource 207: Kaspersky Lab Research Proves That Stuxnet and Flame Developers are Connected; Technical report; Kaspersky Labs: Moscow, Russian, 2013. [Google Scholar]
- Nakashima, E.; Miller, G.; Tate, J. US, Israel developed Flame computer virus to slow Iranian nuclear efforts, officials say. Available online: http://cyber-peace.org/wp-content/uploads/2013/06/U.S.pdf (accessed on 13 May 2015).
- Adair, S.; Deibert, R.; Rohozinski, R.; Villeneuve, N.; Walton, G. Shadows in the Cloud: Investigating Cyber Espionage 2.0. A joint report of the Information Warfare Monitor and Shadowserver Foundation, Toronto (2010). Available online: https://www.f-secure.com/weblog/archives/Shadows_In_The_Cloud.pdf (accessed on 13 May 2015).
- Brulez, N. The “Madi” infostealers—A detailed analysis; Technical report; Kaspersky Labs and Seculert: Moscow, Russian; Santa Clara, CA, USA, 2012. [Google Scholar]
- GReAT. The Madi Campaign–Part 1; Technical report; Kaspersky Labs and Seculert: Moscow, Russian; Santa Clara, CA, USA, 2012. [Google Scholar]
- GReAT. The Madi Campaign—Part 2; Technical report; Kaspersky Labs and Seculert: Moscow, Russian; Santa Clara, CA, USA, 2012. [Google Scholar]
- Brulez, N. Madi is Back—New Tricks and New Command & Control Server; Technical report; Kaspersky Labs and Seculert: Moscow, Russian; Santa Clara, CA, USA, 2012. [Google Scholar]
- Raff, A. Mahdi—The Cyberwar Savior? Available online: http://www.seculert.com/blog/2012/07/mahdi-cyberwar-savior.html (accessed on 13 May 2015).
- Zhioua, S. The Middle East under Malware Attack Dissecting Cyber Weapons. In Proceedings of the 2013 IEEE 33rd International Conference on Distributed Computing Systems Workshops (ICDCSW), Philadelphia, PA, USA, 8–11 July 2013; pp. 11–16.
- Dehlawi, Z.; Abokhodair, N. Saudi Arabia’s response to cyber conflict: A case study of the Shamoon malware incident. In Proceedings of the 2013 IEEE International Conference on Intelligence and Security Informatics (ISI), Seattle, WA, USA, 4–7 June 2013; pp. 73–75.
- Symantec. The Shamoon Attacks; Technical report; Symantec Corporation: Cupertino, CA, USA, 2012; updated 2014. [Google Scholar]
- Bumgarner, J. Decapitating Saudi Aramco with the Sword of Justic. Available online: http://www.defenceiq.com/cyber-defence/articles/decapitating-saudi-aramco-with-the-sword-of-justic/ (accessed on 13 May 2015).
- GReAT. Gauss: Abnormal Distribution; Technical report; Kaspersky Labs and Seculert: Moscow, Russian; Santa Clara, CA, USA, 2012. [Google Scholar]
- GReAT. Gauss: Nation-state Cyber-surveillance Meets Banking Trojan; Technical report; Kaspersky Labs: Moscow, Russian, 2012. [Google Scholar]
- Chaos Computer Club Analyzes Government Malware; Chaos Computer Club: Hamburg, Germany, 2011.
- Sullivan, S. More Info on German State Backdoor: Case R2D2. Available online: https://www.f-secure.com/weblog/archives/00002250.html (accessed on 13 May 2015).
- Werner, T. Federal Trojan’s got a “Big Brother”. Available online: https://securelist.com/blog/research/31349/federal-trojans-got-a-big-brother-17/ (accessed on 13 May 2015).
- Gregory, M.A.; Glance, D. Cyber Crime, Cyber Security and Cyber Warfare. In Security and the Networked Society; Springer: Berlin/Heidelberg, Germany, 2013; pp. 51–95. [Google Scholar]
- Hypponen, M. Possible Governmental Backdoor Found (case R2D2). Available online: https://www.f-secure.com/weblog/archives/00002249.html (accessed on 13 May 2015).
- GReAT. In Unveiling “Careto”—The Masked APT; Technical report; Kaspersky Labs: Moscow, Russian, 2014.
- Careto Attack—The Mask; Technical report; McAfee Labs: Santa Clara, CA, USA, 2014.
- Schneier, B. “The Mask” Espionage Malware. Available online: https://www.schneier.com/blog/archives/2014/02/the_mask_espion.html (accessed on 13 May 2015).
- GReAT. The “Icefog” APT: A Tale of Cloak and Three Daggers; Technical report; Kaspersky Labs: Moscow, Russian, 2013. [Google Scholar]
- Symantec. Dragonfly: Cyberespionage Attacks Against Energy Suppliers; Technical report; Symantec Corporation: Cupertino, CA, USA, 2014. [Google Scholar]
- GReAT. Energic Bear—Crouching Yeti; Technical report; Kaspersky Labs: Moscow, Russian, 2014. [Google Scholar]
- Symantec. Regin: Top-Tier Espionage Tool Enables Stealthy Surveillance; Technical report; Symantec Corporation: Cupertino, CA, USA, 2014. [Google Scholar]
- GReAT. The Regin Platform: Nation-State Ownage of GSM Networks; Technical report; Kaspersky Labs: Moscow, Russian, 2014. [Google Scholar]
- Taleb, N.N. The Black Swan: The Impact of the Highly Improbable, 2nd ed.; Random House: New York, NY, USA, 2010. [Google Scholar]
© 2015 by the author; licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution license (http://creativecommons.org/licenses/by/4.0/).
Share and Cite
Wangen, G. The Role of Malware in Reported Cyber Espionage: A Review of the Impact and Mechanism. Information 2015, 6, 183-211. https://doi.org/10.3390/info6020183
Wangen G. The Role of Malware in Reported Cyber Espionage: A Review of the Impact and Mechanism. Information. 2015; 6(2):183-211. https://doi.org/10.3390/info6020183
Chicago/Turabian StyleWangen, Gaute. 2015. "The Role of Malware in Reported Cyber Espionage: A Review of the Impact and Mechanism" Information 6, no. 2: 183-211. https://doi.org/10.3390/info6020183
APA StyleWangen, G. (2015). The Role of Malware in Reported Cyber Espionage: A Review of the Impact and Mechanism. Information, 6(2), 183-211. https://doi.org/10.3390/info6020183