Description
I need to write 3 to 4 pages for Part 1 and part 2 of this project.7/12/2017
Cyber Espionage is Alive and Well: APT32 and the Threat to Global Corporations « Threat Research Blog | FireEye Inc
Cyber Espionage is Alive and Well: APT32 and the Threat to
Global Corporations
May 14, 2017 | by Nick Carr | Threat Research
Cyber espionage actors, now designated by FireEye as APT32 (OceanLotus Group), are carrying out intrusions into private sector companies
across multiple industries and have also targeted foreign governments, dissidents, and journalists. FireEye assesses that APT32 leverages a
unique suite of fullyfeatured malware, in conjunction with commerciallyavailable tools, to conduct targeted operations that are aligned with
Vietnamese state interests.
APT32 and FireEye’s Community Response
In the course of investigations into intrusions at several corporations with business interests in Vietnam, FireEye’s Mandiant incident response
consultants uncovered activity and attackercontrolled infrastructure indicative of a significant intrusion campaign. In March 2017, in response
to active targeting of FireEye clients, the team launched a Community Protection Event (CPE) – a coordinated effort between Mandiant
incident responders, FireEye as a Service (FaaS), FireEye iSight Intelligence, and FireEye product engineering – to protect all clients from
APT32 activity.
In the following weeks, FireEye released threat intelligence products and updated malware profiles to customers while developing new
detection techniques for APT32’s tools and phishing lures. This focused intelligence and detection effort led to new external victim
identifications as well as providing sufficient technical evidence to link twelve prior intrusions, consolidating four previously unrelated clusters
of threat actor activity into FireEye’s newest named advanced persistent threat group: APT32.
APT32 Targeting of Private Sector Company Operations in Southeast Asia
Since at least 2014, FireEye has observed APT32 targeting foreign corporations with a vested interest in Vietnam’s manufacturing, consumer
products, and hospitality sectors. Furthermore, there are indications that APT32 actors are targeting peripheral network security and
technology infrastructure corporations.
Here is an overview of intrusions investigated by FireEye that are attributed to APT32:
In 2014, a European corporation was compromised prior to constructing a manufacturing facility in Vietnam.
In 2016, Vietnamese and foreignowned corporations working in network security, technology infrastructure, banking, and media industries
were targeted.
In mid2016, malware that FireEye believes to be unique to APT32 was detected on the networks of a global hospitality industry developer
with plans to expand operations into Vietnam.
From 2016 through 2017, two subsidiaries of U.S. and Philippine consumer products corporations, located inside Vietnam, were the target
of APT32 intrusion operations.
Table 1 shows a breakdown of APT32 activity, including the malware families used in each.
Year
Country
Industry
Malware
2014
Vietnam
Network Security
WINDSHIELD
2014
Germany
Manufacturing
WINDSHIELD
2015
Vietnam
Media
WINDSHIELD
2016
Philippines
Consumer
products
KOMPROGO
WINDSHIELD
https://www.fireeye.com/blog/threat-research/2017/05/cyber-espionage-apt32.html
1/10
7/12/2017
Cyber Espionage is Alive and Well: APT32 and the Threat to Global Corporations « Threat Research Blog | FireEye Inc
SOUNDBITE
BEACON
2016
Vietnam
Banking
WINDSHIELD
2016
Philippines
Technology
Infrastructure
WINDSHIELD
2016
China
Hospitality
WINDSHIELD
2016
Vietnam
Media
WINDSHIELD
2016
United
States
Consumer
Products
WINDSHIELD
PHOREAL
BEACON
SOUNDBITE
Table 1: APT32 Private Sector Targeting Identified by FireEye
APT32 Interest in Political Influence and Foreign Governments
In addition to focused targeting of the private sector with ties to Vietnam, APT32 has also targeted foreign governments, as well as
Vietnamese dissidents and journalists since at least 2013. Here is an overview of this activity:
A public blog published by the Electronic Frontier Foundation indicated that journalists, activists, dissidents, and bloggers were targeted in
2013 by malware and tactics consistent with APT32 operations.
In 2014, APT32 leveraged a spearphishing attachment titled “Plans to crackdown on protesters at the Embassy of Vietnam.exe,” which
targeted dissident activity among the Vietnamese diaspora in Southeast Asia. Also in 2014, APT32 carried out an intrusion against a
Western country’s national legislature.
In 2015, SkyEye Labs, the security research division of the Chinese firm Qihoo 360, released a report detailing threat actors that were
targeting Chinese public and private entities including government agencies, research institutes, maritime agencies, sea construction, and
shipping enterprises. The information included in the report indicated that the perpetrators used the same malware, overlapping
infrastructure, and similar targets as APT32.
In 2015 and 2016, two Vietnamese media outlets were targeted with malware that FireEye assesses to be unique to APT32.
In 2017, social engineering content in lures used by the actor provided evidence that they were likely used to target members of the
Vietnam diaspora in Australia as well as government employees in the Philippines.
APT32 Tactics
In their current campaign, APT32 has leveraged ActiveMime files that employ social engineering methods to entice the victim into enabling
macros. Upon execution, the initialized file downloads multiple malicious payloads from remote servers. APT32 actors continue to deliver the
malicious attachments via spearphishing emails.
APT32 actors designed multilingual lure documents which were tailored to specific victims. Although the files had “.doc” file extensions, the
recovered phishing lures were ActiveMime “.mht” web page archives that contained text and images. These files were likely created by
exporting Word documents into single file web pages.
Table 2 contains a sample of recovered APT32 multilingual lure files.
ActiveMime Lure Files
年员工工资性津贴额统计报
2017
.doc
(2017 Statistical Report on
Staff Salary and Allowances)
告
MD5
5458a2e4d784abb1a1127263bd5006b5
https://www.fireeye.com/blog/threat-research/2017/05/cyber-espionage-apt32.html
2/10
7/12/2017
Cyber Espionage is Alive and Well: APT32 and the Threat to Global Corporations « Threat Research Blog | FireEye Inc
Thong tin.doc
ce50e544430e7265a45fab5a1f31e529
(Information)
Phan Vu Tutn CV.doc
4f761095ca51bfbbf4496a4964e41d4f
Ke hoach cuu tro nam 2017.doc
e9abe54162ba4572c770ab043f576784
(2017 Bailout Plan)
Instructions to GSIS.doc
fba089444c769700e47c6b44c362f96b
Hoi thao truyen thong doc lap.doc
(Traditional Games)
f6ee4b72d6d42d0c7be9172be2b817c1
Giấy yêu cầu bồi thường mới 2016
hằng.doc
(New 2016 Claim Form)
aa1f85de3e4d33f31b4f78968b29f175
Hoa don chi tiet tien no.doc
(Debt Details)
5180a8d9325a417f2d8066f9226a5154
Thu moi tham du Hoi luan.doc
(Collection of Participants)
f6ee4b72d6d42d0c7be9172be2b817c1
Danh sach nhan vien vi pham ky
luat.doc
(List of Employee Violations)
6baafffa7bf960dec821b627f9653e44
Nộidungquảngcáo.doc
(Internal Content Advertising)
471a2e7341f2614b715dc89e803ffcac
HĐ DVPMVTC 31.03.17.doc
f1af6bb36cdf3cff768faee7919f0733
Table 2: Sampling of APT32 Lure Files
The Base64 encoded ActiveMime data also contained an OLE file with malicious macros. When opened, many lure files displayed fake error
messages in an attempt to trick users into launching the malicious macros. Figure 1 shows a fake Gmailtheme paired with a hexadecimal
error code that encourages the recipient to enable content to resolve the error. Figure 2 displays another APT32 lure that used a convincing
image of a fake Windows error message instructing the recipient to enable content to properly display document font characters.
Figure 1: Example APT32 Phishing Lure – Fake Gmail Error Message
https://www.fireeye.com/blog/threat-research/2017/05/cyber-espionage-apt32.html
3/10
7/12/2017
Cyber Espionage is Alive and Well: APT32 and the Threat to Global Corporations « Threat Research Blog | FireEye Inc
Figure 2: Example APT32 Phishing Lure – Fake Text Encoding Error Message
APT32 operators implemented several novel techniques to track the efficacy of their phishing, monitor the distribution of their malicious
documents, and establish persistence mechanisms to dynamically update backdoors injected into memory.
In order to track who opened the phishing emails, viewed the links, and downloaded the attachments in realtime, APT32 used cloudbased
email analytics software designed for sales organizations. In some instances, APT32 abandoned direct email attachments altogether and
relied exclusively on this tracking technique with links to their ActiveMime lures hosted externally on legitimate cloud storage services.
To enhance visibility into the further distribution of their phishing lures, APT32 utilized the native web page functionality of their ActiveMime
documents to link to external images hosted on APT32 monitored infrastructure.
Figure 3 contains an example phishing lure with HTML image tags used for additional tracking by APT32.
Figure 3: Phishing Lure Containing HTML Image Tags for Additional Tracking
When a document with this feature is opened, Microsoft Word will attempt to download the external image, even if macros were disabled. In all
phishing lures analyzed, the external images did not exist. Mandiant consultants suspect that APT32 was monitoring web logs to track the
public IP address used to request remote images. When combined with email tracking software, APT32 was able to closely track phishing
delivery, success rate, and conduct further analysis about victim organizations while monitoring the interest of security firms.
https://www.fireeye.com/blog/threat-research/2017/05/cyber-espionage-apt32.html
4/10
7/12/2017
Cyber Espionage is Alive and Well: APT32 and the Threat to Global Corporations « Threat Research Blog | FireEye Inc
Once macros were enabled on the target system, the malicious macros created two named scheduled tasks as persistence mechanisms for
two backdoors on the infected system. The first named scheduled task launched an application whitelisting script protection bypass to execute
a COM scriptlet that dynamically downloaded the first backdoor from APT32’s infrastructure and injected it into memory. The second named
scheduled task, loaded as an XML file to falsify task attributes, ran a JavaScript code block that downloaded and launched a secondary
backdoor, delivered as a multistage PowerShell script. In most lures, one scheduled task persisted an APT32specific backdoor and the other
scheduled task initialized a commerciallyavailable backdoor as backup.
To illustrate the complexity of these lures, Figure 4 shows the creation of persistence mechanisms for recovered APT32 lure “2017
.doc”.
性津贴额统计报告
年员工工资
Figure 4: APT32 ActiveMime Lures Create Two Named Scheduled Tasks
In this example, a scheduled task named “Windows Scheduled Maintenance” was created to run Casey Smith’s “Squiblydoo” App Whitelisting
bypass every 30 minutes. While all payloads can be dynamically updated, at the time of delivery, this task launched a COM scriptlet (“.sct” file
extension) that downloaded and executed Meterpreter hosted on images.chinabytes[.]info. Meterpreter then loaded Cobalt Strike BEACON,
configured to communicate with 80.255.3[.]87 using the Safebrowsing malleable C2 profile to further blend in with network traffic. A second
scheduled task named “Scheduled Defrags” was created by loading the raw task XML with a backdated task creation timestamp of June 2,
2016. This second task ran “mshta.exe” every 50 minutes which launched an APT32specific backdoor delivered as shellcode in a PowerShell
script, configured to communicate with the domains blog.panggin[.]org, share.codehao[.]net, and yii.yiihao126[.]net.
Figure 5 illustrates the chain of events for a single successful APT32 phishing lure that dynamically injects two multistage malware
frameworks into memory.
https://www.fireeye.com/blog/threat-research/2017/05/cyber-espionage-apt32.html
5/10
7/12/2017
Cyber Espionage is Alive and Well: APT32 and the Threat to Global Corporations « Threat Research Blog | FireEye Inc
Figure 5: APT32 Phishing Chain of Events
The impressive APT32 operations did not stop after they established a foothold in victim environments. Several Mandiant investigations
revealed that, after gaining access, APT32 regularly cleared select event log entries and heavily obfuscated their PowerShellbased tools and
shellcode loaders with Daniel Bohannon’s InvokeObfuscation framework.
APT32 regularly used stealthy techniques to blend in with legitimate user activity:
During one investigation, APT32 was observed using a privilege escalation exploit (CVE20167255) masquerading as a Windows hotfix.
In another investigation, APT32 compromised the McAfee ePO infrastructure to distribute their malware as a software deployment task in
which all systems pulled the payload from the ePO server using the proprietary SPIPE protocol.
APT32 also used hidden or nonprinting characters to help visually camouflage their malware on a system. For example, APT32 installed
one backdoor as a persistent service with a legitimate service name that had a Unicode nobreak space character appended to it. Another
backdoor used an otherwise legitimate DLL filename padded with a nonprinting OS command control code.
APT32 Malware and Infrastructure
APT32 appears to have a wellresourced development capability and uses a custom suite of backdoors spanning multiple protocols. APT32
operations are characterized through deployment of signature malware payloads including WINDSHIELD, KOMPROGO, SOUNDBITE, and
PHOREAL. APT32 often deploys these backdoors along with the commerciallyavailable Cobalt Strike BEACON backdoor. APT32 may also
possess backdoor development capabilities for macOS.
The capabilities for this unique suite of malware is shown in Table 3.
Malware
WINDSHIELD
Capabilities
Command and control (C2) communications via
TCP raw sockets
https://www.fireeye.com/blog/threat-research/2017/05/cyber-espionage-apt32.html
6/10
7/12/2017
Cyber Espionage is Alive and Well: APT32 and the Threat to Global Corporations « Threat Research Blog | FireEye Inc
Four configured C2s and six configured ports –
randomlychosen C2/port for communications
Registry manipulation
Get the current module’s file name
Gather system information including registry
values, user name, computer name, and current
code page
File system interaction including directory
creation, file deletion, reading, and writing files
Load additional modules and execute code
Terminate processes
Antidisassembly
Fullyfeatured backdoor capable of process, file,
and registry management
Creating a reverse shell
KOMPROGO
File transfers
Running WMI queries
Retrieving information about the infected
system
C2 communications via DNS
Process creation
File upload
SOUNDBITE
Shell command execution
File and directory enumeration/manipulation
Window enumeration
Registry manipulation
System information gathering
C2 communications via ICMP
Reverse shell creation
PHOREAL
Filesystem manipulation
Registry manipulation
Process creation
File upload
Publicly available payload that can inject and
execute arbitrary code into processes
Impersonating the security context of users
Importing Kerberos tickets
Uploading and downloading files
BEACON (Cobalt
Strike)
Executing shell commands
Configured with malleable C2 profiles to blend
in with normal network traffic
Codeployment and interoperability with
Metasploit framework
SMB Named Pipe inmemory backdoor payload
that enables peertopeer C2 and pivoting over
SMB
Table 3: APT32 Malware and Capabilities
APT32 operators appear to be wellresourced and supported as they use a large set of domains and IP addresses as command and control
infrastructure. The FireEye iSIGHT Intelligence MySIGHT Portal contains additional information on these backdoor families based on
https://www.fireeye.com/blog/threat-research/2017/05/cyber-espionage-apt32.html
7/10
7/12/2017
Cyber Espionage is Alive and Well: APT32 and the Threat to Global Corporations « Threat Research Blog | FireEye Inc
Mandiant investigations of APT32 intrusions.
Figure 6 provides a summary of APT32 tools and techniques mapped to each stage of the attack lifecycle.
Figure 6: APT32 Attack Lifecycle
Outlook and Implications
Based on incident response investigations, product detections, and intelligence observations along with additional publications on the same
operators, FireEye assesses that APT32 is a cyber espionage group aligned with Vietnamese government interests. The targeting of private
sector interests by APT32 is notable and FireEye believes the actor poses significant risk to companies doing business in, or preparing to
invest in, the country. While the motivation for each APT32 private sector compromise varied – and in some cases was unknown – the
unauthorized access could serve as a platform for law enforcement, intellectual property theft, or anticorruption measures that could ultimately
erode the competitive advantage of targeted organizations. Furthermore, APT32 continues to threaten political activism and free speech in
Southeast Asia and the public sector worldwide. Governments, journalists, and members of the Vietnam diaspora may continue to be
targeted.
While actors from China, Iran, Russia, and North Korea remain the most active cyber espionage threats tracked and responded to by FireEye,
APT32 reflects a growing host of new countries that have adopted this dynamic capability. APT32 demonstrates how accessible and impactful
offensive capabilities can be with the proper investment and the flexibility to embrace newlyavailable tools and techniques. As more countries
utilize inexpensive and efficient cyber operations, there is a need for public awareness of these threats and renewed dialogue around
emerging nationstate intrusions that go beyond public sector and intelligence targets.
APT32 Detection
Figure 7 contains a Yara rule can be used to identify malicious macros associated with APT32’s phishing lures:
https://www.fireeye.com/blog/threat-research/2017/05/cyber-espionage-apt32.html
8/10
7/12/2017
Cyber Espionage is Alive and Well: APT32 and the Threat to Global Corporations « Threat Research Blog | FireEye Inc
Figure 7: Yara Rule for APT32 Malicious Macros
Table 4 contains a sampling of the infrastructure that FireEye has associated with APT32 C2.
C2 Infrastructure
103.53.197.202
104.237.218.70
104.237.218.72
185.157.79.3
193.169.245.78
193.169.245.137
23.227.196.210
24.datatimes.org
80.255.3.87
blog.docksugs.org
blog.panggin.org
contay.deaftone.com
check.paidprefund.org
datatimes.org
docksugs.org
economy.bloghop.org
emp.gapte.name
facebookcdn.net
gapfacebook.com
glappspot.org
help.checkonl.org
high.expbas.net
high.vphelp.net
icon.torrentart.com
images.chinabytes.info
imaps.qki6.com
img.fanspeed.net
job.supperpow.com
lighpress.info
menmin.strezf.com
mobile.pagmobiles.info
news.lighpress.info
notificeva.com
nsquery.net
pagmobiles.info
paidprefund.org
https://www.fireeye.com/blog/threat-research/2017/05/cyber-espionage-apt32.html
9/10
7/12/2017
Cyber Espionage is Alive and Well: APT32 and the Threat to Global Corporations « Threat Research Blog | FireEye Inc
push.relasign.org
relasign.org
share.codehao.net
seri.volveri.net
ssl.zin0.com
static.jg7.org
syn.timeizu.net
teriava.com
timeizu.net
tonholding.com
tulationeva.com
untitled.po9z.com
updateflashs.com
vieweva.com
volveri.net
vphelp.net
yii.yiihao126.net
zone.apize.net
Table 4: Sampling of APT32 C2 Infrastructure
This entry was posted on Sun May 14 18:00:00 EDT 2017 and filed under APT, Attack, Blog, Homepage Carousel, Latest Blog Posts,
Malware, Nick Carr and Threat Research.
Video
See How to Stop the WannaCry Ransomware
Watch the video
Sign up for email updates
Get information and insight on today’s advanced threats from the leader in advanced threat prevention.
First Name
Last Name
Email Address
Executive Perspective Blog
Threat Research Blog
Products and Services Blog
Subscribe
https://www.fireeye.com/blog/threat-research/2017/05/cyber-espionage-apt32.html
10/10
The Cybersecurity Threat Landscape
Group Assignment
Part 1: Threat Landscape Analysis
o
Provide a detailed analysis of the threat landscape.
o
What has changed over the past year?
o
Describe common tactics, techniques, and procedures to include threat actor types.
o
What are the exploit vectors and vulnerabilities threat actors are predicted to take advantage
of?
Part 2: APT Analysis
o
Provide a detailed analysis and description of the APT your group was assigned. Describe the
specific tactics used to gain access to the target(s).
o
Describe the tools used. Describe what the objective of the APT was/is. Was it successful?
References
Purchase answer to see full
attachment
We offer the bestcustom writing paper services. We have done this question before, we can also do it for you.
Why Choose Us
- 100% non-plagiarized Papers
- 24/7 /365 Service Available
- Affordable Prices
- Any Paper, Urgency, and Subject
- Will complete your papers in 6 hours
- On-time Delivery
- Money-back and Privacy guarantees
- Unlimited Amendments upon request
- Satisfaction guarantee
How it Works
- Click on the “Place Order” tab at the top menu or “Order Now” icon at the bottom and a new page will appear with an order form to be filled.
- Fill in your paper’s requirements in the "PAPER DETAILS" section.
- Fill in your paper’s academic level, deadline, and the required number of pages from the drop-down menus.
- Click “CREATE ACCOUNT & SIGN IN” to enter your registration details and get an account with us for record-keeping and then, click on “PROCEED TO CHECKOUT” at the bottom of the page.
- From there, the payment sections will show, follow the guided payment process and your order will be available for our writing team to work on it.