Categories: Cyber warfareHacking

Chinese Attacks on Defense Contractors, 2 clues are evidence

It’s not first time and the news itself doesn’t rapresent a surprise, once again Chinese hacker groups are involved in cyber intelligence operations against western companies with the intent to steal critical information. Symantec Researchers have proved the involvement of Chinese groups in attacks alerting the international community regarding the target attacked, including major U.S. defense contractors.


The trend is established, most often to obtain information regarding activities of the Government hackers prefer to attack private companies that collaborate with it, commonly referred to as contractors. This targets are often more exposed despite the government ask to the contractors the compliance with specific standards regarding the information management implemented to guarantee the confidentiality and integrity of data stored.  Government of China is accused to systematically attacking the computer networks of the western governments and corporations. Beijing is successfully stealing research and development, software source code, manufacturing know-how and government plans. The shadow of China is behind the famous unauthorized network access events at several U.S. defense contractors, and that they may also be responsible for the RSA SecurID breach as well ot the massive attacks against Japan istitutions. We are facing with a new ‘cold war’, but this time the challenge is to obtain dominance in cyberspace.

Just contractors and relationships with governments in the security chain are considered weak links, as potentially vulnerable interface between very different worlds. Economic crisis, constant cuts to many aspects of manufacturing processes, safety first and foremost, have led to an exposure difficult to manage. Given the increasing number of attacks recorded against these figures it is essential that relationships with contractors are constantly being reviewed and revised by the authorities in order to avoid data breach potentially dangerous. Needless to lock down facilities when you leave the keys in the lock, the keys are represented by their own contractors careless and ignorant to the safety aspects of technological change we are seeing.

Questionable whether the outsourcing of many government activities can be really useful, if in fact often in this way can reduce the direct costs we must take into account the indirect costs related to management of risk of information exposure, that frequently has become real.

After this my personal reflection lets come back to the discovered attacks, the attacks have use malicious PDF documents exploiting an Adobe Reader bug patched last month to infect Windows PCs with trojan “Sykipot”. As described in my previous article Sykipot is a trojan with feature of backdoor already used in other attacks against U.S PKI infrastructures based on smart cards.

The vulnerability involved the application’s Universal 3D file format (U3D) and could allow attackers the ability to remotely take over an infected system, cause system crashes, and conduct denial of service exploits.

The Symantec researchers have discovered one of the main server, the machine that phisically mantains more that 100 malformed PDF, used during the attack is located in Beijing and hosted by one of the country’s largest Internet service providers not yet identified. More in detail Symatec researchers have discovered a real architecture used for the attacks that include also other machines responsible of the modification of the maliciuos PDF documents, activity necessary to avoid the antivirus action on the target.

At least six Chinese ip addresses that are used to proxy or host the C&C servers. The Netbox webserver used in the C&C servers is mainly used by those who speak Chinese. In fact all the documentation to setup and learn the framework is only available in Mandarin.  In the analysis have been involved also researchers of the AlienVault security firm that have decleared that the server used in the operations are Windows based and with high probability locaded in China. It’s difficult to gain certainty of this, proxies usage, routing tricks and spoofed IP addresses can be easily coordinated to give the evidence of a fake attack origin. Researchers have also collected the evidences that the hackers who connected to the staging server did so from Zhejiang province on eastern coast.

A specific feature of the Sykipot attacks is an hard-code identifier of the malware used by the creator in each operation to evaluate the effectiveness of the attacks.
Symantec has mantained a cautious position doens’t link the hackers directly with Chinese Government but the clues demonstrate the origin of the attacks.

“Based on these insights, the attackers are familiar with the Chinese language and are using computer resources in China,” Symantec stated.

What is iteresting is the ability to exploit a zero day vulerability and also the process used to avoid antivirus actions with continuos modification to the malware, that proves that behind this operations there are skilled group that manage each attack like an ongoing project.

Ironically it is precisely that the company Lockheed Martin that had discovered the vulnerability used was among the victims of the attacks.

In Italy we say: <<Two clues are evidence>>

Pierluigi Paganini

References

http://www.computerworld.com/s/article/9223765/Researchers_unearth_more_Chinese_links_to_defense_contractor_attacks

 

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

Security Affairs newsletter Round 563 by Pierluigi Paganini – INTERNATIONAL EDITION

A new round of the weekly Security Affairs newsletter has arrived! Every week, the best…

8 minutes ago

Fintech firm Figure disclosed data breach after employee phishing attack

Fintech firm Figure confirmed a data breach after hackers used social engineering to trick an…

20 hours ago

U.S. CISA adds a flaw in BeyondTrust RS and PRA to its Known Exploited Vulnerabilities catalog

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a flaw in BeyondTrust RS and…

22 hours ago

Suspected Russian hackers deploy CANFAIL malware against Ukraine

A new alleged Russia-linked APT group targeted Ukrainian defense, government, and energy groups, with CANFAIL…

1 day ago

New threat actor UAT-9921 deploys VoidLink against enterprise sectors

A new threat actor, UAT-9921, uses the modular VoidLink framework to target technology and financial…

2 days ago

Attackers exploit BeyondTrust CVE-2026-1731 within hours of PoC release

Attackers quickly targeted BeyondTrust flaw CVE-2026-1731 after a PoC was released, enabling unauthenticated remote code…

2 days ago

This website uses cookies.