Hackers ramp up attacks against Tibetan activists
Hackers pose as security researchers or companies to trick Tibetan activists into infecting their computers with malware
IDG News Service - Hackers are ramping up their attacks against Tibetan activists and are using increasingly sophisticated techniques to deliver malware, according to researchers from security firms FireEye and Trend Micro.
In the last few of months, several security vendors have reported targeted attacks that distributed malware designed to steal confidential information from people or organizations supporting the Tibetan cause.
"No organized group receives targeted attacks with a higher volume or more regularity than Tibetan activists," FireEye senior systems engineer Alex Lanstein said in a blog post Friday. "Not USG, not US DIB, not Taiwan ... Tibet."
"Everyone, from the personal envoys to the Dalai Lama to student activists in San Francisco, gets hammered day in and day out, often times with pretty high octane stuff," Lanstein said.
The social engineering techniques used in these attacks are increasingly sophisticated and the distributed malware is capable of infecting both Windows and Mac OS X computers.
The attackers used AlienVault's report to give their rogue emails more legitimacy and to persuade activists to open the booby-trapped Word documents attached to them.
A similar technique was used recently to trick Tibetan activists into opening malicious PDF email attachments, by quoting a legitimate email message sent by FireEye's Lanstein to people who submitted Tibet-related malware samples to the VirusTotal online antivirus scanning service.
In his original email, Lanstein asked recipients if they are willing to contribute to a blog entry about attacks against Tibetan activists that he planned on writing.
However, a couple of days later, the researcher was notified by several individuals and organizations that rogue emails, which included his original message and a PDF exploit, were being sent out to people from a Yahoo account. There were several hints in the rogue emails that pointed to a Chinese origin, Lanstein said.
"This incident [involving rogue FireEye emails], along with the one that our friends from AlienVault reported about the usage of their blog post with a HTML copy of their site for these campaigns, shows that the attackers behind these targeted campaigns are becoming more creative to further their agenda," said Ivan Macalintal, threat research manager at Trend Micro, in a blog post on Friday.
Trend Micro's researchers have been keeping track of recent Tibet-related attack campaigns and issued two reports during the past several days about the techniques they've seen being used by the people behind them.
In one campaign, rogue emails sent to Tibetan activists contained a malicious RTF (Rich Text Format) file that exploited an older Microsoft Office vulnerability to install a backdoor, which was itself infected with a virus. The Trend Micro researchers call this hybridized malware.
- Deep Security +VMware vSphere with Operations Management Most midsize organizations are highly virtualized on VMware, and while this has produced significant savings, it also has created new challenges when it...
- 3 Questions to Ask Your DNS Host about Lowering DDoS Risks Neustar has had wide-ranging conversations with clients wanting to know how they can optimize protection as DDoS attacks increase in frequency and size.
- The Danger Deepens: 2014 Neustar Annual DDoS Attacks and Impact Report This report compares DDoS findings from 2013 to 2012, based on a survey of 440 North American companies, including 139 businesses delivering technology...
- DDoS Infographic: How Are Attacks Evolving? For the third consecutive year, Neustar surveyed businesses across major industries to track the evolution of DDoS attacks. Are they more frequent? Larger?...
- How to Use Crowd-Sourced Threat Intelligence to Stop Malware in its Tracks Threat sharing networks have been around for a long time, however they have typically been "invitation-only", available to only large companies, or those...
- An Incident Response Playbook: From Monitoring to Operations As cyber-attacks grow more sophisticated, many organizations are investing more into incident detection and response capabilities. In this webcast, learn how to develop... All Malware and Vulnerabilities White Papers | Webcasts