The results of the latest study from Kaspersky Lab indicate that social media now leaves many people feeling negative
Sint Maarten, Security Analyst Summit, April 3, 2017 Kaspersky Lab and Kings College London researchers announced today that they found a link between a modern threat actor and the Moonlight Maze attacks through samples, logs and artefacts belonging to the ancient APT, which targeted the Pentagon, NASA and more in the late 1990s. The findings show that a backdoor used in 1998 by Moonlight Maze to tunnel information out of victim networks connects to a backdoor used by Turla in 2011 and possibly as recently as 2017. If the link between Turla and Moonlight Maze is proven, it would place the evolved threat actor alongside the Equation Group in terms of its longevity, as some of Equation’s command-and-control servers date back to 1996.
Contemporary reports on Moonlight Maze show how, starting from 1996, U.S. military and government networks, as well as universities, research institutions and even the Department of Energy began detecting breaches in their systems. In 1998, the FBI and the Department of Defense launched a massive investigation. The story became public in 1999, but much of the evidence has remained classified, leaving the details of Moonlight Maze shrouded in myth and secrecy.
Over the years, original investigators in three different countries have stated that Moonlight Maze evolved into Turla, a Russian-speaking threat actor also known as Snake, Uroburos, Venomous Bear, and Krypton. Turla is conventionally believed to have been active since 2007.
The ‘Cupboard Samples’
In 2016, while researching his book, Rise of the Machines, Thomas Rid of Kings College London tracked down a former system administrator whose organization’s server had been hijacked as a proxy by the Moonlight Maze attackers. This server, ‘HRTest,’ had been used to launch attacks on the U.S. The now-retired IT professional had kept the original server and copies of everything relating to the attacks, and gave it to Kings College and Kaspersky Lab for further analysis.
Kaspersky Lab researchers, Juan Andres Guerrero-Saade and Costin Raiu, together with Thomas Rid and Danny Moore from Kings College, spent nine months undertaking a detailed technical analysis of these samples. They reconstructed the attackers’ operations, tools and techniques, and also conducted a parallel investigation to see if they could prove the claimed connection with Turla.
Moonlight Maze was an open-source Unix-based attack targeting Solaris systems, and the findings show that it made use of a backdoor based on LOKI2 (a program released in 1996 that enables users to extract data via covert channels). This led the researchers to take a second look at some rare Linux samples used by Turla that Kaspersky Lab had discovered in 2014. Named Penquin Turla, these samples are also based on LOKI2. Further, the re-analysis showed that all of them use code created between 1999 and 2004.
Remarkably, this code is still being used in attacks. It was spotted in the wild in 2011, when it was found in an attack on defense contractor Ruag in Switzerland that has been attributed to Turla. Then, in March 2017, Kaspersky Lab researchers discovered a new sample of the Penquin Turla backdoor submitted from a system in Germany. It is possible that Turla uses the old code for attacks on highly secure entities that might be harder to breach using its more standard Windows toolset.
“In the late 1990s, no-one foresaw the reach and persistence of a coordinated cyberespionage campaign,” said Juan Andres Guerrero-Saade, senior security researcher, Global Research and Analysis Team at Kaspersky Lab. “We need to ask ourselves why it is that attackers are still able to successfully leverage ancient code in modern attacks. The analysis of the Moonlight Maze samples is not just a fascinating archaeological study; it is also a reminder that well-resourced adversaries aren’t going anywhere, it’s up to us to defend systems with skills to match.”
The newly unearthed Moonlight Maze files reveal many fascinating details about how the attacks were conducted using a complex network of proxies, and the high level of skills and tools used by the attackers. Further information on the attack sequence and typology can be found here.
Further information on the attack sequence and typology can be found here https://youtu.be/9RorL9y70GU
For further information please read the blog on Securelist.com.
Kaspersky Lab products successfully detect and block malware used by Moonlight Maze and Penquin Turla.
Details of the Cupboard Samples logs and scripts, as well as Indicators of Compromise and hashes to help organizations search for traces of these attack groups in their corporate networks can be read in the report.
Detailed advance intelligence on the latest threats and threat actors is available to customers of Kaspersky Lab APT Intelligence reporting service. Learn more here.
About Kaspersky Lab
Kaspersky Lab is a global cybersecurity company founded in 1997. Kaspersky Lab’s deep threat intelligence and security expertise is constantly transforming into security solutions and services to protect businesses, critical infrastructure, governments and consumers around the globe. The company’s comprehensive security portfolio includes leading endpoint protection and a number of specialized security solutions and services to fight sophisticated and evolving digital threats. Over 400 million users are protected by Kaspersky Lab technologies and we help 270,000 corporate clients protect what matters most to them. Learn more at www.kaspersky.com.
For the latest in-depth information on security threat issues and trends, please visit:
Securelist | Information about Viruses, Hackers and Spam
Follow @Securelist on Twitter
Threatpost | The First Stop for Security News
Follow @Threatpost on Twitter
Articles related to Virus News
One-in-ten bend the truth on social media to make themselves feel good – and men go even further, Kaspersky Lab study reveals
In the quest for social validation people are playing with the truth and whitewashing their lives.
Kaspersky Lab today announced the global availability of Kaspersky Threat Lookup – a security intelligence service aimed at enhancing enterprise incident response and cybersecurity forensics capabilities.