Critical.
Authoritative.
Strategic.
Subscribe to CIO Magazine »

Report about hack threat to Tibetan activists used as lure in attack against them

Hackers trick Tibetan activists into visiting exploit pages by baiting them with a legitimate report from AlienVault

Hackers are using a recent report about cyberthreats to Tibetan activists as a lure in a new attack against pro-Tibet organizations that distributes Windows and Mac malware, researchers from security vendor AlienVault said on Monday.

On March 13, AlienVault published a report about email-based cyberattacks against Tibetan activist organizations including the Central Tibet Administration and the International Campaign for Tibet.

The rogue emails seen in those attacks distributed a booby-trapped Word document that exploited a Microsoft Office vulnerability (designated CVE-2010-3333) to install a variant of Gh0st RAT, a remote access computer Trojan.

AlienVault researchers believe that the Tibet attack campaign was organized by the same group of Chinese hackers that launched the so-called Nitro attacks against dozens of chemical sector companies last year.

However, it seems that even though the cyberespionage operation was exposed, hackers haven't given up on targeting pro-Tibet organizations. In fact, they started using AlienVault's report about the campaign as a lure in new attacks against Tibetan activists, said AlienVault researcher Jaime Blasco in a blog post on Monday.

Newly intercepted rogue emails that use spoofed headers to appear as originating from AlienVault warn recipients that Tibetan activist organizations have been targeted in recent cyberattacks.

The emails contain a "more information" link that leads visitors to a Web page displaying a copy of AlienVault's March 13 report. However, hidden JavaScript code present on the page launches exploits a known Java vulnerability (CVE-2011-3544) in the background, Blasco said.

Successful exploitation attempts result in computer backdoors being installed on both Windows and Mac OS X systems. The Mac backdoor had a zero detection rate on VirusTotal when scanned by AlienVault on Monday, Blasco said. Now, it is detected by six out of the 43 antivirus engines used by the service.

The Mac piece of malware connects to a command and control server hosted on a domain name that was associated in the past with attacks involving the Protux backdoor, Blasco said.

It's not clear whether the Nitro gang is responsible for the new attacks against Tibetan activists, but the group is known to have used similar techniques before. In December 2011, Symantec reported a series of malicious emails sent by the Nitro gang that used the company's original report about the group's operations as a lure.

CVE-2011-3544 exploits have been observed in many targeted attacks during the past month. Last Friday, Kaspersky Lab reported the same vulnerability being exploited in an attack against visitors to popular Russian news websites.

Microsoft also reported a spike in the usage of CVE-2011-3544 exploits, even though they have not been incorporated in popular drive-by download toolkits like Blackhole or Phoenix yet. Users are advised to update their Java installations and remove older versions from their systems in order to thwart attacks that leverage this vulnerability, Microsoft researchers said in a blog post on Tuesday.

Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.

More about: Kaspersky, Kaspersky Lab, Microsoft, Phoenix, Symantec
References show all
Comments are now closed.
Related Whitepapers
Latest Stories
Community Comments
Latest Blog Posts
Whitepapers
  • Swiss Nuclear Power Plant Improves Business Continuity
    Learn how Kernkraftwerk Leibstadt (KKL), a Swiss nuclear power plant, achieved 95% virtualization with 50% fewer servers in just two months by implementing a Vblock System. The solution ensures that KKL can reliably deliver the continuous electricity supply safely and cost effectively.
    Learn more »
  • Stop Paying the Earth for Global Roaming
    Why do we continue to pay the earth for global roaming? With Telstra increasing global roaming charges by 100-500% in over 180 countries, bill shock can only get worse. This paper investigates why, what and how your company can address the need for global coverage.
    Learn more »
  • Case Study: Steel Blue
    Read how Perth-based safety footwear manufacturer, Steel Blue, was able to cut costs with shipping and improve efficiency while meeting the growing demand for their products as they expanded their national and export markets and increased their local market share, all thanks to a new ERP system.
    Learn more »
All whitepapers
rhs_login_lockGet exclusive access to Invitation only events CIO, reports & analysis.
Salary Calculator

Supplied by

View the full Peoplebank ICT Salary & Employment Index

Recent comments

Computerworld
ARN
Techworld
CMO