Hacker group targets video game companies to steal source code

The group has ties to the Chinese hacker underground and uses custom tools to attack companies, researchers from Dell SecureWorks said

A group of attackers with links to the Chinese hacking underground has been targeting companies from the entertainment and video game industries for years with the goal of stealing source code.

The stolen intellectual property is used to "crack" games so they can be used for free, to create game cheating tools or to develop competing products, security researchers from Dell SecureWorks said in an analysis of the group's activities.

Dell SecureWorks tracks the hacker group as Threat Group-3279 (TG-3279) and believes it has been active since at least 2009.

Information gathered by the company's researchers while investigating compromises at affected firms suggests that the attack group uses a variety of tools for reconnaissance and persistent access on systems, some of which were developed by members of the group. These tools include an extensible remote access Trojan (RAT) program called Conpee and a rootkit called Etso for hiding network and file activity.

Other custom tools and scripts that can indicate a TG-3279 compromise, according to Dell SecureWorks, include: a system profiling tool called gsi.exe; a tool for loading PE (portable executable) files called Runxx; a SYN port scanner called "s;" a PHP SQL injection script called sqlin.php; a script for enumerating DNS entries called dnsenum.py; a RDP (remote desktop protocol) brute-force tool called rdp_crk; and a reverse shell for Windows systems called icmp_shell.

Some of the programs installed on compromised systems are signed with a digital certificate, likely stolen, that was issued to a Chinese technology company. The certificate was revoked in August 2012, but systems that don't have an updated certificate revocation list (CRL) might still see it as valid.

The TG-3279 attackers research their targets in advance using publicly available sources of information and through network scans. The Dell SecureWorks researchers don't have evidence to suggest that the group is using automated exploits packaged with malware and believe that the attackers rely primarily on manual, "hands-on-keyboard" exploitation.

After penetrating an organization's defenses, the attackers attempt to compromise computers and credentials used by network and system administrators in order to gain extensive access to the organization's network and file repositories.

Dell SecureWorks has identified two malware developers using the online personas Sincoder and Laurentiu Moon, who are believed to be associated with TG-3279. Both of them are also members of the China Cracking Group, an online community of hackers that work to bypass software digital rights management (DRM) mechanisms and have a focus on video games.

There is also strong, but not definitive, evidence to suggest a link between TG-3279 and Winnti, another hacker group with Chinese origins that has been known to target the online video game industry. The Winnti group's attacks were documented by researchers from Kaspersky Lab in April 2013.

Join the newsletter!

Error: Please check your email address.
Rocket to Success - Your 10 Tips for Smarter ERP System Selection

Tags intrusionDell SecureWorkssecurityspywaremalwarekaspersky lab

Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Lucian Constantin

IDG News Service
Show Comments

Most Popular Reviews

Latest Articles

Resources

PCW Evaluation Team

Sarah Ieroianni

Brother QL-820NWB Professional Label Printer

The print quality also does not disappoint, it’s clear, bold, doesn’t smudge and the text is perfectly sized.

Ratchada Dunn

Sharp PN-40TC1 Huddle Board

The Huddle Board’s built in program; Sharp Touch Viewing software allows us to easily manipulate and edit our documents (jpegs and PDFs) all at the same time on the dashboard.

George Khoury

Sharp PN-40TC1 Huddle Board

The biggest perks for me would be that it comes with easy to use and comprehensive programs that make the collaboration process a whole lot more intuitive and organic

David Coyle

Brother PocketJet PJ-773 A4 Portable Thermal Printer

I rate the printer as a 5 out of 5 stars as it has been able to fit seamlessly into my busy and mobile lifestyle.

Kurt Hegetschweiler

Brother PocketJet PJ-773 A4 Portable Thermal Printer

It’s perfect for mobile workers. Just take it out — it’s small enough to sit anywhere — turn it on, load a sheet of paper, and start printing.

Matthew Stivala

HP OfficeJet 250 Mobile Printer

The HP OfficeJet 250 Mobile Printer is a great device that fits perfectly into my fast paced and mobile lifestyle. My first impression of the printer itself was how incredibly compact and sleek the device was.

Featured Content

Latest Jobs

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?