This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC’s registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Espionage groups increasingly use cloud-based services and open source tools to create their infrastructure for gathering data and cyberattacks, attempting to hide their activities in the massive quantity of services and resources used by legitimate organizations. 

Last week, Microsoft suspended 18 Azure Active Directory “applications” that the company identified as a component of a Chinese espionage group’s command-and-control channel. Dubbed GADOLINIUM by Microsoft, the cyberattack group has adopted a combination of cloud infrastructure, which can be quickly reconstituted in the event of a takedown, and open source tools, which can help attackers’ actions blend into more legitimate activity.

The group is not the only state-sponsored group to increasingly employ cloud infrastructure and open source tools, according to Microsoft Threat Intelligence Center (MSTIC).

“MSTIC has noticed a slow trend of several nation-state activity groups migrating to open source tools in recent years … an attempt to make discovery and attribution more difficult,” Microsoft stated in a blog post. “The other added benefit to using open-source types of kits is that the development and new feature creation is done and created by someone else at no cost.”

GADOLINIUM — also known as APT40, Kryptonite Panda, and Leviathan — has focused on stealing maritime information and associated research from universities to advance China’s expansion of its navy, according to an analysis by cybersecurity services firm FireEye. While the espionage group has toyed with cloud infrastructure since 2016, the use of open source tools has only happened in the past two years, Microsoft said in its own analysis.

By using commodity services and tools, the attackers not only blend into legitimate activity more completely but also become harder to identity as a specific group, says Dennis Wilson, global director of SpiderLabs at Trustwave, a security services firm.

“A sophisticated attacker becomes a lot harder to identify when they use open source tools and readily available cloud assets to perform their attacks,” he says, adding that “if 20 or 30 different groups are using the same malware and the same techniques, it becomes much harder to tell them apart by their tools and tactics.”

GADOLINIUM is not the only espionage group to use common tools to attempt to escape detection. Several security firms have noted that attackers are increasingly “living off the land” by using administrative tools already installed on targeted systems as a way to hide their activities. For example, another Chinese cyberattack group — known as APT41, Wicked Panda, Barium, or Axiom  —has used widely available tools, such a Microsoft BITSAdmin and the Metasploit framework, to attack a broad cross-section of countries and industries, hitting targets in Australia, Canada, Italy, Japan, Philippines, Qatar, and Sweden, to name a few. 

Earlier this month, the US Department of Justice charged five Chinese nationals and two Malaysian citizens as part of an investigation into APT41, alleging they worked together on intrusions into more than 100 US companies.

“The Department of Justice has used every tool available to disrupt the illegal computer intrusions and cyberattacks by these Chinese citizens,” Deputy Attorney General Jeffrey A. Rosen, said in a statement announcing the arrests. “Regrettably, the Chinese communist party has chosen a different path of making China safe for cybercriminals so long as they attack computers outside China and steal intellectual property helpful to China.”

In the attack incident Microsoft described in its analysis, GADOLINIUM used a variant of PowerShell, known as PowerShell Empire, to connect to both Azure Active Directory and Microsoft’s OneDrive storage. Automated systems have a hard time detecting such attacks, as the variant of PowerShell and the fact that is connecting to a known cloud service are usually not considered suspicious activity, Microsoft stated in its analysis.

“The use of this PowerShell Empire module is particularly challenging for traditional SOC monitoring to identify,” MSTIC stated in its blog post. “From an endpoint or network monitoring perspective the activity initially appears to be related to trusted applications using trusted cloud service APIs.”

Another advantage of basing cyberattack infrastructure in the cloud is because an increasingly number of targeted companies and organizations also have assets in the cloud. Using the same infrastructure as the target can make exploitation easier, says Trustwave’s Wilson.

“If you find a tactic that works against Microsoft Azure, for example, they can apply that same tactic or technique to any organization that uses that same technology,” he says. “In the past, a company may have had this vendor for a firewall and this vendor for an [endpoint detection and response] solution, but now you have a lot of companies using the same cloud infrastructure, so now it becomes a cookie-cutter approach for the attackers to exploit companies across that infrastructure.”

Copyright © 2020 Informa PLC Informa UK Limited is a company registered in England and Wales with company number 1072954 whose registered office is 5 Howick Place, London, SW1P 1WG.

Source: https://www.darkreading.com/threat-intelligence/state-sponsored-hacking-groups-increasingly-use-cloud-and-open-source-infrastructure/d/d-id/1339030

Microsoft Corporation, Office 365, Microsoft Office, Microsoft Teams, Outlook.com, Downtime, Microsoft Outlook

World news – US – State-Sponsored Hacking Groups Increasingly Use Cloud & Open Source Infrastructure

En s’appuyant sur ses expertises dans les domaines du digital, des technologies et des process , CSS Engineering vous accompagne dans vos chantiers de transformation les plus ambitieux et vous aide à faire émerger de nouvelles idées, de nouvelles offres, de nouveaux modes de collaboration, de nouvelles manières de produire et de vendre.

CSS Engineering s’implique dans les projets de chaque client comme si c’était les siens. Nous croyons qu’une société de conseil devrait être plus que d’un conseiller. Nous nous mettons à la place de nos clients, pour aligner nos incitations à leurs objectifs, et collaborer pour débloquer le plein potentiel de leur entreprise. Cela établit des relations profondes et agréables.

Nos services:

  1. Création des sites web professionnels
  2. Hébergement web haute performance et illimité
  3. Vente et installation des caméras de vidéo surveillance
  4. Vente et installation des système de sécurité et d’alarme
  5. E-Marketing

Toutes nos réalisations ici https://www.css-engineering.com/en/works/

Previous articleTriumph dévoile sa Trident
Next articleResident Evil : l’annonce improbable du TGS 2020 (Vidéo)
Georges MOMO
Georges MOMO est Ingénieur informatique ( Diplôme obtenu à 3IL Limoges France) Il début sa carrière par un stage de fin d'étude d'ingénieur à Toulouse sur un projet de AIRBUS Toulouse Blagnac, il enchaîne ensuite à Nantes où il travaille sur le projet de la migration documentaire de la BPCE. Son ambition le conduit ensuite à Paris où il travaille sur deux projets de la banque de France (Validation des titres de bourse émis sur le marché européen et la génération centralisée des documents) qu'il quitte quelques années plus tard occupant le poste de responsable technique. Passionné de l'information, il est actif sur le web et sur le terrain depuis les années 2000.

LEAVE A REPLY

Please enter your comment!
Please enter your name here