news on May 30, 2017, 12:57:05 PM
Pawn Storm: The Power of Social Engineering By: Ed CabreraIn our latest report on Pawn Storm (a.k.a. APT28, Fancy Bear, Strontium, etc.), researchers expose the scope and scale of the cyber espionage group’s attacks but more importantly their cyber tradecraft. Our researchers have observed activity going back 17 years targeting government, military, media, and political organizations around the world. In this report our researchers document the group’s shift to focus on cyber propaganda over the past 2 years and their 400 percent increase in targeting activity in 2016 alone.
The history of Pawn Storm
Our researchers have traced Pawn Storm as far back as 2004, however our first report (and the first research published on them) was in 2014. Since then it has become well established that the group targets any global organization perceived at odds with Russian geopolitical interests. The group has managed to compromise their targets across the globe with intelligent and calculated credentialed phishing campaigns.
While the attacks around U.S. election made substantial headlines, many other organizations were successfully targeted through the last 3 years:
• June 2014 – compromised Polish government websites
• September 2014 – targeted a large US nuclear fuel dealer by setting up fake Outlook Web Access login pages for its employees. Also launched fake OWA login page attacks against military and defense institutions in the US and Europe
• December 2014 – attacked the corporate accounts of 55 employees of a large US newspaper, using the compromised account of a US military correspondent they’d attacked earlier in the same month
• January 2015 – targeted three popular YouTube bloggers with a Gmail phishing attack. The attack happened four days after the bloggers interviewed US President Barack Obama at the White House
• February 2015 – discovered to be using malicious iOS apps for espionage. Also attacked NATO liaison in Ukraine with fake OWA page
• April 2015 – launched attacks against NATO members. Also attacked the French TV station TV5Monde by causing several global channels to go off-air
• July 2015 – discovered by Trend Micro to be using a new Java zero-day exploit
• July 2015 – redirected one of their C&C servers to a Trend Micro IP
• August 2015 –domestic spying campaign revealed, targeted Russian dissidents, media, artists, military, including the spouses of senior US officials
• September 2015 – set up fake server that mimicked the SFTP (Secure File Transfer Protocol) server of the Dutch Safety Board and created a fake Outlook Web Access (OWA) server to target a Dutch Safety Board partner in the MH17 investigation
• October 2015 – discovered by Trend Micro to be using Adobe Flash zero-day exploit code and targeted several ministries of foreign affairs via spear phishing emails
In 2016, the Pawn Storm group continued its cyber-espionage work however with two stark departures in tactics. They continued to harvest credentials of high value targets at a faster pace and determination but they pivoted to cyber propaganda. Based on the phishing domains created, Political parties and media outlets dominated their focus.
Date Organization Phishing Domain
MILITARY
03/04/16 Bulgarian Army mail.armf.bg.message-id8665213.tk
MINISTRY OF DEFENSE (MOD)
02/19/16 MOD Poland poczta.mon-gov.pl
MEDIA
02/24/16 Hurriyet posta-hurriyet.com
03/14/16 Anadolu Agency anadolu-ajansi.com
03/15/16 Anadolu Agency mail.anadoluajansi.web.tr
05/11/16 Hurriyet webmail-hurriyet.com
06/12/16 Hurriyet mail-hurriyet.com
11/14/16 Al Jazeera account-aljazeera.net
11/14/16 Al Jazeera ssset-aljazeera.net
11/15/16 Al Jazeera sset-aljazeera.net
11/16/16 Al Jazeera sset-aljazeera.com
11/21/16 Al Jazeera mail-aljazeera.net
POLITICAL PARTIES
01/21/16 Prime Minister Turkey e-post.byegm.web.tr
01/12/16 Prime Minister Turkey mail.byegm.web.tr
02/01/16 Prime Minister Turkey eposta.basbakanlik.qov.web.tr
02/01/16 Parliament Turkey e-posta.tbmm.qov.web.tr
03/01/16 Democratic Party US myaccount.google.com-securitysettingpage.gq
04/01/16 Democratic Party US myaccount.google.com-changepasswordmyaccount-idx8jxcn4ufdmncudd.gq
04/22/16 CDU webmail-cdu.de
05/06/16 CDU support-cdu.de
06/06/16 Democratic Party US actblues.com
10/20/16 Parliament Montenegro mail-skupstina.me
ACADEMICS
03/04/16 Tartu University mail.university-tartu.info
09/13/16 Baikal State University mail-isea.ru
INTERNATIONAL ORGANIZATIONS
08/03/16 World Anti-Doping Agency (WADA) mail.wada-awa.org
08/08/16 World Anti-Doping Agency (WADA) inside.wada-arna.org
08/08/16 Tribunal Arbitral du Sport (TAS) tas-cass.org
Pawn Storm attacks in 2016
The power of phishing
In the first stage of their attacks they rely on credential phishing campaigns anchored by geopolitical events as lures to set the hook on their targets. They successfully tailor emails with proper spelling and grammar to evade spam filters to gain a foothold on targeted systems.
Corporate webmail accounts are targeted as a weak link in a business information supply chain. These accounts can provide confidential data that might prove useful in an attempt to influence public opinion. For example, Pawn Storm stole data from webmail accounts of the World Anti-Doping Agency (WADA) in 2016, leaking it under the pseudonym “Fancy Bear,” to influence public opinion surrounding Russian athletes who were blocked from the summer Olympics. Additionally, webmail accounts may be used as a stepping stone to further infiltrate the target organization.
Long-running campaigns are also maintained against high profile users of free international webmail providers, such as Yahoo! and Gmail. In these attacks, Pawn Storm actors persistently send spear phishing emails to targets – oftentimes multiple a week – trying different approaches until they’re successful. Our researchers have collected thousands of these emails since early 2015.
Credentials lead to espionage
After a target succumbs to the socially engineered phishing lure by clicking a malicious link or opening an infected attachment, the threat actor uses relatively simple first stage malware to map and harvest sensitive data and system information. The Pawn Storm group then silently gathers data on their target’s system for up to a year or more. After learning more about their victim and if they determine that they have compromised a high value target, they may release a second stage of malware to bore deeper. These high value targets are usually a smaller subset of their targeted groups.
Pawn Storm has been known to use this data in two ways:
• To further penetrate deeper into targeted networks, even “island hop” sending emails using stolen identities
• Release sensitive emails publically to embarrass or defame victim organizations to influence public opinion
What’s next for Pawn Storm?
The group is expected to maintain an increased level of activity in 2017. In fact, our researchers have found and continue to find phishing domains created in March and April connected to political campaigns in France and Germany. Konrad Adenauer Stiftung, a political organization in Germany, and Emmanuel Macron’s campaign in France have both been targeted this year.
The Pawn Storm group appears to be emboldened by media attention. Following the extensive headlines made in 2016 related to their impact on the U.S. election, we expect these attacks to continue. This also directly ties to our 2017 predictions report, which states that cyberpropaganda will become a norm. The report even references the elections in France and Germany where we now see Pawn Storm meddling.
Political organizations like all other organizations should always operate under the assumption that they have been breached. From the boardroom to the server room, all must work together to protect confidential information. Whether it’s Pawn Storm, hacktivists, cybercriminal groups or an insider threat, intellectual property and confidential data in the wrong hands always ends poorly for any organization.
For more information on Pawn Storm, visit Trend Micro’s complete research hub, where you can find three years of research and data on the group and their affairs.
« Last Edit: May 30, 2017, 12:58:42 PM by news »
Logged