Nation-State Attackers Steal, Copy Each Others Tools

  /     /     /  
Publicated : 22/11/2024   Category : security


Nation-State Attackers Steal, Copy Each Others Tools


When advanced actors steal and re-use tools and infrastructure from other attack groups, it makes it harder to attribute cybercrime.



New research indicates cybercriminals are making attacker attribution increasingly complex by re-using tools and tactics from other hacker groups.
Researchers on the Kaspersky Lab Global Research and Analysis Team (GReAT) found evidence that sophisticated threat actors are hacking other attack groups to steal victim data, borrow tools and techniques, repurpose exploits, and compromise the same infrastructure.
The result is a major attribution challenge. Reliable threat intelligence is based on identifying patterns and tools associated with a specific threat actor. These signs help security researchers map the targets and behaviors of different attackers. When hackers start hacking one another, using the same tools, and targeting the same victims, the model breaks down.
Kaspersky believes these types of attacks are most likely to be used among nation-state backed groups targeting foreign or less competent actors. IT security researchers should know how to detect and interpret these attacks so they can present their intelligence in context.
The idea behind this research was to better understand the practice of fourth-party collection through signal intelligence (SIGINT), which involves the interception of a foreign intelligence services computer network exploitation (CNE) activity. Researchers observed attackers actions and in doing so, found evidence showing they actively steal from one another.
In less technical terms, fourth-party collection is the practice of spying on a spy spying on someone else, explain GReAT researchers Juan Andrés Guerrero-Saade and Costin Raiu in a post on Kasperskys SecureList
blog
.
There are two main approaches to these attacks: passive and active. Passive involves intercepting other groups data while its in transit between victims and command-and-control (C&C) servers. Its almost impossible to detect. Active collection, however, leaves footprints.
Active attacks involve breaking into another threat actors malicious infrastructure. Its dangerous for attackers because it heightens the risk of detection, but its also beneficial. The success of active collection depends on the target making operational security errors.
During their investigation of specific threat actors, the GReAT team found several pieces of evidence suggesting these active attacks are already happening in the wild. These include:
Backdoors installed in another actors C&C infrastructure
Researchers found two examples of backdoors in hacked networks, which let attackers persistently infiltrate another groups operations. One of these instances was discovered in 2013 during an investigation of the NetTraveler attacks. Researchers obtained a server and, during their analysis, discovered a backdoor seemingly placed by another actor. Its believed the goal was to maintain prolonged access to the NetTraveler infrastructure or the stolen data.
Another was found in 2014 while investigating a hacked website used by Crouching Yeti, also known as Energetic Bear, an APT actor active since 2010. Researchers noticed the panel managing the C&C network was modified with a tag pointing to a remote IP in China, which is believed to be a false flag. They think this was also a backdoor belonging to another group.
Sharing compromised websites
In 2016, Kaspersky found a website hacked by DarkHotel also hosted exploit scripts for another attacker. The second, which was codenamed ScarCruft, primarily targeted Russian, Chinese, and South Korean organizations. The actor relied on watering hole and spearphishing attacks.

Targeting attackers focus areas
By infiltrating a group with stake in a specific region or industry, attackers can benefit from another groups work and specifically target certain groups of people. Its risky for attackers to share victims in the case one group gets caught; if they do, analysis will reveal who the other threat actors were.
In November 2014, Kaspersky researchers located a server in a Middle East research institution hosted implants for advanced actors Regin, Equation Group, Turla, ItaDuke, Animal Farm, and Careto. The discovery of this server marked the beginning of the eventual discovery of the Equation Group.
Related Content:
Yahoo, Equifax Serve as Cautionary Tales in Discerning Data Breach Scope
Ransomware Will Target Backups: 4 Ways to Protect Your Data
70% of US Employees Lack Security and Privacy Awareness
5 IT Practices That Put Enterprises at Risk
Join Dark Reading LIVE for two days of practical cyber defense discussions. Learn from the industry’s most knowledgeable IT security experts. Check out the INsecurity
agenda here
.

Last News

▸ Website hacks happened during World Cup final. ◂
Discovered: 23/12/2024
Category: security

▸ Criminal Possession of Government-Grade Stealth Malware ◂
Discovered: 23/12/2024
Category: security

▸ Senate wants changes to cybercrime law. ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Nation-State Attackers Steal, Copy Each Others Tools