While the world took pause to consider the implications of Operation Aurora, and Google lent considerable voice to the concept of Advanced and Persistent Threats (APT), we can ill-afford to believe even for a moment that they are alone in their sophistication or capability. According to the FBI more than 100 nations have offensive cyber operations as part of their intelligence or national security fabric. And the same attributes that make the Internet ideal for covert intelligence gathering make it attractive for corporate espionage and organized criminal activity. The IT security industry commonly refers to the online activities of Eastern European and Asian organized crime as “cyber criminals” or “gangs”, which in many ways only serves to minimize the attention they deserve. In truth the online operations of some organized crime syndicates are every bit as sophisticated, advanced and persistent as their nation-state counterparts. They are truly expert at gaining footholds and siphoning off critical information. And they are FAR more pervasive than Operation Aurora.
In late January, NetWitness security research were able to gain visibility into a large scale ZeuS-based botnet, taking user credentials and confidential information from thousands of organizations around the world (See The Wall Street Journal article). Some of the information collected has been synthesized in the Kneber Bot whitepaper that you can dowload from the NetWitness website.
The sheer volume of information gathered and has forced us to reconsider the common belief that this very successful botnet is simply “financial services” related. In fact, this particular botnet was much more concerned with culling account and network access credentials, as well as collecting as much detail about victim identities as possible. In effect, they were less concerned with accessing any particular account, than being able to access ALL accounts related to a victim.
As we began analyzing victim information, we rapidly formed a picture of thousands of corporate compromises around the globe. As with Aurora, many of the largest most technology savvy companies had internal compromised hosts, which had culled various corporate user level and administrative credentials.
We may attempt to broadly classify threats in the security industry, in hopes that we can make the complex more digestible to management. However, classifying threats like this as “banking trojans” may do a large disservice to the victim companies. Indeed, there are many that broadly dismiss threats such as these as “unsophisticated”, or less advanced than a pinpoint attack like Operation Aurora. Rest assured, these adversaries could not care less how we classify their work. They are well organized, have demonstrated technical sophistication on par with many intelligence services and do not forgo the opportunity for financial gain with the the information they collect. If they are collecting network credentials, it means they are using or selling them in an active underground economy – which may include sponsoring foreign intelligence services. What is easier? Designing a campaign like Operation Aurora, or simply purchasing access to your target companies?
We are working with federal law enforcement, and continue in our efforts to notify victim organizations. Please feel free to download our white paper and I am confident we will discuss great detail in future blog posts.