According to a recent report by FireEye, a hacking group suspected of operating from China has had success stealing information from mostly Indian targets, often pertaining to border disputes and trade issues.
The gang specialises in sending targeted phishing emails to victims in the hope of gaining wider access to their networks, a practice known as spear phishing, said Bryce Boland, CTO for Asia-Pacific, FireEye.
The security firm hasn’t given a name to the group but has been watching it since 2011, Boland said.
The company has gathered data on the group based on attacks attempted against its customers. Analysis of Internet infrastructure used by the group, including command-and-control servers, have given insight into the scope of its operations, Boland said.
“In some cases, we’ve found not just our customers but many other organisations that are being targeted as well and actively being breached,” he said.
Some of the latest spear-phishing emails have an attached Microsoft Word document, Boland said. The document contains an exploit for a now-patched vulnerability in Word dating from 2012.
According to Boland, the vulnerability is quite outdated, however, it is still effective if organisations haven’t patched their systems. “For the most part, most governments across Asia have relatively less mature cybersecurity defensive capabilities,” he said. “They’re less effective today in patch management.”
Once a user is compromised, this group’s attackers are using a script, nicknamed WATERMAIN, which leverages Windows Management Instrumentation (WMI) to explore computers and the network.
WMI is a powerful tool used by administrators and can be used for searching across machines on a network, distributing software and executing commands.
There’s often not a lot of logging and monitoring of WMI activity within organisations, which makes using it advantageous for the attackers, Boland said.
The group has targeted more than 100 entities of which around 70 are in India. But the group has also sought to compromise targets in Pakistan, Nepal and Bangladesh.
Boland said FireEye decided to release the information to show that organisations in Asia are also subject to these kinds of specific attacks.
Typically when FireEye releases information, the cyber attackers will change their tactics in order to be less obvious. Boland said he expects this group will recognise itself, since not many others use WMI as part of their attacks.
“I think they’ll know they got caught,” he said.
Having to change tactics comes with a price, however, and raises the attackers’ operating costs, which is good. “We want to force them to invest,” he said.