The Empire Strikes Back - Press Center | Kaspersky Lab

THE EMPIRE
STRIKES BACK
Costin G. Raiu
How APT actors fight each
other for control
I FLY A LOT, HOW ABOUT YOU?
Recent flight tragedies
MH17
QZ8501
MH370
4U9525
CYBERCRIMINALS ARE QUICK
TO EXPLOIT TRAGEDIES
• Cybercriminals take advantage of news to
launch phishing attacks
• Such news includes hurricanes, earthquakes,
tsunamis, terrorist attacks or other tragedies
• The goal is to trick people looking for news
into opening malicious emails and
documents
MH370
NAIKON: MH370 ATTACKS
• The Naikon group is an APT that is very active
in Asia
• We’ve noticed a spike in the number of Naikon
attacks against the Philippines, Malaysia,
Cambodia, Indonesia, Vietnam, Myanmar,
Singapore and Nepal
• Naikon was quick to exploit the MH370 tragedy
• It launched a massive campaign to attack other
nations in APAC, notably those involved in the
search for MH370
NAIKON SPEAR-PHISHING
HUNDREDS OF EMAILS WERE SENT
AFFECTED PARTIES IN VARIOUS COUNTRIES
• Office of the President
• Navy Forces
• Armed Forces
• Office of the Cabinet Secretary
• National Security Council
• Office of the Solicitor General
• National Intelligence Coordinating Agency
• Civil Aviation Authority
• Department of Justice
• National Police
• Presidential Management Staff
Several
hundred
victims
Thousands of
documents
stolen
THE VICTIM ASKS
THE ATTACKER REPLIES
A BIT LATER…
Directory of … Mar 31, 2014.scr
THE “HELLSING" APT
• Active since ~2012
• Spear-phishing:
archives, SCR files
• Main interests: APAC nations
• No financial gain, pure
intelligence gathering
• Probably nation-state
sponsored
Country “A”:
Country “B”:
Country “C”:
• Ministry of
Foreign
Affairs
• Ministry of
Tourism and
Culture
• Immigration
Department
• Office of the
President
• National
Economic and
Development
Authority
• Society for
Quality
• Ministry
of Foreign
Affairs
+Embassies,
ASEAN, etc…
ATTACK ANALYSIS – “HELLSING”
AM I AT RISK?
Risk factors:
• Do you receive and read hundreds of emails, open attachments?
• Do you work for/with governments in APAC?
• Have you received suspicious .scr files?
• Inside RAR/ZIP archives, with password?
To find out if you’re infected:
• Use our IOCs document
• All Kaspersky Lab products detect the Hellsing actor
PREVENTION MEASURES (GENERAL)
• Educate employees on how to avoid being ‘socially-engineered’
• Use strong anti-malware suites, best practices
• Use separate laptops for travel
• Don’t update software while traveling
• Use VPNs
• Use strong and unique passwords for each website
• Default deny policies stop many APTs dead in their tracks
CONCLUSION
• Welcome to APT wars!
• Attack / counterattack mentality
• Goals: attribution, counter-intelligence gathering
• Are they really advanced? No
• Are they really a threat?
Yes!
Prediction:
we’ll see more
APT wars in the
near future
QUESTIONS?