New clue in South Korea cyberattack reveals link to Chinese criminals

Cybersleuths picking through the digital bread crumbs left behind in Wednesday's massive South Korea cyberattack have found an interesting morsel: Apparently hackers used an 'exploit tool' made in China to infiltrate the computer networks.

Korean Broadcasting System employees in Seoul, South Korea, Thursday try to recover a computer server a day after a cyberattack caused computer networks at the company to crash.

The source of the cyberattack that damaged 32,000 computers at several banks and television stations in South Korea Wednesday remains unclear, but the digital traces left behind have led one cybersleuth to suggest that it has clear links to Chinese cybercrime organizations.

Though South Korean investigators initially said they had traced the attack to an Internet address in China, they have since stepped back from that statement. Yet cybersecurity experts looking at file names, Internet domain names, and other digital detritus left behind by the attackers – which has been published on Korean technical blogs – are coming to their own conclusions.

The information posted online has led Jaime Blasco, a cybersecurity researcher in San Mateo, Calif., to suggest that the attackers gained access to the computers though a so-called “exploit kit” apparently designed by cybercriminals in China and often used to target South Korea.

The finding doesn’t implicate the Chinese government – or exonerate it. Nor does it provide any clarity on whether North Korea was involved – though some experts say the exploit kit is just the sort of cybercrime tool that North Korea might be inclined to purchase on the black market.

What Mr. Blasco’s investigation clarifies is how the damage was done – providing clues that could help crack the mystery of who was responsible.

“What we see are traces that the attackers used for their intrusion into the banks and other companies a criminal exploit kit written in China,” says Blasco, a researcher with AlienVault. “It would be easy for whoever did this attack to rent or purchase this exploit tool and then use it to get into the banks to leave behind the wiper malware.”

Researchers with Sophos, a cybersecurity company in Britain, on Wednesday identified the malware that did the damage: a destructive “wiper” program dubbed “DarkSeoul” that overwrites critical parts of the computer. Its origin has not been identified although the attack on its face bore a striking similarity to the wiper program used in an August 2012 attack on the oil firm Saudi Aramco.

What was not known was how did the attackers first infiltrated the banks’ networks, created digital backdoors, and then moved around those networks to deliver DarkSeoul.

So Blasco took the file names identified on the Korean technical blogs and then began painstakingly comparing them to a large database of known malware. What he discovered were numerous detailed matches with a single piece of Chinese malware called the Gondad exploit kit. The kit infects personal computers with a trojan program that opens a digital backdoor and hands over control of the infected computer to an attacker.

From that point, the computer becomes a “bot” or “zombie” that can be accessed and controlled by anyone who rented or purchased Gondad. The Gondad botnet has enslaved 400,000 computers in 89 countries, making it the 65th largest botnet in the world, according to AVG Technologies, an antivirus company based in Brno, Czech Republic. What’s notable is that 73 percent of all of Gondad victims worldwide reside in South Korea.

If whoever was behind Wednesday’s attacks had access to some of the Gondad exploit kit, they could have gained access to hundreds – or thousands – of compromised South Korean systems and then simply chosen which one they wanted to damage. That would have made it easy to deposit the dangerous DarkSeoul wiper payload, Blasco says.

That does not mean, however, that Chinese cyber criminals were behind the attack, even if it may have been facilitated by them, these experts say.

“Gondad comes from China without question,” Blasco says. “The programmers are from China, everything in that program is in Chinese. I think its very likely that the guys behind this used this exploit kit – maybe a hacktivist group that wants to harm the South Korean government or a nation-state group like North Korea.”

Many US experts would not be surprised if North Korea did just that.

“North Korea is really good at black market activities, good at smuggling,” says James Lewis, a cybersecurity expert who has examined North Korea’s cyber activities. “If they wanted to get into a black market for cyber stuff, they would be good at that.”

At this point, there are too many mixed signals to point the finger definitively at North Korea, he says. For example, a digital image of skulls was reported on some machines in the wake of the attack, which suggests hackivists might have been involved. Dr. Lewis remains to be persuaded that North was involved, though he admits it is possible.

“Given all that the North Korean government has said, and its threats, you can’t rule it out that they may have been involved,” he says.

Another recent finding provides interesting context to the claim that Chinese cyber criminal software was involved. On Tuesday, one day before the attacks, a cyberexpert in the Czech Republic posted a blog titled: “Analysis of Chinese attack against Korean banks.”

The author of the blog, Jaromir Horejsi of AVAST, said the hack was detected about two weeks earlier and was quite different from Wednesday’s attack. The purpose was apparently to gather banking login and password information from infected computers – not to wipe out computers. Moreover, the Chinese-written malware appeared to be custom written for that attack, not part of the Gondad exploit kit.

But there are intriguing similarities, including how the payloads were deposited onto victim networks from a server in Japan.

Yet whether North Korea or a hacktivist group – or someone else – is behind Wednesday’s attack, Gondad was likely just one of several software infiltration tools used to get in, plant the malware, and then trigger it at 2 p.m. local time.

“At this point I’m calling it a theory on how someone, maybe North Korea, might have used Gondad botnet and other exploit kits to get into these companies networks,” Blasco says. “But the only theory really is how you combine all the companies with the infrastructure of the different exploit kits. It’s really no theory at all that Gondad is involved. There’s plenty of evidence for that.”

of stories this month > Get unlimited stories
You've read  of 5 free articles. Subscribe to continue.

Unlimited digital access $11/month.

Get unlimited Monitor journalism.