Modern field guide to security and privacy

Russian security firm becomes target of sophisticated malware campaign

Kaspersky Lab made a name for itself by identifying advanced malicious software campaigns. Now it says it was the victim of a malware campaign that some experts have linked to Israel. 

|
Reuters/File
Eugene Kaspersky, chief executive officer of Kaspersky Lab, answered a question during an interview in March.

The Moscow-based security firm Kaspersky Lab is known for identifying and cataloging malicious software. Now, it has also become a victim of one of the most sophisticated attacks the company has discovered.

The company detailed the incident in a blog post Wednesday, describing a long-running and sophisticated campaign that relied on three, separate “zero-day” vulnerabilities in software run by Microsoft. The attackers compromised systems operated by the company’s virus researchers and product developers, with an interest in tools Kaspersky was developing to spot so-called “advanced persistent threat,” or APT attacks. 

In a press conference in London on Wednesday, Kaspersky chief executive Eugene Kaspersky described the campaign against his company as “very complicated” and  “almost invisible,” beginning in the final months of 2014 and continuing through the spring of 2015.

According to a report on the attack published by Kaspersky, the attackers used two different malicious programs to infect computers, which Kaspersky dubbed “Duqu 2.0.” The attackers used previously unknown exploits to gain administrator-level access to Kaspersky’s network. They then abused that access to distribute the software to target systems, disguised as legitimate software packages. 

Notably the malware ran purely in the volatile memory of computers it infected. That technique meant that the software could not survive a computer rebooting. In exchange, the technique allowed the malware to operate without first installing itself on the infected system’s hard drive or making modifications to the operating system registry. Those are two common behaviors that almost certainly would have resulted in the malicious software being detected. 

“This is a mix of 'Alien,' 'Predator,' and 'Terminator' in terms of Hollywood,” said a jovial and suntanned Mr. Kaspersky, referring to the classic action films. “It is almost not possible to see how it infects computers.”

Kaspersky said the malicious software bore a close resemblance to earlier versions of Duqu, a cyberespionage platform that was first identified in 2011 and that has been linked to attacks on the government of Iran and parties involved in sensitive talks regarding the fate of Iran’s nuclear program. 

Asked about the source of the attack, Kaspersky declined to speculate on the origin of the malicious software, saying that the attack came by way of proxy servers and that Kaspersky lacked the legal authority to do what would be needed to trace the attack back to its origins. 

Still, his company’s report on the malware makes clear that Kaspersky was not the only victim.

Victims of Duqu 2.0 were identified in several countries, including western nations, the Middle East, and Asia. While some of those appear to be opportunistic infections designed to further the spread of the malware, some are linked to events and venues with a connection to the so-called “P5+1” negotiations with Iran about a nuclear deal. The list includes three luxury hotels in Europe that played host to P5+1 diplomats and negotiators, according to a report in The Wall Street Journal

Some experts have interpreted that as proof the government of Israel – which is excluded from the P5+1 group – is behind the Duqu malware. Kaspersky’s report is mum on attribution, but does note that the Duqu 2.0 group has launched “a similar attack in relation to the 70th anniversary event of the liberation of Auschwitz-Birkenau,” a possible reference to Israel.  

The motivation for such a group to compromise a security company such as Kaspersky Lab is unclear. The chief executive said his company’s analysis of the incident revealed compromises in systems used by its virus researchers but that the attack did not target Kaspersky's antivirus software, which is installed on hundreds of millions of machines globally.

Instead, attackers focused on systems containing information about Kaspersky’s future technologies, anti-APT solutions, and APT research as well as research the company is doing on developing a secure operating system for use in critical infrastructure. In recent years, Kaspersky Lab researchers have discovered or contributed to research exposing a number of state-backed malware campaigns, including the initial Duqu attacks. 

Wednesday's Kaspersky report is the first known evidence of a successful APT attack on an antivirus software firm. Kaspersky employs some of Russia and Eastern Europe’s top malware analysts and reverse engineers. Kaspersky took it as a point of pride that his company discovered such a sophisticated operation on its own, while downplaying the long-term impact of a compromise that lasted “months,” by his own admission. 

Security experts outside the company acknowledged that a frontal attack on a firm such as Kaspersky Lab was unusual, but proved that even sophisticated companies are not immune from compromise. 

“This is a pretty vicious attack that was well thought-out and planned,” says Karl Sigler, the threat intelligence manager at the security firm Trustwave. “It shows that there’s no such thing as 100 percent secure.” 

Memory resident malware such as the kind used in the attack is “uncommon,” but not unknown in other malicious campaigns, Mr. Sigler said. However, the use of exploits for previously unknown software vulnerabilities set the attack apart and also made it all but impossible to detect, he said. 

Sigler said the only recourse was for firms to “stay vigilant,” as malicious actors were “stepping up their game.” 

 

You've read  of  free articles. Subscribe to continue.
Real news can be honest, hopeful, credible, constructive.
What is the Monitor difference? Tackling the tough headlines – with humanity. Listening to sources – with respect. Seeing the story that others are missing by reporting what so often gets overlooked: the values that connect us. That’s Monitor reporting – news that changes how you see the world.

Dear Reader,

About a year ago, I happened upon this statement about the Monitor in the Harvard Business Review – under the charming heading of “do things that don’t interest you”:

“Many things that end up” being meaningful, writes social scientist Joseph Grenny, “have come from conference workshops, articles, or online videos that began as a chore and ended with an insight. My work in Kenya, for example, was heavily influenced by a Christian Science Monitor article I had forced myself to read 10 years earlier. Sometimes, we call things ‘boring’ simply because they lie outside the box we are currently in.”

If you were to come up with a punchline to a joke about the Monitor, that would probably be it. We’re seen as being global, fair, insightful, and perhaps a bit too earnest. We’re the bran muffin of journalism.

But you know what? We change lives. And I’m going to argue that we change lives precisely because we force open that too-small box that most human beings think they live in.

The Monitor is a peculiar little publication that’s hard for the world to figure out. We’re run by a church, but we’re not only for church members and we’re not about converting people. We’re known as being fair even as the world becomes as polarized as at any time since the newspaper’s founding in 1908.

We have a mission beyond circulation, we want to bridge divides. We’re about kicking down the door of thought everywhere and saying, “You are bigger and more capable than you realize. And we can prove it.”

If you’re looking for bran muffin journalism, you can subscribe to the Monitor for $15. You’ll get the Monitor Weekly magazine, the Monitor Daily email, and unlimited access to CSMonitor.com.

QR Code to Russian security firm becomes target of sophisticated malware campaign
Read this article in
https://www.csmonitor.com/World/Passcode/2015/0610/Russian-security-firm-becomes-target-of-sophisticated-malware-campaign
QR Code to Subscription page
Start your subscription today
https://www.csmonitor.com/subscribe