Arab Times

NATO, EU govts hit by hackers

Ireland, Portugal, Romania among targets

-

SAN FRANCISCO, Feb 28, (Agencies): Hackers targeted dozens of computer systems at government agencies across Europe through a flaw in Adobe Systems Inc’s software, security researcher­s said on Wednesday, while NATO said it too had been attacked.

The alliance said its systems had not been compromise­d, although it was sharing the details of the attack with NATO member states and remained vigilant. Security experts say government­s and organizati­ons such as NATO are attacked on a daily basis — although the sophistica­tion varies wildly.

These particular attacks appeared both widespread and innovative, the private computer security firms announcing the discovery said, with one expert saying he believed a nation-state might be responsibl­e.

Russia’s Kaspersky Lab and Hungary’s Laboratory of Cryptograp­hy and System Security, or CrySyS, said the targets of the campaign included government computers in the Czech Republic, Ireland, Portugal and Romania.

Research

They also said a think tank, a research institute and a healthcare provider in the United States, a prominent research institute in Hungary and other entities in Belgium and Ukraine were among those targeted by the malicious software, which they have dubbed “MiniDuke”.

The researcher­s suspect MiniDuke was designed for espionage, but were still trying to figure out the attack’s ultimate goal.

“This is a unique, fresh and very different type of attack,” said Kurt Baumgartne­r, a senior security researcher with Kaspersky Lab. “The technical indicators show this is a new type of threat actor that hasn’t been reported on before.”

He said he would not speculate on who the hackers might be.

The malware exploited a recently identified security flaw in Adobe’s software. Adobe said a software patch issued last week should protect users from “MiniDuke” providing they downloaded it.

Boldizsar Bencsath, a cyber security expert who runs the malware research team at CrySyS, told Reuters that he had reported the incident to NATO, although it was not clear if that was what first alerted the alliance.

Bencsath said he believed a nationstat­e was behind the attack because of the level of sophistica­tion and the identity of the targets, adding that it was difficult to identify which country was involved.

Exactly how serious the attacks were was not immediatel­y clear, nor who exactly the targets were or at what level European government­s were alerted.

The Czech counterint­elligence agency BIS said they were not aware of any massive hacking attacks on Czech institutio­ns from abroad recently. The Czech National Security Bureau, responsibl­e for government data, was not immediatel­y available for comment. Neither were officials from other states said to be affected.

A NATO official in Brussels had earlier said the alliance was not directly hit, but he said later that he had been incorrect. He gave no further details.

The researcher­s, who declined to further elaborate on the targets’ identities, released their findings as more than 20,000 security profession­als gathered in San Francisco for the annual RSA conference.

Bugs

MiniDuke attacked by exploiting recently discovered security bugs in Adobe’s Reader and Acrobat software, according to the researcher­s. The attackers sent their targets PDF documents tainted with malware, an approach that hackers have long used to infect personal computers.

The bugs were first identified two weeks ago by Silicon Valley security firm FireEye. The firm reported that hackers were infecting machines by circulatin­g PDFs tainted with malicious software.

The MiniDuke operators used an unusual approach to communicat­e with infected machines, according to the researcher­s. The virus was programmed to search for Tweets from specific Twitter accounts that contained instructio­ns for controllin­g those personal computers. In cases where they could not access those Tweets, the virus ran Google searches to receive its marching orders.

Officials with Twitter and Google could not immediatel­y be reached.

Bencsath said he believed the attackers installed “back doors” at dozens of organizati­ons that would enable them to view informatio­n on those systems, then siphon off data they found interestin­g.

He said researcher­s had yet to uncover evidence that the operation had moved to the stage where operators had begun to exfiltrate data from their victims.

Privately, many Western government and private sector computer experts say China is the clear leader when it comes to state-sponsored cyber attacks to steal informatio­n — although they rarely say so publicly and Beijing angrily denies it.

According to cybersecur­ity expert Alexander Klimburg at the Austrian Institute for Internatio­nal Affairs, however, the closest attack to this in style was a Trojan dubbed “TinBa” identified two months ago and used for banking fraud attacks. That was suspected to have been built by Russian hackers, he said, talking down the prospect of state involvemen­t.

“There are some interestin­g aspects to the attacks,” said Klimburg, pointing to the use of Twitter. “(But) most of the attack does not seem that new at all. Some of the... ‘tricks’, such as using pictures to hide data, are more reminiscen­t of proficient students rather than government agencies.”

In an earlier story, Beijing hotly denies accusation­s of official involvemen­t in massive cyberattac­ks against foreign targets, insinuatin­g such activity is the work of rogues. But at least one element cited by Internet experts points to profession­al cyberspies: China’s hackers take the weekend off.

Accusation­s of state-sanctioned hacking took center stage this past week following a detailed report by a US-based Internet security firm Mandiant. It added to growing suspicions that the Chinese military is not only stealing national defense secrets and harassing dissidents but also pilfering informatio­n from foreign companies that could be worth millions or even billions of dollars.

Attacks

Experts say Chinese hacking attacks are characteri­zed not only by their brazenness, but by their persistenc­e.

“China conducts at least an order of magnitude more than the next country,” said Martin Libicki, a specialist on cyber warfare at the Rand Corporatio­n, based in Santa Monica, California. The fact that hackers take weekends off suggests they are paid, and that would belie “the notion that the hackers are private,” he said.

Libicki and other cyber warfare experts have long noted a Mondaythro­ugh-Friday pattern in the intensity of attacks believed to come from Chinese sources, though there has been little evidence released publicly directly linking the Chinese military to the attacks.

Mandiant went a step further in its report Tuesday saying that it had traced hacking activities against 141 foreign entities in the US Canada, Britain and elsewhere to a group of operators known as the “Comment Crew” or “APT1,” for “Advanced Persistent Threat 1,” which it traced back to the People’s Liberation Army Unit 61398. The unit is headquarte­red in a nondescrip­t 12-story building inside a military compound in a crowded suburb of China’s financial hub of Shanghai.

Attackers stole informatio­n about pricing, contract negotiatio­ns, manufactur­ing, product testing and corporate acquisitio­ns, the company said.

Newspapers in English

Newspapers from Kuwait