NetTraveler APT hackers still active improved their attacks

Pierluigi Paganini September 04, 2013

Experts at Kaspersky firm provided evidences that the hackers behind cyber espionage campaign NetTraveler are still active and improved their attack methods.

Last June Kaspersky firm uncovered a new global cyber espionage campaign dubbed NetTraveler. Kaspersky’s team discovered that NetTraveler targeted over 350 high profile victims from 40 countries.

The name of the operation derives from the malicious code used in the attacks, the surveillance malware NetTraveler, according the security firm behind the cyber espionage campaign there are China-based hackers as written in the report published by Kaspersky, the security experts are convinced that the group of attackers is composed of around 50 individuals, many of them Chinese-speaking but with a good knowledge of the English.

The NetTraveler campaign has been running since 2004 targeting  government institutions, energy companies as well as contractors and embassies. Despite the majority of infections was located in Mongolia, India and Russia also European countries were hit by the hackers, Germany, UK and Spain were mainly affected nations.

Just after the public exposure of the cyber espionage campaign the attackers shut down all known C&C to active new servers in China, Hong Kong and Taiwan.


The hackers behind NetTraveler are still active, a recent post on SecureList blog revealed that last week a new wave of spear-phishing e-mails were sent to multiple Uyghur activists exactly as occurred in the past.

NetTraveler Spear Phishing

The hackers have also differentiated their techniques of attack, adopting also a watering hole attack method, this strategy is very common especially when attackers intend to targets limited communities having common characteristics (e.g. Belonging to the same ethnic group, employees of the same company and so on).

Also for the  watering hole attacks detected, the NetTraveler instances referred at the domain “wetstock[dot]org”, the majority appeared to be hijacked from the Uyghur-related website belonging to the “Islamic Association of Eastern Turkistan”.

The malicious mails contain a link to a page that appear to belong to the World Uyghur Congress website that in reality leads the victims to domain at “wetstock[dot]org” used by hackers to serve NetTraveler malware. The page loads and runs a Java applet named “new.jar” that hide an exploit for CVE-2013-2465 vulnerability recently fixed by Oracle in Java versions 5, 6 and 7 that allows remote attackers to compromise victim.

The jar file contains payload of the exploit in the file “file.tmp”, a NetTraveler backdoor dropper that results compiled on 2103 May 30th, standing to PE header timestamp. The command and control server for NetTraveler variant localized by Kaspersky specialists are hosted at IP belonging to a machine located in the U.S., at “Multacom Corporation” and never used before as C&C for other malware.

The C&C server was operational at the time of publishing the results of the investigation, the server is still collecting the stolen data from victims.

 NetTraveler CeC


The report provided by Kaspersky is the proof that NetTraveler APT is still ongoing, the attackers have improved their techniques combining traditional spear phishing with watering hole attack based on the Java exploit for CVE-2013-2465.

“It obviously has a higher success rate than mailing CVE-2012-0158 exploit-ridden documents, which was the favorite attack vector until now. We estimate that more recent exploits will be integrated and used against the group’s targets.”

The post closes with a precious suggestion for the readers to avoid this new wave attacks.

  • Update Java to the most recent version or, if you don’t use Java, uninstall it.
  • Update Microsoft Windows and Microsoft Office to the latest versions.
  • Update all other third party software, such as Adobe Reader.
  • Use a secure browser such as Google Chrome, which has a faster development and patching cycle than Microsoft’s Internet Explorer.
  • Be wary of clicking on links and opening attachments from unknown persons.

Pierluigi Paganini

(Security Affairs – NetTraveler , Cyberespionage)

you might also like

leave a comment