text
stringlengths 4
429
|
---|
into a newly created |
wuauclt |
directory, posing |
as Windows update and taking advantage of the DLL search order hijack weakness in order to load the malicious |
code in Windows. The same family of dropper has been used in previous targeted attacks against other sectors, |
indicating that a group with multiple interests is behind the attacks. The back door provided full access to the |
compromised computers. |
A week later, on January 7, 2013, the group attacked the same company again. Seventy emails were sent to |
58 individuals using either |
2012-13 NFL Playoffs Schedule |
or |
Re: 2012-13 NFL Playoffs Schedule |
as a |
subject line. In this wave, the attackers used a similar AVP.dll to the one used before. In some of the emails, an |
additional CHM file with an old exploit was used in an effort to maximize the chances of a successful infection. |
After this second wave, the attack ceased. It is unknown if the attackers successfully retrieved the information |
they were seeking, if they installed other back door Trojans or gained passwords that allowed them to directly |
access the computers, or if they have given up on the target. |
Greek oil campaign |
A global oil company, with offices around the world, had been under continuous attack for some time, but in |
September 2012 we noticed an upsurge in activity, with 34 times more suspicious emails than on average. This |
provided a clear indication that something suspicious was going on. At the end of this wave of emails, a hotel |
chain, a rental car company and two financial institutions were also targeted by the same attacker. This may |
have been an attempt to find further information that could be used in a future social engineering attack against |
the oil company. |
In total, 136 email accounts at the oil company were targeted. A regional sales manager in Greece received |
Page 14 |
Targeted Attacks Against the Energy Sector |
412 emails over the |
12 month period, |
with 155 different |
attachments. A HR |
person in the same |
country received |
the second largest |
amount of emails with |
90 in total. Seventeen |
other people were |
targeted between 70 |
and 90 times, many in |
the same region. The |
rest of the targeted |
people received less |
than five emails each, |
in what seems to have Figure 1. Number of emails targeting the company per day |
been an undirected |
spraying in the hope |
that at least some would fall for the bait. Clearly the one person that received the highest volume of emails was |
deemed to be of high value to the attackers. Possible explanations for the attack could be that a competitor |
wanted to know more about some upcoming deal or details on the oil field exploration, but this would be highly |
speculative. |
The spear phishing emails came from 234 spoofed addresses. They were made to appear to be linked to the |
company in relation to the subject and attachment chosen. Many of the emails came from the same country as |
the main targeted sales manager. |
The emails all contained malicious attachments. None of them linked to third party sites for drive-by downloads. |
Of the attachments, 1,588 had a .exe extension. Of those, 842 had a .pdf.exe extension. The malware chosen |
was a variant of the Poison Ivy Trojan Backdoor.Darkmoon and, in some minor cases, Trojan droppers that would |
download additional malware. The attackers did not use any zero-day exploits to drop a payload. |
The social engineering messages concentrated mainly around the following two themes: |
E-books and newspapers: |
E-Book.pdf.exe |
BusinessWeek.pdf.exe |
Financial Times E-Paper.pdf.exe |
The Economist Print Edition.pdf.exe |
The NY Times In Print.pdf.exe |
Free desktop tools: |
Babylon9 - Greek.exe |
Google Desktop Translator.exe |
SMS Free Sender Desktop.exe |
BBC iPlayer.exe |
Sticky Notes Desktop.exe |
Once installed, the back door would create a registry run key in order to restart with Windows and connect to |
one of three C&C servers located in Greece. The last C&C server has been used since 2010 in similar attacks |
against other companies. Other sub-domains at the same free host and DNS service have been used by other |
groups to spread malware in the past. |
updates.zyns.com |
amazoaws.dyndns-office.com |
msupdate.3utilities.com |
Page 15 |
Targeted Attacks Against the Energy Sector |
The chosen names of the C&C server domains imitates legitimate services in a bid to be overlooked by the system |
administrators when checking their logs. |
The back door provides full remote access to the compromised computers, allowing for extraction of any data. It is |
unknown if the attackers succeeded in their goal and if valuable information has been extracted. The attacks did not |
completely disappear, but the email volume decreased significantly to only a few emails per week afterwards. |
Motivation and origin |
As with all targeted attacks, there are many different groups of attackers operating in this field. These attacks cannot |
be attributed to only one group or geographical region. We have seen individuals, competitors, hacktivist groups |
and possible state sponsored agents carrying out attacks against energy companies. Some of the attacks have been |
purely opportunistic, seeking any valuable information available. Other campaigns look like they were planned over a |
lengthy period and carried out methodically with a clear goal in mind. |
The attackers tend to go after valuable information, including maps of new gas fields or research on efficient |
photovoltaic generators. This information can be of great value to competitors or nations that want to make progress |
in the same field. Another motivation for attackers is to profit from the information stolen by blackmailing the |
company. |
The same information can be used to carry out sabotage attacks designed to disrupt ICSs, as the energy sector is |
also a primary target for sabotage attacks which will not generate direct profit for the attacker. A competitor might |
be interested in generating bad press and bad customer experience for a rival company, in order to win some new |
clients. |
For example, in January 2013 a group claiming to be related to Anonymous posted access details for what they said |
Subsets and Splits