• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
MUST READ

Russia-linked APT28 use Signal chats to target Ukraine official with malware

 | 

China-linked APT Salt Typhoon targets Canadian Telecom companies

 | 

U.S. warns of incoming cyber threats following Iran airstrikes

 | 

McLaren Health Care data breach impacted over 743,000 people

 | 

American steel giant Nucor confirms data breach in May attack

 | 

The financial impact of Marks & Spencer and Co-op cyberattacks could reach £440M

 | 

Iran-Linked Threat Actors Cyber Fattah Leak Visitors and Athletes' Data from Saudi Games

 | 

SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 50

 | 

Security Affairs newsletter Round 529 by Pierluigi Paganini – INTERNATIONAL EDITION

 | 

Iran confirmed it shut down internet to protect the country against cyberattacks

 | 

Godfather Android trojan uses virtualization to hijack banking and crypto apps

 | 

Cloudflare blocked record-breaking 7.3 Tbps DDoS attack against a hosting provider

 | 

Linux flaws chain allows Root access across major distributions

 | 

A ransomware attack pushed the German napkin firm Fasana into insolvency

 | 

Researchers discovered the largest data breach ever, exposing 16 billion login credentials

 | 

China-linked group Salt Typhoon breached satellite firm Viasat

 | 

Iran experienced a near-total national internet blackout

 | 

Malicious Minecraft mods distributed by the Stargazers DaaS target Minecraft gamers

 | 

Healthcare services company Episource data breach impacts 5.4 Million people

 | 

Watch out, Veeam fixed a new critical bug in Backup & Replication product

 | 
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
  • Home
  • Hacking
  • Security
  • FireEye revealed APT Operation DeputyDog against Japanes entities

FireEye revealed APT Operation DeputyDog against Japanes entities

Pierluigi Paganini September 24, 2013

Security experts at FireEye discovered the Operation DeputyDog against Japanese entities that exploits Zero-Day (CVE-2013-3893) recently announced by Microsoft.

FireEye announced the discovery of the cyberespionage Operation DeputyDog leveraging the recently announced zero-day CVE-2013-3893. FireEye and Kaspersky are the companies most active in the analysis of large espionage campaign that governments and hackers are conducting against strategic targets. 
According the analysis based on FireEye Dynamic Threat Intelligence cluster the Operation DeputyDog began as early as August 19, 2013 targeting Japanese organizations. Security experts found that attackers have used the same command and control infrastructure of the attack on Bit9 firm.
Operation DeputyDog

Bit9 experts discovered that hackers penetrated their network infecting machine with two variants of the HiKit rootkit.

“One of these Hitkit samples connected to a command and control server at downloadmp3server[.]servemp3[.]com that resolved to 66.153.86.14. This same IP address also hosted www[.]yahooeast[.]net, a known malicious domain, between March 6, 2012 and April 22, 2012. The domain yahooeast[.]net was registered to 654@123.com. This email address was also used to register blankchair[.]com – the domain that we see was pointed to the 180.150.228.102 IP, which is the callback associated with sample 58dc05118ef8b11dcb5f5c596ab772fd, and has been already correlated back to the attack leveraging the CVE-2013-3893 zero-day vulnerability.”

Just a couple of days ago, on September 17, 2013 Microsoft announced a new zero-day vulnerability in Internet Explorer products that was being exploited in targeted attacks.

FireEye investigated on the attacks revealing that they targeted organizations in Japan, according evidences collected behind the Operation DeputyDog there is the same threat actor that compromised Bit9 in February 2013, when during the hack were stolen digital certificates used later in further attacks to sign malware. The payload used in these attacks on August 23th 2013 against entities in Japan was hosted on a server in Hong Kong with IP address equal to 210.176.3.130. Despite the payload is named img20130823.jpg in reality it is  an executable, once run it writes a dll named “28542CC0.dll” in the following path:

C:\Documents and Settings\All Users\Application Data\28542CC0.dll

To be able to execute the malware on every machine restarts the malicious agent also adds this registry key:

HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\28542CC0 rundll32.exe “C:\Documents and Settings\All Users\Application Data\28542CC0.dll”,Launch

The malware connects to a host in South Korea (180.150.228.102), it is curious that callback traffic is not encrypted HTTP over port 443.  The FireEye security experts identified the signature for the attacks that allowed the detection of at least 5 samples that were compiled on 2013-08-19, within 1 second of each other.

MD5 Compile Time (UTC) C2 Server
58dc05118ef8b11dcb5f5c596ab772fd 2013-08-19 13:21:58 180.150.228.102
4d257e569539973ab0bbafee8fb87582 2013-08-19 13:21:58 103.17.117.90
dbdb1032d7bb4757d6011fb1d077856c 2013-08-19 13:21:59 110.45.158.5
645e29b7c6319295ae8b13ce8575dc1d 2013-08-19 13:21:59 103.17.117.90
e9c73997694a897d3c6aadb26ed34797 2013-04-13 13:42:45 110.45.158.5

The malicious domains identified are:

Domain First Seen Last Seen
ea.blankchair.com 2013-09-01 05:02:22 2013-09-01 08:25:22
rt.blankchair.com 2013-09-01 05:02:21 2013-09-01 08:25:24
ali.blankchair.com 2013-09-01 05:02:20 2013-09-01 08:25:22
dll.freshdns.org 2013-07-01 10:48:56 2013-07-09 05:00:03

Campaign such as the Operation DeputyDog are the demonstration that groups of persistent collectors are very active and use sophisticated techniques for their attacks. The hackers exploited the knowledge of a zero-day during last attacks, circumstance that lets me think of the responsibility of state-sponsored hackers. Governments are primary entities that exploit zero-day flaws during their attack, cybercrime ecosystem in fact is more oriented in the sale of these exploits instead to use it for illegal activities. If you are interested to go deep in the technical analysis of the ATP read the following post published by FireEye.

[adrotate banner=”9″] [adrotate banner=”12″]

Pierluigi Paganini

(Security Affairs –  FireEye, Operation DeputyDog, cyberespionage)

[adrotate banner=”5″]

[adrotate banner=”13″]


facebook linkedin twitter

APT Bit9 Cybercrime digital certificates FireEye Hacking Operation DeputyDog zero-day vulnerability

you might also like

Pierluigi Paganini June 24, 2025
China-linked APT Salt Typhoon targets Canadian Telecom companies
Read more
Pierluigi Paganini June 24, 2025
U.S. warns of incoming cyber threats following Iran airstrikes
Read more

leave a comment

newsletter

Subscribe to my email list and stay
up-to-date!

    recent articles

    Russia-linked APT28 use Signal chats to target Ukraine official with malware

    APT / June 24, 2025

    China-linked APT Salt Typhoon targets Canadian Telecom companies

    APT / June 24, 2025

    U.S. warns of incoming cyber threats following Iran airstrikes

    Cyber warfare / June 24, 2025

    McLaren Health Care data breach impacted over 743,000 people

    Data Breach / June 23, 2025

    American steel giant Nucor confirms data breach in May attack

    Data Breach / June 23, 2025

    To contact me write an email to:

    Pierluigi Paganini :
    pierluigi.paganini@securityaffairs.co

    LEARN MORE

    QUICK LINKS

    • Home
    • Cyber Crime
    • Cyber warfare
    • APT
    • Data Breach
    • Deep Web
    • Digital ID
    • Hacking
    • Hacktivism
    • Intelligence
    • Internet of Things
    • Laws and regulations
    • Malware
    • Mobile
    • Reports
    • Security
    • Social Networks
    • Terrorism
    • ICS-SCADA
    • POLICIES
    • Contact me

    Copyright@securityaffairs 2024

    We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
    Cookie SettingsAccept All
    Manage consent

    Privacy Overview

    This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities...
    Necessary
    Always Enabled
    Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
    Non-necessary
    Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
    SAVE & ACCEPT