The Comment Crew is back again, security experts suspect the involvement of the Chinese group of hackers in the cyber dispute between U.S. and China. In February The Mandiant Intelligence Center™ released an interesting report that revealed an enterprise-scale computer espionage campaign dubbed APT1. The term APT1 is referred to one of the numerous cyber espionage campaign that stole the major quantity of information all over the world. Various security firms had monitored the group during last years and report details its operations.
Senior researcher at FireEye. Alex Lanstein sustains that The Comment Crew is still working undercover after an apparent period of rest:
“They took a little breather, and they started back up,” he said.
Security researchers noted that after the intense activities observed early 2013 the group stopped using its infrastructures and suspended attack the previous targets. It was a wrong conviction, probably the hackers belonging to The Comment Crew group started new campaigns against new and old targets from different infrastructures.
“We didn’t see them take control of any of the systems they had previously compromised,” “They started fresh with a whole new round of attacks.” Lanstein revealed.
The Mandiant’s report blamed the Chinese military unit called “61398” for a series of cyber attacks that compromised 141 organizations in seven years. The Mandiant Intelligence Center identified a common pattern for the attacks originated from Chinese sources defining also a series of key indicators for identifying ongoing APT attacks.
The Comment Crew is in reality a group of state-sponsored hackers operating following an identified scheme, sharing tools and methods during the attacks that hit various organizations and companies with a cyber espionage purpose.
The researchers used to track malware campaigns analyzing tracks left by hackers including keyboard layouts and the presence of embedded fonts and abuse of bogus DNS (domain name system) registration details.
Lanstein continued the discussion evidencing that FireEye security firm discovered another curious proof during its investigation. The Comment Crew group left the name of their particular coding project, called “Moonclient,” in many instances of the malware detected. Lanstein commented on the forgetfulness of hackers with the following words:
“you are dealing with humans on the other side of the keyboard,” “This is a mistake made over and over again,”
FireEye kept this information secret to avoid allow its team to follow the Comment Crew but it seems now it seems they have changed tactics and malware.
“It’s more difficult to track them now,” Lanstein said.
FireEye has released today an interesting report titled “Digital Bread Crumbs: Seven Clues To Identifying Who’s Behind Advanced Cyber Attacks ” that explains how to conduct an investigation based on common errors committed by the hackers.
The document is based on the analysis of nearly 1,500 campaigns tracked by FireEye, the paper reported the results of the study on the common characteristics of various attack and the way to identify the hackers:
As highlighted in the report for a security firm and for the victims of the attacks it is fundamental to recognize the evidence of ongoing attack and the real origin of the offending. A targeted organization could use the knowledge on methods and objective of the attack for:
• Immediately shift resources to bolster vulnerable data
• Enlist additional help, whether internal resources or law enforcement
• More closely examine other vectors—possibly overlooked—that have been used by the attackers other campaigns
The cyber threats are events even more sophisticated, the attackers adopt complex techniques that evolve with time … it is necessary a smart defense based also on the study of principal campaigns.
(Security Affairs – Cyber espionage, Comment Crew)