{"id":16399,"date":"2019-09-24T10:45:17","date_gmt":"2019-09-24T18:45:17","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2019\/09\/24\/news-10140\/"},"modified":"2019-09-24T10:45:17","modified_gmt":"2019-09-24T18:45:17","slug":"news-10140","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2019\/09\/24\/news-10140\/","title":{"rendered":"All the Code Connections Between Russia\u2019s Hackers, Visualized"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/5d8964d9875aae000911ae53\/master\/pass\/security_russia_RTR3K4ZS.jpg\"\/><\/p>\n<p><strong>Credit to Author: Andy Greenberg| Date: Tue, 24 Sep 2019 13:00:00 +0000<\/strong><\/p>\n<p class=\"content-header__row content-header__dek\">A sort of constellation chart for Kremlin malware, made by two cybersecurity firms, demonstrates the scale of Russia&#39;s distinct hacking operations.<\/p>\n<p>Over the last half decade or so, Russia&#x27;s state-sponsored hackers have distinguished themselves as the most active, aggressive, and disruptive teams of online aggressors in the world. They&#x27;ve <a href=\"https:\/\/www.wired.com\/story\/russia-election-hacking-playbook\/\">meddled in elections<\/a>, <a href=\"https:\/\/www.wired.com\/story\/russian-hackers-attack-ukraine\/\">blacked out power grids<\/a>, <a href=\"https:\/\/www.wired.com\/2015\/09\/turla-russian-espionage-gang-hijacks-satellite-connections-to-steal-data\/\">innovated devious new forms of espionage<\/a>, <a href=\"https:\/\/www.wired.com\/story\/olympic-destroyer-malware-pyeongchang-opening-ceremony\/\">hacked the Olympics<\/a>, and <a href=\"https:\/\/www.wired.com\/story\/notpetya-cyberattack-ukraine-russia-code-crashed-the-world\/\">unleashed the most destructive worm in history<\/a>\u2014a list that makes even China&#x27;s cyberspies look like tame clerical workers by comparison. Now two cybersecurity firms have created a new visual taxonomy to organize all that digital chaos\u2014and in doing so, perhaps helped crystallize who the distinct players are within the Kremlin&#x27;s hacking forces.<\/p>\n<p>Two Israeli companies, Check Point and Intezer, today released the results of a broad analysis of code that&#x27;s been previously attributed to Russian state-sponsored hacking operations. The two firms pulled 2,500 samples from the malware database VirusTotal and used Intezer&#x27;s automated tools to comb those specimens for code matches or similarities, filtering out false positives like reuse of open source components. The result is a kind of constellation chart for every known Russia state hacking group&#x27;s tool kit, showing clusters that likely represent independent groups. &quot;The information has previously been really scattered. Now for the first time we have a one-stop shop for Russian APTs,&quot; says Yaniv Balmas, Check Point&#x27;s head of cyber research, using the acronym for &quot;advanced persistent threat,&quot; an industry term for sophisticated state hackers. &quot;You can look at this, and it\u2019s all there.&quot;<\/p>\n<p>The map&#x27;s largest clusters of connected nodes show tightly interlinked tools used by familiar Russian hacker groups\u2014from the hackers known as Sandworm (aka Telebots or BlackEnergy), which first rose to notoriety with <a href=\"https:\/\/www.wired.com\/story\/russian-hackers-attack-ukraine\/\">blackout attacks on the Ukrainian power grid<\/a>, to the Turla spying team that <a href=\"https:\/\/www.wired.com\/2015\/09\/turla-russian-espionage-gang-hijacks-satellite-connections-to-steal-data\/\">impressed researchers with tricks like bouncing its command-and-control connections through unwitting satellites<\/a>. (In some cases, it&#x27;s worth nothing, different code samples are attributed to a group on the map based on reporting that&#x27;s not related to code overlaps, such as shared infrastructure\u2014though those links are captured in the map&#x27;s key, not in its connected dots.)<\/p>\n<p>The map also illustrates a few unexpected\u2014or at least obscure\u2014code connections between Russian hacking teams. It shows, for instance, that the Sandworm group behind BlackEnergy shared code in one instance with another group known as Energetic Bear or Dragonfly, <a class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.symantec.com\/blogs\/threat-intelligence\/dragonfly-energy-sector-cyber-attacks&quot;}\" href=\"https:\/\/www.symantec.com\/blogs\/threat-intelligence\/dragonfly-energy-sector-cyber-attacks\" rel=\"nofollow noopener noreferrer\" target=\"_blank\">named by Symantec in 2017 as the group responsible for penetrations of US power grid networks<\/a>\u2014though Check Point and Intezer admit that the matching code, <a class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/securingtomorrow.mcafee.com\/other-blogs\/mcafee-labs\/operation-dragonfly-analysis-suggests-links-to-earlier-attacks\/&quot;}\" href=\"https:\/\/securingtomorrow.mcafee.com\/other-blogs\/mcafee-labs\/operation-dragonfly-analysis-suggests-links-to-earlier-attacks\/\" rel=\"nofollow noopener noreferrer\" target=\"_blank\">first spotted by McAfee<\/a>, may have come from a <a class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.c-plusplus.net\/forum\/topic\/157481\/selbstl%C3%B6schende-dll-m%C3%B6glich&quot;}\" href=\"https:\/\/www.c-plusplus.net\/forum\/topic\/157481\/selbstl%C3%B6schende-dll-m%C3%B6glich\" rel=\"nofollow noopener noreferrer\" target=\"_blank\">public source<\/a> rather than actual collaboration. A tool called X-Agent, used by the Fancy Bear hackers best known for attacking the Democratic National Committee and the Clinton campaign, shared some code with another spy group known as Potao, known for espionage operations against Ukraine and other former Soviet-bloc neighbors. More notable, the map shows that both BlackEnergy and the malware of a group known as Cozy Bear or APT29 used code that came from a credential-stealing tool called LdPinch. That may come as a surprise, given that BlackEnergy has been <a class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.ncsc.gov.uk\/news\/reckless-campaign-cyber-attacks-russian-military-intelligence-service-exposed&quot;}\" href=\"https:\/\/www.ncsc.gov.uk\/news\/reckless-campaign-cyber-attacks-russian-military-intelligence-service-exposed\" rel=\"nofollow noopener noreferrer\" target=\"_blank\">pinned on the Russian military intelligence agency known as the GRU<\/a> whereas Cozy Bear has been <a class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/uk.reuters.com\/article\/uk-usa-cyber-russia\/russians-impersonating-us-state-department-aide-in-hacking-campaign-researchers-idUKKCN1NL2BE&quot;}\" href=\"https:\/\/uk.reuters.com\/article\/uk-usa-cyber-russia\/russians-impersonating-us-state-department-aide-in-hacking-campaign-researchers-idUKKCN1NL2BE\" rel=\"nofollow noopener noreferrer\" target=\"_blank\">linked to the Russian foreign intelligence service, the SVR<\/a>. Those two agencies have been known to act independently and even as rivals\u2014such as when they were both discovered <a href=\"https:\/\/www.wired.com\/2016\/06\/hack-brief-russias-breach-dnc-trumps-dirt\/\">carrying out separate intrusions into the DNC&#x27;s network in 2016<\/a>.<\/p>\n<p>But more telling than those connections may be the relative <em>lack<\/em> of links between some distinct clusters of Russian hackers&#x27; code, according to Balmas. It suggests that several Russian teams are building entire tool kits\u2014from back doors and management tools to payloads\u2014without any apparent collaboration. And that disconnect shows just how sprawling the Kremlin&#x27;s hacking operations are, he says. &quot;I think the absence of connections can be interesting,&quot; adds Balmas. &quot;Rebuilding everything from the ground up takes a lot of time, effort, and resources. For me at least, that shows the huge amount of resources that Russia is willing to put into cyber offense.&quot;<\/p>\n<p>Those distinct operations also hint at the notoriously cutthroat competition between Russian intelligence services\u2014a competition that <a class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.pcmag.com\/news\/370107\/russian-intel-agencies-are-a-toxic-stew-of-competition-and-s&quot;}\" href=\"https:\/\/www.pcmag.com\/news\/370107\/russian-intel-agencies-are-a-toxic-stew-of-competition-and-s\" rel=\"nofollow noopener noreferrer\" target=\"_blank\">often drives them to outdo one another in brazen acts of information-stealing, disruption, and sabotage<\/a> as they vie for the Kremlin&#x27;s favor. Countries don&#x27;t build vast constellations of sophisticated, custom-made malware, after all, if they don&#x27;t intend to use them.<\/p>\n<p><a href=\"https:\/\/www.wired.com\/story\/russia-hacker-groups-map\" target=\"bwo\" >https:\/\/www.wired.com\/category\/security\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/5d8964d9875aae000911ae53\/master\/pass\/security_russia_RTR3K4ZS.jpg\"\/><\/p>\n<p><strong>Credit to Author: Andy Greenberg| Date: Tue, 24 Sep 2019 13:00:00 +0000<\/strong><\/p>\n<p>A sort of constellation chart for Kremlin malware, made by two cybersecurity firms, demonstrates the scale of Russia&#8217;s distinct hacking operations.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10607],"tags":[714,21358],"class_list":["post-16399","post","type-post","status-publish","format-standard","hentry","category-security","category-wired","tag-security","tag-security-cyberattacks-and-hacks"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/16399","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=16399"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/16399\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=16399"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=16399"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=16399"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}