APT

Only now we known that International Civil Aviation Organization (ICAO) was hacked in 2016

Canadian media revealed that in November 2016, the International Civil Aviation Organization (ICAO) was a hit by a large-scale cyberattack.

The security breach was discovered by an analyst at Lockheed Martin that immediately informed the organization. The expert discovered that hackers took control of two of its servers to carry out a so-called watering hole attack aimed at infecting people accessing the sites hosted on the servers.

“The ICAO had been targeted by a watering hole, or an attack where a cyberattacker uses a website frequented by the intended target with an exploit.” reported a blog post published by ESET.

“The analyst at Lockheed Martin emphasized that this attack could represent a “significant threat to the aviation industry.””

Cyber security experts believe the attack was carried out by the China-linked APT group LuckyMouse (aka Emissary Panda, APT27 and Threat Group 3390, and Bronze Union).

The ICAO organization hired an external analyst to help it to evaluate the extent of the attack. According to an investigation conducted by Secureworks hackers were also able to access the hackers were also able to compromise the mail servers to obtain access to admin accounts.

“Mail server, domain administrator and system administrator accounts were all affected, giving cyberespions access to the past and current passwords of more than 2,000 ICAO system users. Hackers could read, send or delete emails from any user.“ reports Radio-Canada.

“The spies also had access to the personal records of past and present employees, the medical records of those who had used the ICAO clinic, financial transaction records and personal information of anyone who had visited the ICAO building or was registered on the website.”

In the weeks following the attack, the e-mail account of an ICAO delegate was also hacked and used to send out messages, but at the time it is not clear if both incidents are linked.

According to Radio Canada, ICAO tried to hide a cyberattack with important consequences in the incident response.

Documents cited by Radio Canada reveal that four members of the ICAO information and communication technology (ICT) team attempted to conceal evidence of their own incompetence, facilitated by the absence of their supervisor.

“Despite the seriousness of the attack, confidential sources told CBC / Radio-Canada that ICAO Secretary General Fang Liu had rejected internal recommendations to investigate ICT team members and their boss. , James Wan. All are still working at the Organization. continues Radio Canada.

According to ESET experts Matthieu Faou, the Chinese LuckyMouse APT group specializes in watering hole attacks. The hackers scan the Internet for vulnerable servers that could lead to compromising valuable targets.

“In addition to using generic tools relatively accessible on the Web, the group has developed tools of its own, including a rootkit. Last year, they stole a digital certificate belonging to a legitimate company, used to sign its rootkit.” explained Faou.

Why ICAO?

According to José Fernandez, cybersecurity expert and professor at Polytechnique Montréal, “ICAO is a natural choice”, for the purpose of cyber-espionage, a type of campaign with which LuckyMouse is often associated. “The agency thus becoming a one-stop shop for the hacking of all other players in the aerospace industry.”

Anthony Philbin, ICAO’s chief of communications, attempted to reassure the community following the disclosure of the attack that has happened in 2016.

“Decisions made by ICAO regarding the 2016 incident you’ve referenced were based on forensic evidence provided by two independent expert bodies,” Philbin said.

“I’m sure you’ll understand that it wouldn’t be prudent for me to discuss more specific details with media on matters relating to ICAO security measures, cyber or otherwise.”
“ICAO maintains no type of financial or other private information which could possibly pose risks to individual Canadians.”

“We are not aware of the serious cyber security consequences for the external partners that would have resulted from this incident …”, adding that since the attack, “ICAO has made significant improvements to its cybersecurity framework and approaches to mitigate other incidents.”

[adrotate banner=”9″] [adrotate banner=”12″]

Pierluigi Paganini

(SecurityAffairs – APT, hacking)

[adrotate banner=”5″]

[adrotate banner=”13″]

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

MITRE revealed that nation-state actors breached its systems via Ivanti zero-days

The MITRE Corporation revealed that a nation-state actor compromised its systems in January 2024 by…

12 hours ago

FBI chief says China is preparing to attack US critical infrastructure

China-linked threat actors are preparing cyber attacks against U.S. critical infrastructure warned FBI Director Christopher…

1 day ago

United Nations Development Programme (UNDP) investigates data breach

The United Nations Development Programme (UNDP) has initiated an investigation into an alleged ransomware attack…

1 day ago

FIN7 targeted a large U.S. carmaker with phishing attacks

BlackBerry reported that the financially motivated group FIN7 targeted the IT department of a large…

2 days ago

Law enforcement operation dismantled phishing-as-a-service platform LabHost

An international law enforcement operation led to the disruption of the prominent phishing-as-a-service platform LabHost.…

2 days ago

Previously unknown Kapeka backdoor linked to Russian Sandworm APT

Russia-linked APT Sandworm employed a previously undocumented backdoor called Kapeka in attacks against Eastern Europe since…

2 days ago

This website uses cookies.