Clues point to Russia in long-running spying campaign

'APT28' has predominantly focused on targets of interest to Russia, FireEye said

Russia is likely behind a long-running computer spying campaign, although the stealthy attacks leave fewer clues than other state-sponsored attacks, according to a new report from FireEye.

FireEye calls the group APT28, which is short for "advanced persistent threat," a nomenclature the company's Mandiant division has used to classify attacks its analysts believe come from a distinct group.

APT has been active for at least six years. It tends to focus on targets that would be of interest to Russia, such as the Caucasus region with a focus on Georgia and European governments, militaries and security organizations.

But Russian activity in cyberspace is harder to track, and FireEye's attribution of attacks by APT28 are based an analysis of the malicious code and timing.

For example, FireEye's report says that more than half of the malicious files it analyzed were set to Russian language settings, which suggests "that a significant portion of APT28 malware was compiled in a Russian-language build environment consistently over the course of six years."

Also, 96 percent of the malware was compiled between a Monday and Friday during an 8 AM to 6 PM work day in the Moscow time zone.

FireEye's Mandiant branch is well-known for describing in early 2013 what it contended was a state-sponsored hacking program run by a unit of China's People's Liberation Army in Shanghai in a report that included photos of the building where it allegedly operates.

In May, the U.S. Department of Justice charged five members of the People's Liberation Army with stealing trade secrets from U.S. companies, including some of those identified by nicknames in Mandiant's report.

With Russia, "we dont have pictures of a building, personas to reveal, or a government agency to name, what we do have is evidence of long-standing, focused operations that indicate a government sponsor specifically, a government based in Moscow," FireEye's report said.

APT28 targets its victims with spearphishing emails, which try to convince people to open a file or follow a link, which could result in a malware infection.

Some of the common tools that APT28 tries to install on computers include Sourface, also called Sofacy, a downloader; Eviltoss, a backdoor used for running shellcode and stealing credentials; and Chopstick, which FireEye describes as a "modular implant."

The tools used by APT28, especially Chopstick, "demonstrate formal coding practices indicative of methodical, diligent programmers," FireEye wrote.

Eviltoss, for example, uploads an RSA public key that encrypts stolen data. Some variants of Eviltoss send the pilfered data over SMTP (simple mail transfer protocol) in an attachment, which goes out through the victim's mail server.

"APT28 is most likely supported by a group of developers creating tools intended for long-term use and versatility, who make an effort to obfuscate their activity," it wrote. "This suggests that APT28 receives direct ongoing financial and other resources from a well-established organization, most likely a nation state government."

Send news tips and comments to jeremy_kirk@idg.com. Follow me on Twitter: @jeremy_kirk

Join the newsletter!

Or

Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.

Tags malwareFireEyeExploits / vulnerabilities

Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Jeremy Kirk

IDG News Service
Show Comments

Brand Post

Most Popular Reviews

Latest Articles

Resources

PCW Evaluation Team

Luke Hill

MSI GT75 TITAN

I need power and lots of it. As a Front End Web developer anything less just won’t cut it which is why the MSI GT75 is an outstanding laptop for me. It’s a sleek and futuristic looking, high quality, beast that has a touch of sci-fi flare about it.

Emily Tyson

MSI GE63 Raider

If you’re looking to invest in your next work horse laptop for work or home use, you can’t go wrong with the MSI GE63.

Laura Johnston

MSI GS65 Stealth Thin

If you can afford the price tag, it is well worth the money. It out performs any other laptop I have tried for gaming, and the transportable design and incredible display also make it ideal for work.

Andrew Teoh

Brother MFC-L9570CDW Multifunction Printer

Touch screen visibility and operation was great and easy to navigate. Each menu and sub-menu was in an understandable order and category

Louise Coady

Brother MFC-L9570CDW Multifunction Printer

The printer was convenient, produced clear and vibrant images and was very easy to use

Edwina Hargreaves

WD My Cloud Home

I would recommend this device for families and small businesses who want one safe place to store all their important digital content and a way to easily share it with friends, family, business partners, or customers.

Featured Content

Product Launch Showcase

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?