Attacks/Breaches

11/9/2017
09:07 AM
Connect Directly
Twitter
LinkedIn
RSS
E-Mail
50%
50%

OceanLotus APT Group Unfolds New Tactic in Cyber Espionage Campaign

The group has begun using compromised websites to profile and target entities of interest to the Vietnamese government, Volexity says.

OceanLotus, an APT actor that over the past few years has been conducting a sophisticated digital surveillance campaign aligned with Vietnamese state interests, has built out a massive attack infrastructure of compromised websites.

Security vendor Volexity, which has been tracking OceanLotus for sometime, says it has recently observed the group using a network of compromised websites in the region to profile victims and gather intelligence from them. The compromised websites appear to have been chosen specifically because their visitors have a higher likelihood of being people of interest to the Vietnamese government, the company said in an advisory this week.

OceanLotus, aka APT32, has compromised over 100 websites, the vast majority of which belong to organizations and individuals critical of the government in Vietnam. The remaining websites belong to entities in countries that share a land border with Vietnam, Volexity said. Among the list of compromised websites are those that belong to entities with links to government, military, civil society, human rights, and the media.

"This is the first time they have been noted leveraging strategic Web compromises to profile and target website visitors," says Steven Adair, president of Volexity and one of the authors of the report. "OceanLotus attackers [have] compromised a fairly significant number of websites to pull off a widespread profiling and tracking campaign." 

The use of compromised websites to lure victims is a new development for OceanLotus and shows how sophisticated threat actors manage to stay a step ahead of defenders by constantly switching tactics.

The group has been operational since at least 2014 and has been associated with a string of attacks on entities of interest to Vietnam including the media, civil and, social rights groups as well as members of the Association of Southeast Nations (ASEAN).

In a report this May, FireEye described the APT32 group's activities as targeting foreign companies with interests in Vietnam's consumer goods, manufacturing, and hospital sectors. Also in the group's crosshairs are organizations in the technology infrastructure and network security segments.  According to FireEye, known victims of the APT32 group include a European company constructing a manufacturing facility in Vietnam, a global hospitality industry developer with plans to develop in Vietnam, and several organizations in the banking and media industries.

In these previous attacks, OceanLotus used spear phishing and other social engineering methods to lure victims into downloading and enabling sophisticated data-stealing malware on their systems. The lures were often multilingual, and tailored to specific victims.

It is only in recent months that OceanLotus has begun using compromised websites as lures to identify potential victims and to plant malware for stealing data on their systems. In most cases, the group has been compromising websites by either gaining direct access to the site's content management systems (CMS) using legitimate user credentials, or by exploiting outdated plugins on these sites. Volexity said it has not, however, been able to identify how OceanLotus actors are obtaining the credentials for the CMS systems in the first place.

Once a website has been compromised, OceanLotus has used different methods to identify site visitors and drop different payloads on their systems. The attackers have been delivering payloads for snooping and data-stealing only to those they identify as potential targets, not every website visitor. The payloads included custom Google apps designed to gain access to the victim's Gmail account and steal their contact list. The attackers have also created numerous websites disguised as sites belonging to Facebook Google, Cloudflare, and others for serving malware.

"In the case of targeting specific organizations, we believe they examined the IP address WHOIS information to identify the organization," Adair says.  "Once they know their IP address space, they place it on a whitelist for targeting." 

In addition to building out a big network of compromised websites to stage and deliver malware to selected victims, OceanLotus has also managed to build a massive backend infrastructure to facilitate its core data collection activities. Interestingly, a substantial portion of the attack infrastructure that OceanLotus has been using is located in the United States. "A successful large-scale attack of this magnitude takes quite a bit of effort and is nearly unparalleled," Adair says.

Steve Ginty, senior product manager at threat management firm RiskIQ says his company's analysis of data associated with OceanLotus' activities shows that the group has been compromising regional Web pages since at least Feb. 2016. "The group did a good job of mimicking legitimate infrastructure, registering typo-squatting domains of legitimate services and cookies," he says.

Related Content:

 

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
What We Talk About When We Talk About Risk
Jack Jones, Chairman, FAIR Institute,  7/11/2018
Ticketmaster Breach Part of Massive Payment Card Hacking Campaign
Jai Vijayan, Freelance writer,  7/10/2018
7 Ways to Keep DNS Safe
Curtis Franklin Jr., Senior Editor at Dark Reading,  7/10/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Locked device, Ha! I knew there was another way in.
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-15137
PUBLISHED: 2018-07-16
The OpenShift image import whitelist failed to enforce restrictions correctly when running commands such as "oc tag", for example. This could allow a user with access to OpenShift to run images from registries that should not be allowed.
CVE-2017-17541
PUBLISHED: 2018-07-16
A Cross-site Scripting (XSS) vulnerability in Fortinet FortiManager 6.0.0, 5.6.4 and below versions, FortiAnalyzer 6.0.0, 5.6.4 and below versions allows inject Javascript code and HTML tags through the CN value of CA and CRL certificates via the import CA and CRL certificates feature.
CVE-2018-1046
PUBLISHED: 2018-07-16
pdns before version 4.1.2 is vulnerable to a buffer overflow in dnsreplay. In the dnsreplay tool provided with PowerDNS Authoritative, replaying a specially crafted PCAP file can trigger a stack-based buffer overflow, leading to a crash and potentially arbitrary code execution. This buffer overflow ...
CVE-2018-10840
PUBLISHED: 2018-07-16
Linux kernel is vulnerable to a heap-based buffer overflow in the fs/ext4/xattr.c:ext4_xattr_set_entry() function. An attacker could exploit this by operating on a mounted crafted ext4 image.
CVE-2018-10857
PUBLISHED: 2018-07-16
git-annex is vulnerable to a private data exposure and exfiltration attack. It could expose the content of files located outside the git-annex repository, or content from a private web server on localhost or the LAN.