Last June Kaspersky firm uncovered a new global cyber espionage campaign dubbed NetTraveler. Kaspersky’s team discovered that NetTraveler targeted over 350 high profile victims from 40 countries.
The name of the operation derives from the malicious code used in the attacks, the surveillance malware NetTraveler, according the security firm behind the cyber espionage campaign there are China-based hackers as written in the report published by Kaspersky, the security experts are convinced that the group of attackers is composed of around 50 individuals, many of them Chinese-speaking but with a good knowledge of the English.
The NetTraveler campaign has been running since 2004 targeting government institutions, energy companies as well as contractors and embassies. Despite the majority of infections was located in Mongolia, India and Russia also European countries were hit by the hackers, Germany, UK and Spain were mainly affected nations.
Just after the public exposure of the cyber espionage campaign the attackers shut down all known C&C to active new servers in China, Hong Kong and Taiwan.
The hackers behind NetTraveler are still active, a recent post on SecureList blog revealed that last week a new wave of spear-phishing e-mails were sent to multiple Uyghur activists exactly as occurred in the past.
The hackers have also differentiated their techniques of attack, adopting also a watering hole attack method, this strategy is very common especially when attackers intend to targets limited communities having common characteristics (e.g. Belonging to the same ethnic group, employees of the same company and so on).
Also for the watering hole attacks detected, the NetTraveler instances referred at the domain “wetstock[dot]org”, the majority appeared to be hijacked from the Uyghur-related website belonging to the “Islamic Association of Eastern Turkistan”.
The malicious mails contain a link to a page that appear to belong to the World Uyghur Congress website that in reality leads the victims to domain at “wetstock[dot]org” used by hackers to serve NetTraveler malware. The page loads and runs a Java applet named “new.jar” that hide an exploit for CVE-2013-2465 vulnerability recently fixed by Oracle in Java versions 5, 6 and 7 that allows remote attackers to compromise victim.
The jar file contains payload of the exploit in the file “file.tmp”, a NetTraveler backdoor dropper that results compiled on 2103 May 30th, standing to PE header timestamp. The command and control server for NetTraveler variant localized by Kaspersky specialists are hosted at IP 188.8.131.52 belonging to a machine located in the U.S., at “Multacom Corporation” and never used before as C&C for other malware.
The C&C server was operational at the time of publishing the results of the investigation, the server is still collecting the stolen data from victims.
The report provided by Kaspersky is the proof that NetTraveler APT is still ongoing, the attackers have improved their techniques combining traditional spear phishing with watering hole attack based on the Java exploit for CVE-2013-2465.
“It obviously has a higher success rate than mailing CVE-2012-0158 exploit-ridden documents, which was the favorite attack vector until now. We estimate that more recent exploits will be integrated and used against the group’s targets.”
The post closes with a precious suggestion for the readers to avoid this new wave attacks.
(Security Affairs – NetTraveler , Cyberespionage)