Researchers clash over possible return of Google attackers
Is the group behind the Google hack responsible for a new round of 'scary' PDF attacks?
Computerworld - Researchers on Monday clashed over whether recent attacks that exploit a bug in Adobe Reader are the work of the group that hacked Google and dozens of other major corporations late last year.
On one side, Mountain View, Calif.-based antivirus giant Symantec, whose security analysts said they've found evidence suggesting that the group which wormed its way into Google's corporate network in December 2009 is back in business.
On the other, Atlanta's much smaller SecureWorks, where researcher Don Jackson said that Symantec had "comingled" evidence of two separate attacks.
At issue were recent PDF-based exploits attached to messages touting renowned golf swing coach David Leadbetter that have exploited an unpatched bug in Adobe's popular Reader PDF viewer.
Security experts have called that exploit "scary" and "clever" for the way it sidesteps critical Windows defenses designed to isolate malicious code and make it harder to execute malware.
Those attacks went public last week, when independent security researcher Mila Parkour reported the flaw to Adobe, then published her preliminary findings. Adobe issued a security warning a day later, and on Monday announced it would patch the problem early next month.
Symantec, which has found signs of attack e-mails going back to at least Sept. 1, fired the first shots early Monday when company researcher Karthik Selvaraj said that the wording of the Leadbetter e-mails was "very similar" to the phrasing used in the attacks against Google and others in January 2010. Those attacks were dubbed "Operation Aurora" by a McAfee researcher.
Google traced the Aurora attacks to Chinese hackers, prompting it to threaten shutting down its China operations. This summer, Google compromised with China's authorities over censorship issues, and remains part of the China search scene.
At the time, Google characterized the attacks as "highly sophisticated and targeted," and said at least another 20 major companies were also subjected to the same kind of assaults.
"We looked at how they're distributing and propagating the [newest] attacks," said Joe Chen, the director of engineering in Symantec's security response group today in an interview, talking about why his company believes the two attacks are the likely work of the same group.
Selvaraj provided more similarities. "In addition, the use of a zero-day within a PDF, and how the executable is dropped on the system, all match the Hydraq method of operation," said Selvaraj.
"Hydraq" is the name Symantec assigned in January to the Trojan horse deposited on PCs compromised by the Aurora attacks.
"They're using the same techniques as Hyrdraq, leading us to believe that either it's two groups sharing knowledge or one group responsible for both," added Chen.
- Deep Security +VMware vSphere with Operations Management Most midsize organizations are highly virtualized on VMware, and while this has produced significant savings, it also has created new challenges when it...
- 3 Questions to Ask Your DNS Host about Lowering DDoS Risks Neustar has had wide-ranging conversations with clients wanting to know how they can optimize protection as DDoS attacks increase in frequency and size.
- The Danger Deepens: 2014 Neustar Annual DDoS Attacks and Impact Report This report compares DDoS findings from 2013 to 2012, based on a survey of 440 North American companies, including 139 businesses delivering technology...
- DDoS Infographic: How Are Attacks Evolving? For the third consecutive year, Neustar surveyed businesses across major industries to track the evolution of DDoS attacks. Are they more frequent? Larger?...
- How to Use Crowd-Sourced Threat Intelligence to Stop Malware in its Tracks Threat sharing networks have been around for a long time, however they have typically been "invitation-only", available to only large companies, or those...
- An Incident Response Playbook: From Monitoring to Operations As cyber-attacks grow more sophisticated, many organizations are investing more into incident detection and response capabilities. In this webcast, learn how to develop... All Malware and Vulnerabilities White Papers | Webcasts