1. Welcome Guest! In order to create a new topic or reply to an existing one, you must register first. It is easy and free. Click here to sign up now!.
    Dismiss Notice

Cyberespionage groups are stealing digital certificates to sign malware

Discussion in 'General Malware And Security' started by Rich M, Mar 23, 2016.

  1. Rich M

    Rich M Guest

    Joined:
    Dec 24, 2013
    Messages:
    4,580
    Location:
    NE Pa USA
    Operating System:
    Windows 7
    Computer Brand or Motherboard:
    MSI Z97 PC Mate LGA 1150 Intel Z97
    CPU:
    Intel i7 4790K 4.0Ghz
    Memory:
    Corsair Vengeance 16GB (2x8GB) DDR3 2133
    Hard Drive:
    Crucial 256 Gb SSD+ WD Raptor 300 Gb Sata III
    Graphics Card:
    Radeon R9 280 2GB HDMI
    Power Supply:
    Seasonic 750 watt
    Cyberespionage groups are stealing digital certificates to sign malware
    More like this
    37935187ffcf31c658f5a3efcbb8415b.jpg
    Credit: IDGNS
    The China-based Suckfly group has used nine stolen digital certificates to sign its malicious programs since 2014



    • ae1b28efaf73c5ea1fa6c6bac407d3c2.jpg By Lucian Constantin

      Follow
      IDG News Service | Mar 16, 2016 10:01 AM PT

      RELATED TOPICS Comments
      An increasing number of cyberespionage groups are using stolen code-signing certificates to make their hacking tools and malware look like legitimate applications.

      The latest example is a China-based hacker group that has launched targeted attacks against government and commercial organizations from around the world over the past two years.

      4a19415d026bdba2673ff49f27677c10.jpg
      Efficiency hacks for IT: 6 tips for getting things done

      Modern tech leaders wear many hats -- too many, sometimes. Here are six expert tips from seasoned IT

      Read Now
      The group's activities were uncovered by researchers from Symantec in late 2015 when they detected a digitally signed hacking tool that was used in an attack against one of the company's customers.

      The tool, a Windows brute-force server message block (SMB) scanner, was signed with a digital certificate that belonged to a South Korean mobile software developer. This immediately raised red flags as a mobile software company would have no reason to sign such an application.

      Further searches led to the identification of three additional hacking tools that had been signed with the same certificate and had been used in an attack against a U.S.-based health provider operating in India.

      The Symantec researchers traced the attacks back to IP (Internet Protocol) addresses in Chengdu, China.

      The investigation ultimately led to the discovery of additional hacking programs and malware used by the same group of attackers in the past two years. Those programs had been signed with nine stolen digital certificates belonging to companies from Seoul, South Korea.

      Three of the certificate owners were companies from the software industry, three were from the video game industry, two were from the entertainment and media sector and one was from the financial services industry.

      "While we do not know the exact circumstances of how the certificates were stolen, the most likely scenario was that the companies were breached with malware that had the ability to search for and extract certificates from within the organization," the Symantec researchers said in a blog post Tuesday. "We have seen this capability built into a wide range of malware for a number of years now."

      When the certificates were discovered in late 2015 they were still valid and their rightful owners didn't know that they had been stolen, even though some of the certificates had been used to sign malware since 2014, the researchers said.

      In addition to hacking tools, this China-based hacker group, which Symantec has dubbed Suckfly, uses a custom backdoor program that appears to have been designed specifically for cyberespionage attacks. Symantec calls this malware program Backdoor.Nidiran.

      Suckfly is not the first group of attackers to digitally sign its malware. The Hidden Lynx and Winnti gangs, exposed in 2013, and the Black Vine group, uncovered in 2015, are also known to have used stolen code-signing certificates in their operations. More famously, the Stuxnet cybersabotage worm that affected Iran's nuclear program had components signed with several stolen certificates.

      http://www.computerworld.com/articl...ing-digital-certificates-to-sign-malware.html
     

Share This Page