Disclosure Does Little to Dissuade Cyber Spies

  /     /     /  
Publicated : 23/11/2024   Category : security


Disclosure Does Little to Dissuade Cyber Spies


In the past, outing nation-state cyber espionage groups caused a few to close up shop, but nowadays actors are more likely to switch to new infrastructure and continue operations.



When cybersecurity services firm Mandiant released its APT 1 report in 2013, the Chinese group immediately shut down, and the command-and-control servers that had been used by the group to manage its infrastructure went quiet. 
The incident has driven a naming-and-shaming policy pursued by the United States, which has filed indictments against a number of cyber-espionage actors in Russia, China, and Iran. However, such tactics increasingly appear to fail to have the intended effect, according to a report planning to be published on Nov. 5 by defense giant BAE Systems. While an Iranian group, which BAE Systems calls Operation Cleaver, ceased operations following a report in late 2014, many other Iranian groups continued to operate, including Team Ajax, Shamoon, and others, the analysis said.
It is clear that the Operation Cleaver report just led to a retasking of resources, BAE Systems analysts concluded in the report.
A leading theory for the groups disappearance is that Operation Cleaver splintered, and the members dispersed and/or restructured, spent nearly a year retooling and reorganizing, and returned in autumn 2015 as OilRig. However, this remains unconfirmed, the analysis stated. What is more clear is that Iranian operations which targeted aerospace, defence, and energy didn’t entirely disappear but re-emerged around the same time as OilRig and continued with similar tasking.
The analysis of cyber-espionage groups activities following being outed by security researchers, government agencies, and non-government organizations (NGOs) does not come to any particular conclusion, but it does show that — aside from a few early, and only purported, successes — outing cyber-espionage groups does little to disuade them from future actions. With state-sponsored cyber espionage considered a legitimate political activity, the penalties for being caught are small, says Saher Naumaan, threat intelligence analyst at BAE Systems Applied Intelligence.
Conducting [these] operations is the new norm, which diminishes the severity of the consequences because its just what states do now, she says. The groups dont have to disappear anymore because this is understood to be legitimate espionage activity.
While some early groups have gone quiet, most have changed up their infrastructure. A few have retaliated. Predictably, disclosure of attackers tactics also led to other groups adopting those same tactics, although linking disclosure with the adoption of techniques is difficult, BAE Systems stated. 
Disclosure has benefits and drawbacks, the companys researchers stated in the analysis. The thousands of public blogs and reports made on the activity of the hundreds of threat groups who have been reported on has contributed to a shared body of knowledge which has driven evolution of attack techniques.
The most common strategy for cyberattackers, however, is to change tactics. 
The Chinese group APT10, also known as Stone Panda, had used dynamic DNS infrastructure to carry out attacks against managed service providers (MSPs) — operations that were publicly outed in 2017. While the group stopped using some tools and expanded its infrastructure options, it continued operations. 
The group became careful and siloed its campaigns based on tools, targets, and infrastructure, which led to increased difficulty in mapping out its operations, BAE Systems stated. This again shows that threat actors no longer feel obligated to shut down all operations due to disclosure and can adapt to changing circumstances.
Another way that cyber-espionage groups attempt to hide their trails is to adopt the techniques of other nations cyber spies. In October, for example, the UKs National Cyber Security Center revealed that a Russian-backed group, known as Turla, used attack infrastructure that it apparently stole from an Iranian group known as APT34.
The timeline of incidents, and the behaviour of Turla in actively scanning for Iranian backdoors, indicates that whilst (the attack) tools were Iranian in origin, Turla were using these tools and accesses independently to further their own intelligence requirements,
the NCSCs advisory stated
. The behaviour of Turla in scanning for backdoor shells indicates that whilst they had a significant amount of insight into the Iranian tools, they did not have full knowledge of where they were deployed.
Only rarely do attackers decide to strike back at the disclosers in some way, according to BAE Systems report. Charming Kitten,
also known as APT35
, impersonated the security firm ClearSky and one of its researchers after the company outed some details of the groups operations.
In the end, there are still benefits to disclosure, but companies, organizations, and researchers should all consider the consequences, not just to the attacker but to the work of researchers when attackers methods are disclosed, says Naumaan.
Our job is to disrupt adversary activity or make it difficult — disclosure forces attackers to improve, which has a cost, [such as] creating new infrastructure, building new tools, etc., she says. Disclosure, [however,] has moved away from major releases [and] whitepapers to quick turnaround tweets and simultaneously doesnt have as significant an impact on attackers as it used to.
Related Content:
Russian Hackers Using Iranian APTs Infrastructure in Widespread Attacks
Russia Chooses Resiliency Over Efficiency in Cyber Ops
China-Based Threat Actor APT10 Ramps Up Cyber Espionage Activity
On The Trail of An Iranian Hacking Operation
With Operation Cleaver, Iran Emerges As A Cyberthreat
This free, all-day online conference offers a look at the latest tools, strategies, and best practices for protecting your organization’s most sensitive data. Click for 
more information
 and, to register, 
here
.

Last News

▸ 7 arrested, 3 more charged in StubHub cyber fraud ring. ◂
Discovered: 23/12/2024
Category: security

▸ Nigerian scammers now turning into mediocre malware pushers. ◂
Discovered: 23/12/2024
Category: security

▸ Beware EMV may not fully protect against skilled thieves. ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Disclosure Does Little to Dissuade Cyber Spies