Menu
China-based hackers used Microsoft's TechNet for attacks

China-based hackers used Microsoft's TechNet for attacks

The group, nicknamed DeputyDog, takes aim at governments and companies, FireEye said

Microsoft has taken steps to stop a China-based hacking group from using its TechNet website as part of its attack infrastructure, according to security vendor FireEye.

The group, which FireEye calls APT (advanced persistent threat) 17, is well-known for attacks against defense contractors, law firms, U.S. government agencies and technology and mining companies.

TechNet is highly trafficked website that has technical documentation for Microsoft products. It also has a large forum, where users can leave comments and ask questions.

APT17 -- nicknamed DeputyDog -- created accounts on TechNet and then left comments on certain pages. Those comments contained the name of an encoded domain, which computers infected by the group's malware were instructed to contact.

The encoded domain then referred the victim's computer to a command-and-control server that was part of APT17's infrastructure, said Bryce Boland, FireEye's chief technology officer for Asia-Pacific.

The technique of requiring an infected computer to contact an intermediary domain is frequently used. Often, hackers want the infected machines to reach out to a domain that is unlikely to look suspicious before proceeding to another less-reputable one.

"It's completely normal to see a lot of traffic going to TechNet," Boland said.

Sometimes, the command-and-control domains are embedded in the malware itself, but that makes it easy for computer security researchers to figure out which ones it contacts. Other times, malware is coded with an algorithm that generates possible domains names it should contact, but that can also be reverse engineered by analysts, Boland said.

Security experts have seen attackers abuse other legitimate domains and services, such as Google Docs and Twitter, to accomplish the same goal as APT17, Boland said.

"This is a challenge for any open platform," he said.

FireEye and Microsoft replaced the encoded domains on TechNet with ones the companies controlled, which gave them a glimpse of the problem when infected machines called out to those domains.

APT17 has been "targeting our customers for many years," Boland said. Organizations are typically targeted through spear-phishing, which involves sending emails with malicious links or attachments, he said.

For the last couple of years, APT17 has infected computers with a malware program that FireEye calls BLACKCOFFEE. The malware can upload files, delete files and create a reverse shell on a computer, among other functions.

Send news tips and comments to jeremy_kirk@idg.com. Follow me on Twitter: @jeremy_kirk


Follow Us

Join the newsletter!

Error: Please check your email address.

Tags securityMicrosoftmalwareFireEye

Featured

Slideshows

Looking back at the top 15 M&A deals in NZ during 2017

Looking back at the top 15 M&A deals in NZ during 2017

In 2017, merger and acquisitions fever reached new heights in New Zealand, with a host of big name deals dominating the headlines. Reseller News recaps the most important transactions of the Kiwi channel during the past 12 months.

Looking back at the top 15 M&A deals in NZ during 2017
Kiwi channel closes 2017 with After Hours

Kiwi channel closes 2017 with After Hours

The channel in New Zealand came together to celebrate the close of 2017, as the final After Hours played out in front of a bumper Auckland crowd.

Kiwi channel closes 2017 with After Hours
Meet the top performing HP partners in NZ

Meet the top performing HP partners in NZ

HP honoured leading partners across the channel at the Partner Awards 2017 in New Zealand, recognising excellence across the entire print and personal systems portfolio.

Meet the top performing HP partners in NZ
Show Comments