{"id":3175,"date":"2013-08-13T10:00:25","date_gmt":"2013-08-13T14:00:25","guid":{"rendered":"http:\/\/blog.nccomputertech.com\/?p=3175"},"modified":"2013-08-13T10:00:25","modified_gmt":"2013-08-13T14:00:25","slug":"security-team-pries-open-secrets-of-chinese-hacker-gang","status":"publish","type":"post","link":"https:\/\/nccomputertech.com\/techtalk\/2013\/08\/13\/security-team-pries-open-secrets-of-chinese-hacker-gang\/","title":{"rendered":"Security team pries open secrets of Chinese hacker gang"},"content":{"rendered":"<section class=\"page\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignnone\" alt=\"\" src=\"https:\/\/i0.wp.com\/zapt5.staticworld.net\/images\/article\/2013\/04\/hacker_internet_web_attack-100033459-large.jpg?resize=580%2C461\" width=\"580\" height=\"461\" \/><br \/>\nA Chinese hacker gang whose malware <a href=\"http:\/\/www.pcworld.com\/article\/230119\/article.html?tk=rel_news\">targeted RSA<\/a> in 2011 infiltrated more than 100 companies and organizations, and was so eager to steal data that it probed a major teleconference developer to find new ways to spy on corporations, according to researchers.<br \/>\nThe <a href=\"http:\/\/www.pcworld.com\/article\/2014632\/xtreme-rat-malware-targets-us-uk-other-governments.html?tk=rel_news\">remote-access Trojan,<\/a> or RAT, tagged as &#8220;Comfoo&#8221; is largely inactive, said a pair of veteran researchers from Dell SecureWorks, who presented their findings at the recent Black Hat security conference.<br \/>\nBut their discoveries showed just how pervasively a <a href=\"http:\/\/www.pcworld.com\/article\/2039262\/chinese-hackers-resume-attacks-on-u-s-targets.html?tk=rel_news\">dedicated group of attackers<\/a> can infiltrate networks and walk away with secrets.<br \/>\n&#8220;We&#8217;re not seeing it used to the extent it was before,&#8221; said Joe Stewart, director of malware research at SecureWorks, in explaining why he and his college, Don Jackson, revealed their undercover campaign.<\/p>\n<h2>Digital stakeout<\/h2>\n<p>For more than 18 months, Stewart and Jackson, director of SecureWorks&#8217; Counter Threat Unit (CTU), secretly monitored some of the workings of Comfoo, which they believe was the work of a hacker crew they&#8217;ve named the Beijing Group. The gang is one of China&#8217;s top-two hacker organizations.<\/p>\n<figure class=\"right medium\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" alt=\"\" src=\"https:\/\/i0.wp.com\/images.techhive.com\/images\/article\/2013\/02\/identity_theft_hacker-100026919-medium.jpg?resize=300%2C200\" width=\"300\" height=\"200\" \/><figcaption><\/figcaption><\/figure>\n<p>To start, Stewart captured a sample of the malware used in <a href=\"http:\/\/www.pcworld.com\/article\/222522\/article.html?tk=rel_news\">the RSA attack,<\/a> which at the time was <a href=\"http:\/\/www.computerworld.com\/s\/article\/9218857\/Researcher_follows_RSA_hacking_trail_to_China\">attributed to Chinese hackers<\/a>, then reverse-engineered the encryption that the malware used to mask instructions to and from the gang&#8217;s command-and-control (C&amp;C) servers.<br \/>\nEventually, Stewart was able to spy on the hackers as they logged onto those C&amp;C servers. As they did, Stewart snatched the victims&#8217; MAC addresses\u2014unique identifiers for network hardware\u2014their IP, or &#8220;Internet protocol&#8221; addresses, and finally, a tag the hackers used to label each data-stealing campaign.<br \/>\nSecureWorks was not able to see what data the attackers were stealing, but their passive monitoring reaped dividends.<br \/>\n&#8220;We&#8217;ve done similar ops like this before,&#8221; said Stewart, &#8220;but with the custom stuff, you rarely get this kind of insight or this level of detail of the attacks and victims.&#8221;<\/p>\n<h2>Victims notified<\/h2>\n<p>SecureWorks said its stealthy stakeout\u2014which was intermittent to ensure that the hackers weren&#8217;t aware they were watching\u2014uncovered over 100 victims, more than 64 different campaigns and 200-plus Comfoo variants. The Atlanta-based security firm notified some of the victims directly, and others through CERTs, the computer emergency response teams that governments maintain.<br \/>\n&#8220;This was just a snapshot of the [total] victims,&#8221; Stewart cautioned.<br \/>\nThe hackers targeted a wide range of government agencies and ministries, private companies and trade organizations in fields as diverse as energy, media, semiconductors and telecommunications. They seemed eager to grab information from almost anywhere and anyone, although the victims were concentrated in Japan, India, South Korea, and the U.S.<br \/>\nBut one victim caught their attention.<br \/>\nWhile Stewart and Jackson declined to name any of the victims, they said one campaign had been aimed at a major videoconferencing software developer.<br \/>\nThey speculated that the attackers were sniffing through that company&#8217;s network for information on vulnerabilities in the software, which they could then exploit at other targets to put eyes and ears on confidential industry and government meetings. &#8220;They might be trying to leverage that access to spy on third parties,&#8221; said Stewart.<\/p>\n<h2>Unusual spy targets<\/h2>\n<figure class=\" large\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" alt=\"comfoo\" src=\"https:\/\/i0.wp.com\/images.techhive.com\/images\/article\/2013\/08\/comfoo-infections-100049688-large.jpg?resize=580%2C300\" width=\"580\" height=\"300\" \/><small class=\"credit\">SecureWorks<\/small><figcaption>SecureWorks&#8217; virtual stakeout pinpointed the physical location of many of the Comfoo C&amp;C servers. China was the hotspot.<\/figcaption><\/figure>\n<p>In a report SecureWorks published last week on Comfoo, the company said that targeting audio and videoconferencing products was &#8220;unusual.&#8221;<br \/>\nOther attacks may have had the same goal: Acquire inside information on everything from specialized security software to digital certificates for use in future campaigns.<br \/>\nSecureWorks&#8217; surveillance will also let security researchers better track the hacker gang, even though the cyber criminals have changed their malware tools since using Comfoo, and will undoubtedly do so again, said Jackson.<br \/>\n&#8220;It&#8217;s safe to assume that they&#8217;ll change their toolkits,&#8221; Jackson said. &#8220;But as long as the key features match, we should be able to match them [in the future] with campaigns.&#8221;<br \/>\nHacker gangs, Jackson added, have personalities and quirks, and can be &#8220;fingerprinted&#8221; by closely analyzing not only the malware they use, but also how they organize the C&amp;C infrastructure. &#8220;They all have patterns,&#8221; Jackson said.<br \/>\nAlthough he wouldn&#8217;t go into specifics, Jackson said that SecureWorks had already used the patterns found in the Comfoo campaigns to identify newer malware and attacks that the company believes is the work of the Beijing Group.<br \/>\n&#8220;As long as it&#8217;s evolutionary rather than revolutionary, we should be able to spot them,&#8221; Jackson said.<br \/>\nvia <a href=\"http:\/\/www.pcworld.com\/article\/2046356\/security-team-pries-open-secrets-of-chinese-hacker-gang.html\">PCWorld<\/a><br \/>\n<\/section>\n","protected":false},"excerpt":{"rendered":"<p>A Chinese hacker gang whose malware targeted RSA in 2011 infiltrated more than 100 companies and organizations, and was so [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[6,7],"tags":[342,453,655],"class_list":["post-3175","post","type-post","status-publish","format-standard","hentry","category-networking","category-security","tag-exploits","tag-hackers","tag-malware"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/papNkV-Pd","jetpack-related-posts":[{"id":9930,"url":"https:\/\/nccomputertech.com\/techtalk\/2025\/05\/16\/fbi-says-toss-your-old-router\/","url_meta":{"origin":3175,"position":0},"title":"FBI Says Toss Your Old Router","author":"NCCT","date":"May 16, 2025","format":false,"excerpt":"https:\/\/youtu.be\/scR199zRjvA On Security Now, Steve talks about the FBI's suggestion that we should be tossing out our old routers.","rel":"","context":"In &quot;Security&quot;","block_context":{"text":"Security","link":"https:\/\/nccomputertech.com\/techtalk\/category\/security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/img.youtube.com\/vi\/scR199zRjvA\/0.jpg?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":9655,"url":"https:\/\/nccomputertech.com\/techtalk\/2021\/03\/09\/fuquay-varina-and-holly-springs-computer-repair\/","url_meta":{"origin":3175,"position":1},"title":"Fuquay Varina and Holly Springs Computer Repair","author":"NCCT","date":"March 9, 2021","format":false,"excerpt":"Welcome to our blog. NC Computer Tech services Fuquay Varina, Holly Springs, and surrounding NC areas. We offer prompt, professional, courteous service with over twenty years of experience dealing with residential and small business clients offering them solutions and fixing their computer and network issues at reasonable rates. Our services\u2026","rel":"","context":"In &quot;Technology&quot;","block_context":{"text":"Technology","link":"https:\/\/nccomputertech.com\/techtalk\/category\/technology\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":9526,"url":"https:\/\/nccomputertech.com\/techtalk\/2019\/03\/03\/outrage-moms-this-week-in-tech-708\/","url_meta":{"origin":3175,"position":2},"title":"Outrage Moms &#8211; This Week in Tech 708","author":"NCCT","date":"March 3, 2019","format":false,"excerpt":"https:\/\/youtu.be\/rzRHMGNsnyI The end of smart-phones, AI fake people, Elon in the ditch again, and more. -- MWC 2019 and the Future of Smartphones and Wearables -- This Person Does Not Exist -- OpenAI and the Text Generator Too Dangerous to Exist -- Outrage Mobs and Twitter -- China's Social Credit\u2026","rel":"","context":"In &quot;Technology&quot;","block_context":{"text":"Technology","link":"https:\/\/nccomputertech.com\/techtalk\/category\/technology\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/img.youtube.com\/vi\/rzRHMGNsnyI\/0.jpg?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":9364,"url":"https:\/\/nccomputertech.com\/techtalk\/2018\/06\/03\/this-week-in-tech-669-15-minutes-of-fun\/","url_meta":{"origin":3175,"position":3},"title":"This Week in Tech 669: 15 Minutes of Fun","author":"NCCT","date":"June 3, 2018","format":false,"excerpt":"https:\/\/youtu.be\/KQc0YlNQNfY --Apple's WWDC this week looks like it may be a disappointment for anyone hoping for new hardware. --Facebook is killing its \"Trending Topics\" section. --Teens prefer Instagram and Snapchat to Facebook; close to half are \"almost constantly\" online. --The Atari VCS is coming soon for expensive retro gaming. --Scooters\u2026","rel":"","context":"In &quot;Apple&quot;","block_context":{"text":"Apple","link":"https:\/\/nccomputertech.com\/techtalk\/category\/apple\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/img.youtube.com\/vi\/KQc0YlNQNfY\/0.jpg?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":9389,"url":"https:\/\/nccomputertech.com\/techtalk\/2018\/08\/05\/this-week-in-tech-678-popcorn-and-brown-liquor\/","url_meta":{"origin":3175,"position":4},"title":"This Week in Tech 678: Popcorn and Brown Liquor","author":"NCCT","date":"August 5, 2018","format":false,"excerpt":"https:\/\/youtu.be\/nzryn9DScp0 This Week in Tech Trillion Dollar Apple, Facebook dating, Surface Go review, and more. --Apple is the first trillion dollar company ever. --Is Universal Basic Income the fix for poverty in America? --Alexa is Now the Ultimate in Home Security --Why you should avoid Chinese phones. --Facebook Dating is\u2026","rel":"","context":"In &quot;Apple&quot;","block_context":{"text":"Apple","link":"https:\/\/nccomputertech.com\/techtalk\/category\/apple\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/img.youtube.com\/vi\/nzryn9DScp0\/0.jpg?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":9405,"url":"https:\/\/nccomputertech.com\/techtalk\/2018\/10\/07\/odorless-and-weightless-hackers-this-week-in-tech-687\/","url_meta":{"origin":3175,"position":5},"title":"Odorless and Weightless Hackers &#8211; This Week in Tech 687","author":"NCCT","date":"October 7, 2018","format":false,"excerpt":"https:\/\/youtu.be\/lb4rnqfNdas Chinese Spy Chips, Microsoft Highs and Lows, Pixel 3 Event Predictions, and More! Bloomberg reports that China used tiny chips to spy on Apple, Amazon, and the US government. Apple and Amazon deny it. How do we know who is right? All the news from the Microsoft Surface event,\u2026","rel":"","context":"In &quot;Apple&quot;","block_context":{"text":"Apple","link":"https:\/\/nccomputertech.com\/techtalk\/category\/apple\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/img.youtube.com\/vi\/lb4rnqfNdas\/0.jpg?resize=350%2C200","width":350,"height":200},"classes":[]}],"_links":{"self":[{"href":"https:\/\/nccomputertech.com\/techtalk\/wp-json\/wp\/v2\/posts\/3175","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nccomputertech.com\/techtalk\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nccomputertech.com\/techtalk\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nccomputertech.com\/techtalk\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/nccomputertech.com\/techtalk\/wp-json\/wp\/v2\/comments?post=3175"}],"version-history":[{"count":0,"href":"https:\/\/nccomputertech.com\/techtalk\/wp-json\/wp\/v2\/posts\/3175\/revisions"}],"wp:attachment":[{"href":"https:\/\/nccomputertech.com\/techtalk\/wp-json\/wp\/v2\/media?parent=3175"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nccomputertech.com\/techtalk\/wp-json\/wp\/v2\/categories?post=3175"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nccomputertech.com\/techtalk\/wp-json\/wp\/v2\/tags?post=3175"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}