Menu
'Clandestine Fox' hackers win over energy employee in strategy change

'Clandestine Fox' hackers win over energy employee in strategy change

The group, known to use zero-day exploits, mounted a social engineering campaign against an energy company employee

A hard-to-tracking hacking group, known to use zero-day attacks, changed tack to use social media in an attempt to compromise an employee of an energy company, according to new research from FireEye.

FireEye declined to say who conducted the attack other than it was the same group that ran a campaign it dubbed "Operation Clandestine Fox," which it described in April and early May. It also did not identify where the employee works.

FireEye's subsidiary, Mandiant, is notable for outing in February 2013 a Shanghai-based Chinese Army signals intelligence branch, Unit 61398, which it said in a report was responsible for running wide-ranging hacking campaigns against U.S. industry. It called the group APT1, short for Advanced Persistent Threat.

Last month, U.S. prosecutors filed an unprecedented criminal indictment against five members of the unit, alleging they stole intellectual property and, in some cases, gave it to Chinese companies. China fumed and denied the accusations.

FireEye's latest research describes how an attacker, which it nicknamed "Emily," courted the energy employee's colleagues on a social network. She peppered them with probing questions, such as the name of the IT manager for the company and what type of software they ran, according to Mike Scott, a senior threat analyst at FireEye.

Eventually, Emily contacted the employee via the social network and the two corresponded for three weeks. She eventually sent him her resume in a ".rar" archive to his personal email address.

The archive file had a PDF of her resume but also a malicious version of TTCalc, which is an open source calculator. When executed, the malicious TTCalc installed a benign version of itself but also slipped a backdoor onto the computer.

The attack is different from other campaigns by the group in that this required tricking the victim. In the past, the group has relied on a number of browser-based zero-day exploits, or attacks that take advantage of a software vulnerability, which often require little user interaction aside from navigating to a malicious web page.

FireEye linked this attack to previous ones because the attackers utilized a domain name it had used in the past as part of its command-and-control structure. That was perhaps a glaring error on the part of the attackers, as FireEye had noted in a previous blog post that the group typically does "not reuse command and control infrastructure."

Send news tips and comments to jeremy_kirk@idg.com. Follow me on Twitter: @jeremy_kirk


Follow Us

Join the newsletter!

Or

Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.

Tags malwareFireEyeExploits / vulnerabilities

Events

Featured

Slideshows

Meet the Reseller News 30 Under 30 Tech Awards 2020 winners

Meet the Reseller News 30 Under 30 Tech Awards 2020 winners

This year’s Reseller News 30 Under 30 Tech Awards were held as an integral part of the first entirely virtual Emerging Leaders​ forum, an annual event dedicated to identifying, educating and showcasing the New Zealand technology market’s rising stars. The 30 Under 30 Tech Awards 2020 recognised the outstanding achievements and business excellence of 30 talented individuals​, across both young leaders and those just starting out. In this slideshow, Reseller News honours this year's winners and captures their thoughts about how their ideas of leadership have changed over time.​

Meet the Reseller News 30 Under 30 Tech Awards 2020 winners
Reseller News Exchange Auckland: Beyond the myths — how partners can master cloud security

Reseller News Exchange Auckland: Beyond the myths — how partners can master cloud security

This exclusive Reseller News Exchange event in Auckland explored the challenges facing the partner community on the cloud security frontier, as well as market trends, customer priorities and how the channel can capitalise on the opportunities available. In association with Arrow, Bitdefender, Exclusive Networks, Fortinet and Palo Alto Networks. Photos by Gino Demeer.

Reseller News Exchange Auckland: Beyond the myths — how partners can master cloud security
Reseller News welcomes industry figures at 2020 Hall of Fame lunch

Reseller News welcomes industry figures at 2020 Hall of Fame lunch

Reseller News welcomed 2019 inductees - Leanne Buer, Ross Jenkins and Terry Dunn - to the fourth running of the Reseller News Hall of Fame lunch, held at the French Cafe in Auckland. The inductees discussed the changing face of the IT channel ecosystem in New Zealand and what it means to be a Reseller News Hall of Fame inductee. Photos by Gino Demeer.

Reseller News welcomes industry figures at 2020 Hall of Fame lunch
Show Comments