Equation Group Cyberspying Activity May Date Back To The 90s

  /     /     /  
Publicated : 22/11/2024   Category : security


Equation Group Cyberspying Activity May Date Back To The 90s


New Kaspersky Lab findings show how the master APT nation-state group likely the longest-running cyber espionage gang of all, and newly discovered code artifacts include English-language clues.



The unprecedented cyber espionage operation conducted by the so-called Equation Group launched attacks mainly from a complex software platform that looks a lot like a mini operating system with carefully constructed components and plug-ins, researchers say.
Kaspersky Lab--which
last month disclosed its findings on the highly advanced and well-funded nation-state
 actor--today published new details of the so-called EquationDrug software platform used by the group over the past 10 years. The research indicates that the Equation Group could have been active as far back as the 1990s, making it the longest-running cyber espionage group of all, according to Kaspersky Lab.
Igor Soumenkov, principal security researcher at Kaspersky Lab, says information on the timing of when the Equation Group registered command-and-control servers predate EquationDrug, and thus point to activity in the 90s. There were also previous platforms like EquationLaser, which we didnt write much about. EquationLaser was before EquationDrug, its replacement, he says.
Researchers at Kaspersky Lab said last month that the Equation Group, which has ties to Stuxnet but predates it, were likely the masters over the Stuxnet attacks and provided exploits to the attackers who unleashed malware to sabotage centrifuges used for uranium enrichment at Irans Natanz facility. While signs appear to point to the National Security Agency, Kaspersky Lab has stopped short of naming the nation-state behind the operation, but has noted a possible US connection with newly found English-language use in the code, as well as apparent East Coast business hours.
The so-called GrayFish platform, which includes plug-ins like the especially sophisticated one that reprograms hard drives, ultimately replaced EquationDrug, although EquationDrug is not yet obsolete. But Kaspersky Lab researchers still have been unable to detect any new activity from the Equation Group since 2014, likely because theyve adopted an even stealthier tack, a super-scary prospect, according to Costin Raiu, head of Kasperskys global research and analysis team. Raiu last month told Dark Reading that the attackers had registered new servers in 2014 and were still active, but no signs of new malware had been detected.
And no word on what the group is using in lieu of GrayFish: We dont have any details on what software this group is using right now, Soumenkov says. They must have implemented some better techniques to evade detection and discovery.
The Equation Group has always reused some code; Grayfish, for example, was basically an upgrade to EquationDrug, with encryption and a bootkit, as well as well-hidden plug-ins, he says.
Speaking of plug-ins, Kaspersky Lab today said it has found some 30 plug-ins for EquationDrug thus far, but there could be some 90 additional ones as well. All of the plugins are compatible, too, according to Soumenkov.
The plug-ins include network traffic interception, reverse DNS resolution, computer management (including start/stop processes, load drivers and libraries), file and directory management, targeted computer system information-gathering (including OS version, user name, keyboard layout, process list, and other information), network resource browsing, WMI information-gathering, cached password collection, processes enumeration, monitoring live user activity in browsers, NTFS file system access, removable storage drive monitoring, passive network backdoor, HDD and SDD firmware manipulation, keylogging, collection of browser history, as well as cached passwords and auto-fill data.
[The nation-state Equation Group compromise of most popular hard drives wont be a widespread threat, but future disk security -- and forensic integrity -- remain unclear. Read
What You Need To Know About Nation-State Hacked Hard Drives
.]
The architecture of the whole framework resembles a mini-operating system with kernel-mode and user-mode components carefully interacting with each other via a custom message-passing interface. The platform includes a set of drivers, a platform core (orchestrator) and a number of plugins, Kaspersky Lab researchers wrote in a post today. Every plugin has a unique ID and version number that defines a set of functions it can provide. Some of the plugins depend on others and might not work unless dependencies are resolved.
Kasperskys study of EquationDrug illustrates how nation-states like the Equation Group constantly up the ante in their code, the researchers say in their
new report
.
Meanwhile, the researchers found references such as Stealthfighter and other English-speaking language in the code. Some other names, such as kernel object and file names, abbreviations, resource code page, and several generic messages, point to English-speaking developers. Due to the limited number of such text strings, its hard to tell reliably if the developers were native English speakers, according to the report.

Last News

▸ 7 arrested, 3 more charged in StubHub cyber fraud ring. ◂
Discovered: 23/12/2024
Category: security

▸ Nigerian scammers now turning into mediocre malware pushers. ◂
Discovered: 23/12/2024
Category: security

▸ Beware EMV may not fully protect against skilled thieves. ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Equation Group Cyberspying Activity May Date Back To The 90s