Thursday, August 15, 2013

Chinese Hackers Upping Their Game

A paper published by security firm FireEye examines the changing techniques that hackers based in China are using to launch fresh attacks on foreign websites.
The new campaigns mark the first significant stirrings from the group since it went silent in January in the wake of a detailed expose of the group and its exploits — and a retooling of what security researchers believe is a massive spying operation based in China.

Delving into the mechanics of the most recent attacks, malicious code uses updated version of malware Aumlib and Ixeshe to execute their hacks.  According to FireEye,  the software hadn't significantly evolved since 2011, but has drawn attention to what many suspect to be a government backed attempt to hack secure networks outside China.

The hacker crew APT12 was exposed in January, but these new hack attacks come courtesy of the quieter, but more active APT1.  “We see them targeting hundreds of organizations, but don’t attract attention or leave much of a footprint,” Mandiant CISO Richard Bejtlich said in January.

“These subtle changes may be enough to circumvent existing IDS signatures designed to detect older variants of the Aumlib family,” FireEye said, “That additional degree of understanding can help organizations forecast when and how a threat actor might change their behavior — because if you successfully foil their attacks, they probably will.”


Enhanced by Zemanta

No comments:

Post a Comment

Chinese Answers

On the outside, China's answer to Silicon Valley doesn't look the part: It's a crowded mass of electronics malls, fast-food join...