Cyber-spy campaign using code from Chinese group spotted: McAfee

Image
IANS Las Vegas
Last Updated : Oct 18 2018 | 4:20 PM IST

Global cybersecurity firm McAfee on Thursday said it discovered a new cyber espionage campaign which reused source code from the hacker group APT1, or Comment Crew, a Chinese military-affiliated group accused of launching cyber-attacks on more than 141 US companies from 2006 to 2010.

The new campaign, dubbed Operation Oceansalt, is targeting South Korea, Canada and the US, McAfee said in a report released in its cybersecurity summit "MPOWER 2018" here.

The actors of this new campaign have not been identified.

However, the report suggests that the development of the Oceansalt implant would not have been possible unless the actors behind it had direct access to Comment Crew's 2010 Seasalt source code.

"This research represents how threat actors are continuously learning from each other and building upon their peers' greatest innovations," Raj Samani, Chief Scientist at McAfee, said in a statement.

McAfee found that Oceansalt was launched in five attack "waves" adapted to its targets.

The first and second waves of the attack were spearfishing based and began with a malicious Korean-language Microsoft Excel document created and saved in May 2018, acting as downloaders of the implant.

A third round of malicious documents, this time in Microsoft Word, carried the same metadata and author as the Excel documents.

The Word document contained fake information related to the financials of the Inter-Korean Cooperation Fund. Waves four and five identified a small number of targets outside of South Korea - including the US and Canada - as the attackers expanded their scope.

As for implications and impact, these attacks may be a precursor to a much larger attack given the control the attackers have over their infected victims, McAfee said.

Oceansalt gives the attackers full control of any system they manage to compromise and the network to which it is connected. Given the potential collaboration with other threat actors, considerably more assets are open and available to act upon, the report said.

--IANS

gb/sed

Disclaimer: No Business Standard Journalist was involved in creation of this content

*Subscribe to Business Standard digital and get complimentary access to The New York Times

Smart Quarterly

₹900

3 Months

₹300/Month

SAVE 25%

Smart Essential

₹2,700

1 Year

₹225/Month

SAVE 46%
*Complimentary New York Times access for the 2nd year will be given after 12 months

Super Saver

₹3,900

2 Years

₹162/Month

Subscribe

Renews automatically, cancel anytime

Here’s what’s included in our digital subscription plans

Exclusive premium stories online

  • Over 30 premium stories daily, handpicked by our editors

Complimentary Access to The New York Times

  • News, Games, Cooking, Audio, Wirecutter & The Athletic

Business Standard Epaper

  • Digital replica of our daily newspaper — with options to read, save, and share

Curated Newsletters

  • Insights on markets, finance, politics, tech, and more delivered to your inbox

Market Analysis & Investment Insights

  • In-depth market analysis & insights with access to The Smart Investor

Archives

  • Repository of articles and publications dating back to 1997

Ad-free Reading

  • Uninterrupted reading experience with no advertisements

Seamless Access Across All Devices

  • Access Business Standard across devices — mobile, tablet, or PC, via web or app

More From This Section

First Published: Oct 18 2018 | 4:16 PM IST

Next Story