News & Information for Technology Purchasers NewsFactor Sites:       NewsFactor.com     Enterprise Security Today     CRM Daily     Business Report     Sci-Tech Today  
   
Home Enterprise I.T. Cloud Computing Applications Hardware More Topics...
You are here: Home / Network Security / 'The Mask' Cyber-Spy Attacks Outed
DDoS Protection Powered By Verisign
Kaspersky Lab Outs 'The Mask' Cyber-Spy Attacks
Kaspersky Lab Outs 'The Mask' Cyber-Spy Attacks
By Jennifer LeClaire / NewsFactor Network Like this on Facebook Tweet this Link thison Linkedin Link this on Google Plus
PUBLISHED:
FEBRUARY
11
2014


“The Mask,” aka Careto, has been outed. Kaspersky Lab has discovered an advanced Spanish-language speaking threat actor that has been involved in global cyber-espionage operations since at least 2007. The Mask comes with a complex toolset, including highly sophisticated malware, a rootkit, bootkit, Mac OS X and Linux versions and possibly versions for Android and Apple iOS.

Kaspersky cited government institutions, diplomatic offices and embassies, energy, oil and gas companies, research organizations and activists as the primary targets. The firm found victims of the attacks in 31 countries, from the Middle East and Europe to Africa and the Americas.

The attackers' goal is to gather sensitive data from the infected systems, such as office documents, encryption keys, VPN configurations, SSH keys (serving as a means of identifying a user to an SSH server) and RDP files (used by the remote desktop client to automatically open a connection to the reserved computer), the firm said.

A Nation-State Sponsored Campaign?

If Kaspersky’s analysis is correct, an infection can be disastrous for victims. Careto intercepts all communication channels and collects the most vital information from the victim’s machine. One thing is certain, the firm said, detection can be difficult because of stealth rootkit capabilities, built-in functionalities and additional cyber-espionage modules.

“Several reasons make us believe this could be a nation-state-sponsored campaign. First of all, we observed a very high degree of professionalism in the operational procedures of the group behind this attack,” said Costin Raiu, director of the Global Research and Analysis Team (GReAT) at Kaspersky Lab.

“From infrastructure management, shutdown of the operation, avoiding curious eyes through access rules and using wiping instead of deletion of log files. These combine to put this APT ahead of Duqu in terms of sophistication, making it one of the most advanced threats at the moment. This level of operational security is not normal for cyber-criminal groups,” he said.

Security Analysts Disagree

According to Kaspersky Lab’s analysis report, here’s how it works: The Mask campaign relies on spear-phishing e-mails with links to a malicious Web site. The malicious Web site contains an exploit designed to infect the visitor, depending on system configuration. Upon successful infection, the malicious Web site redirects the user to the benign Web site referenced in the e-mail, which can be a YouTube movie or a news portal.

The exploit Web sites do not automatically infect visitors. Rather, the attackers host the exploits at specific folders on the Web site, which are not directly referenced anywhere, except in malicious e-mails, the firm said. Sometimes, the attackers use subdomains on the exploit Web sites, to make them seem more real. These subdomains simulate subsections of the main newspapers in Spain plus some international ones for instance, The Guardian and The Washington Post.

The malware intercepts all the communication channels and collects the most vital information from the infected system. Detection is extremely difficult because of stealth rootkit capabilities, Kaspersky said.

We asked Chester Wisniewski, a senior security advisor at Sophos, for his take on Mask. He told us while the malware certainly appears to have a sophistication to it that could indicate a nation-state was involved, he would hardly consider this targeted malware.

“Many of the samples were discovered and detected by antivirus for some time,” he said. “It is hard to believe that anyone serious about spying would run an operation this large and expect it to remain a secret.”

Tell Us What You Think
Comment:

Name:

Like Us on FacebookFollow Us on Twitter
TOP STORIES NOW
MAY BE OF INTEREST
Salesforce.com is the market and technology leader in Software-as-a-Service. Its award-winning CRM solution helps 82,400 customers worldwide manage and share business information over the Internet. Experience CRM success. Click here for a FREE 30-day trial.
MORE IN NETWORK SECURITY
Product Information and Resources for Technology You Can Use To Boost Your Business

Network Security Spotlight
Dairy Queen Latest Retailer To Report Hack
Dairy Queen is known for its hot fries and sweet treats, but it just made cyber history as the latest victim of a hack attack. The fast food chain said that customer data at some stores may be at risk.
 
Lessons from the JPMorgan Chase Cyberattack
JPMorgan Chase is investigating a likely cyberattack. The banking giant is cooperating with law enforcement, including the FBI, to understand what data hackers may have obtained.
 
Who Is the Hacker Group Lizard Squad?
Are they dangerous or just obnoxious? That’s what many are wondering about the hacker group Lizard Squad, which tweeted out a bomb threat that grounded a flight with a Sony exec aboard.
 

Enterprise Hardware Spotlight
HP Previews ProLiant Gen9 Data Center Servers
Because traditional data center and server architectures are “constraints” on businesses, HP is releasing new servers aimed at faster, simpler and more cost-effective delivery of computing services.
 
Apple Set To Release Largest iPad Ever
Tech giant Apple seems to have adopted the mantra “go big or go home.” The company is planning to introduce its largest iPad ever: a 12.9-inch behemoth that will dwarf its largest existing models.
 
Alert: HP Recalls 5 Million Notebook AC Power Cords
HP is recalling about 5.6 million notebook computer AC power cords in the U.S. and another 446,700 in Canada because of possible overheating, which can pose a fire and burn hazard.
 

Mobile Technology Spotlight
Apple Sets Sept. 9 Event: iPhone 6, iWatch on Tap?
Save the date. Apple formally announced that its long-anticipated “special event," will take place on September 9. Does the tech giant have the iPhone 6, and the iWatch up its sleeve?
 
Samsung's New Smart Watch Makes Calls Without Phone
Following up on the Gear 2, Samsung has unveiled a new 3G smart watch, the Gear S, that stands out in its ability to make phone calls and send text messages without a smartphone.
 
Apple Loses Bid To Block Sales of 9 Samsung Phones
A federal judge has rejected Apple's attempt to block the sale of several older Samsung smartphones that copied features in the iPhone, saying Apple hadn't proven the intellectual theft hurt sales.
 

Navigation
NewsFactor Network
Home/Top News | Enterprise I.T. | Cloud Computing | Applications | Hardware | Mobile Tech | Big Data | Communications
World Wide Web | Network Security | Data Storage | CRM Systems | Microsoft/Windows | Apple/Mac | Linux/Open Source | Personal Tech
Press Releases
NewsFactor Network Enterprise I.T. Sites
NewsFactor Technology News | Enterprise Security Today | CRM Daily

NewsFactor Business and Innovation Sites
Sci-Tech Today | NewsFactor Business Report

NewsFactor Services
FreeNewsFeed | Free Newsletters

About NewsFactor Network | How To Contact Us | Article Reprints | Careers @ NewsFactor | Services for PR Pros | Top Tech Wire | How To Advertise

Privacy Policy | Terms of Service
© Copyright 2000-2014 NewsFactor Network. All rights reserved. Article rating technology by Blogowogo. Member of Accuserve Ad Network.