'Clandestine Fox' hackers win over energy employee in strategy change

The group, known to use zero-day exploits, mounted a social engineering campaign against an energy company employee

A hard-to-tracking hacking group, known to use zero-day attacks, changed tack to use social media in an attempt to compromise an employee of an energy company, according to new research from FireEye.

FireEye declined to say who conducted the attack other than it was the same group that ran a campaign it dubbed "Operation Clandestine Fox," which it described in April and early May. It also did not identify where the employee works.

FireEye's subsidiary, Mandiant, is notable for outing in February 2013 a Shanghai-based Chinese Army signals intelligence branch, Unit 61398, which it said in a report was responsible for running wide-ranging hacking campaigns against U.S. industry. It called the group APT1, short for Advanced Persistent Threat.

Last month, U.S. prosecutors filed an unprecedented criminal indictment against five members of the unit, alleging they stole intellectual property and, in some cases, gave it to Chinese companies. China fumed and denied the accusations.

FireEye's latest research describes how an attacker, which it nicknamed "Emily," courted the energy employee's colleagues on a social network. She peppered them with probing questions, such as the name of the IT manager for the company and what type of software they ran, according to Mike Scott, a senior threat analyst at FireEye.

Eventually, Emily contacted the employee via the social network and the two corresponded for three weeks. She eventually sent him her resume in a ".rar" archive to his personal email address.

The archive file had a PDF of her resume but also a malicious version of TTCalc, which is an open source calculator. When executed, the malicious TTCalc installed a benign version of itself but also slipped a backdoor onto the computer.

The attack is different from other campaigns by the group in that this required tricking the victim. In the past, the group has relied on a number of browser-based zero-day exploits, or attacks that take advantage of a software vulnerability, which often require little user interaction aside from navigating to a malicious web page.

FireEye linked this attack to previous ones because the attackers utilized a domain name it had used in the past as part of its command-and-control structure. That was perhaps a glaring error on the part of the attackers, as FireEye had noted in a previous blog post that the group typically does "not reuse command and control infrastructure."

Send news tips and comments to jeremy_kirk@idg.com. Follow me on Twitter: @jeremy_kirk

Join the newsletter!

Or

Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.

Tags malwareFireEyeExploits / vulnerabilities

Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Jeremy Kirk

IDG News Service
Show Comments

Cool Tech

Bang and Olufsen Beosound Stage - Dolby Atmos Soundbar

Learn more >

Toys for Boys

Sony WF-1000XM3 Wireless Noise Cancelling Headphones

Learn more >

Nakamichi Delta 100 3-Way Hi Fi Speaker System

Learn more >

ASUS ROG, ACRONYM partner for Special Edition Zephyrus G14

Learn more >

Family Friendly

Philips Sonicare Diamond Clean 9000 Toothbrush

Learn more >

Mario Kart Live: Home Circuit for Nintendo Switch

Learn more >

Stocking Stuffer

SunnyBunny Snowflakes 20 LED Solar Powered Fairy String

Learn more >

Teac 7 inch Swivel Screen Portable DVD Player

Learn more >

Christmas Gift Guide

Click for more ›

Most Popular Reviews

Latest Articles

Resources

PCW Evaluation Team

Tom Pope

Dynabook Portégé X30L-G

Ultimately this laptop has achieved everything I would hope for in a laptop for work, while fitting that into a form factor and weight that is remarkable.

Tom Sellers

MSI P65

This smart laptop was enjoyable to use and great to work on – creating content was super simple.

Lolita Wang

MSI GT76

It really doesn’t get more “gaming laptop” than this.

Jack Jeffries

MSI GS75

As the Maserati or BMW of laptops, it would fit perfectly in the hands of a professional needing firepower under the hood, sophistication and class on the surface, and gaming prowess (sports mode if you will) in between.

Taylor Carr

MSI PS63

The MSI PS63 is an amazing laptop and I would definitely consider buying one in the future.

Christopher Low

Brother RJ-4230B

This small mobile printer is exactly what I need for invoicing and other jobs such as sending fellow tradesman details or step-by-step instructions that I can easily print off from my phone or the Web.

Featured Content

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?