{"id":15117,"date":"2015-12-04T11:24:19","date_gmt":"2015-12-04T11:24:19","guid":{"rendered":"https:\/\/kasperskydaily.com\/b2b\/?p=4882"},"modified":"2020-12-23T12:02:55","modified_gmt":"2020-12-23T17:02:55","slug":"sofacy-apt","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/sofacy-apt\/15117\/","title":{"rendered":"Sofacy new waves: billowing with new tricks"},"content":{"rendered":"<p><em>Do you work with government or military contractors? Or are YOU the contractor? Then be warned: the Sofacy targeted attack actor has scaled up its activities \u2013 and may be interested in your data.<\/em><\/p>\n<p><a href=\"https:\/\/securelist.com\/blog\/research\/72924\/sofacy-apt-hits-high-profile-targets-with-updated-toolset\/\" target=\"_blank\" rel=\"noopener\">Sofacy<\/a> is a highly professional Russian-speaking threat actor, known for its daring attacks on government and military targets and active from circa 2008. Suspected of a connection with the notorious <a href=\"https:\/\/securelist.com\/blog\/incidents\/31112\/the-miniduke-mystery-pdf-0-day-government-spy-assembler-0x29a-micro-backdoor\/\" target=\"_blank\" rel=\"noopener\">Miniduke<\/a> actors, Sofacy has been notable for its extensive use of 0-day exploits. As attacks are highly dynamic and Sofacy constantly switches targets in search of new victims, it\u2019s almost impossible to predict who, or even where in the world, their next victims may be.<\/p>\n<p>In the past, we\u2019ve seen victims of Sofacy in countries including Ukraine, France, Greece, UK, Jordan and Belgium. The group also has a history of targeting military contractors who sell to multiple NATO-group and other countries.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>Sofacy new waves: billowing with new tricks #APT<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2FzcP5&amp;text=Sofacy+new+waves%3A+billowing+with+new+tricks+%23APT\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>This year, however, the plot of Sofacy\u2019s targeted attack development story has taken a new twist. The group has increased its activities almost tenfold \u2013 its activities providing a classic case study in just how far sophisticated attacks differ from the vast sea of \u2018mass-market\u2019 malware. True to their zero-day-wielding reputation, they used no fewer than five new exploits targeting Java, Flash and Microsoft Windows and Office.<\/p>\n<h2>New features \u2013 new problems<\/h2>\n<p>First, in July 2015, Sofacy\u2019s authors dropped two completely new exploits \u2013 Microsoft Office and Oracle Java 0-days. Then in August, during a new wave of attacks focused on military-related targets, they developed a brand new version of their first-level implant, dubbed AZZY, which specifically aimed at high-profile victims.<\/p>\n<p>With critical targets like these in their sites, <strong>attackers watch closely over<\/strong> their ongoing espionage <strong>operations, <\/strong>reacting at high speed and with deadly efficiency to each defensive action on the part of their victims. In this instance, the appropriate signature, once deployed, continued statically detecting the AZZY malware <strong>for only<\/strong> <strong>an hour or so <\/strong>before this attack method was dropped<strong>. \u00a0<\/strong>By then, the attackers, working at extremely high speed, had already compiled a second x64 backdoor \u2013 which naturally avoided further detection by the static signature. Kaspersky Lab\u2019s <strong>behavioristic System Watcher technology<a href=\"#_ftn1\" name=\"_ftnref1\" target=\"_blank\" rel=\"noopener\"><strong>[1]<\/strong><\/a>, <\/strong>however, detected this new sample version without too much trouble.<\/p>\n<p>Meanwhile, the extremely short time-lapse before the appearance of the new backdoor suggested that, rather than using an exploit, the backdoor was being downloaded by malware already residing in the targeted system. A further search proved this to be true.<\/p>\n<p>The new, previously unknown, malware was found in the shape of a .dll file residing in one of the target\u2019s hidden system directories. Just how this top-level malware was introduced into the target system remains unknown.<\/p>\n<p>To complicate things even further, another malware .dll was serving as a communication agent, interacting with the attackers\u2019 Command &amp; Control servers. This modularized approach allowed the attackers to reduce the chances of behavioral and even manual discovery.<\/p>\n<p>In addition, mindful of the air-gaps often employed by their targets to guard their secrets, the Sofacy actors developed a family of USBSTEALER modules. These would allow spying malware to communicate with its creators, its messages carried on USB portable storage devices through the guarded perimeter and into the outer world.<\/p>\n<p><img decoding=\"async\" class=\"aligncenter size-large wp-image-4885\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2017\/05\/06020255\/1.png\" alt=\"1\" width=\"1024\" height=\"1024\"><\/p>\n<h2>..but it\u2019s solvable<\/h2>\n<p>The Sofacy operation makes one thing very clear: a <strong>\u2018generic\u2019 approach<\/strong> to information security <strong>is definitely not enough<\/strong> against such agile attackers. As is so often demonstrated, the best defense against targeted attacks is a comprehensive strategy relying on a multi-layered security approach.<\/p>\n<p>Combining anti-malware technologies with patch management, Host-based Intrusion Prevention (HIPS) and ideally, allowlists and default-deny would significantly reduce the chances of a successful intrusion mounted in this way.<\/p>\n<p>While attack via USB storage is often considered outdated in the modern threat landscape, no one should underestimate the danger presented by these devices.<\/p>\n<p>The use of Device Control technology can limit the use of USB devices and prevent data from leaving the defensive perimeter \u2013 or attackers\u2019 own toolset components from reaching into or outside of air-gapped networks.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2015\/12\/06020416\/2-1024x1024.png\"><img decoding=\"async\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2015\/12\/06020416\/2-1024x1024.png\" alt=\"\" width=\"1024\" height=\"1024\" class=\"aligncenter size-full wp-image-15518\"><\/a><\/p>\n<p>Employing a number of small modules, each undertaking just one small part of the attack, in order to keep under the radar of the behavioral engine, is just one of a plethora of tricks. To significantly increase the chances of discovery, one needs a bird\u2019s eye view of activities occurring at different levels of IT infrastructure (including both network and endpoints) \u2013 and some way of identifying and correlating a number of seemingly innocuous separate events into a security alarm.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>Sofacy\u2019s new wave focuses primarily on military contractors #APT<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2FzcP5&amp;text=Sofacy%26%238217%3Bs+new+wave+focuses+primarily+on+military+contractors+%23APT\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>Kaspersky Lab\u2019s <a href=\"https:\/\/www.kaspersky.com\/enterprise-it-security\/anti-apt-solution\/\" target=\"_blank\" rel=\"noopener nofollow\">upcoming advanced threat detection solution<\/a> does exactly this, and more, providing a comprehensive and highly scalable platform for the analysis of events and objects throughout the whole IT network. It enables the timely detection of Targeted Attacks, however subtle the indicators might be.<\/p>\n<p>To further empower your defensive strategy, Kaspersky Lab also offers\u00a0a comprehensive portfolio of <a href=\"https:\/\/www.kaspersky.com\/enterprise-security\/intelligence-services\" target=\"_blank\" rel=\"noopener nofollow\">Intelligence Services<\/a>. This portfolio of services enables your Security Officers to strengthen multiple facets of your security, from calling upon our incident response expertise to boosting your overall security posture through applying our leading-edge intelligence.<\/p>\n<h2>Conclusion<\/h2>\n<p>Of course, such attacks are essentially a large enterprise issue. Sofacy\u2019s new wave focuses primarily on military contractors, who could theoretically provide entry points into the military itself. But do please be aware of new trends in the cybersecurity world, even your own business is not a large one and has no military customers. The chains by which attackers reach their targets can comprise many links, and smaller companies can sometimes have extremely valuable secrets.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2015\/12\/06020415\/3a-1024x1024.png\"><img decoding=\"async\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2015\/12\/06020415\/3a-1024x1024.png\" alt=\"\" width=\"1024\" height=\"1024\" class=\"aligncenter size-full wp-image-15519\"><\/a><\/p>\n<p>Known Sofacy samples are detected by Kaspersky Lab\u2019s solutions under the following verdicts:<\/p>\n<ul>\n<li>Win32.Sofacy.al<\/li>\n<li>Win32.Sofacy.be<\/li>\n<li>Win32.Sofacy.bf<\/li>\n<li>Win32.Sofacy.bg<\/li>\n<li>Win32.Sofacy.bi<\/li>\n<li>Win32.Sofacy.bj<\/li>\n<li>Win64.Sofacy.q<\/li>\n<li>Win64.Sofacy.s<\/li>\n<li>HEUR:Trojan.Win32.Generic<\/li>\n<\/ul>\n<p>The exploits are stopped with verdicts:<\/p>\n<ul>\n<li>PDM:Exploit.Java.Generic<\/li>\n<li>PDM:Exploit.Win32.Generic<\/li>\n<\/ul>\n<p><span class=\"embed-youtube\" style=\"text-align:center; display: block;\"><iframe class=\"youtube-player\" type=\"text\/html\" width=\"640\" height=\"390\" src=\"https:\/\/www.youtube.com\/embed\/FzPYGRO9LsA?version=3&amp;rel=1&amp;fs=1&amp;showsearch=0&amp;showinfo=1&amp;iv_load_policy=1&amp;wmode=transparent\" frameborder=\"0\" allowfullscreen=\"true\"><\/iframe><\/span><\/p>\n<p>____________<\/p>\n<p><a href=\"#_ftnref1\" name=\"_ftn1\" target=\"_blank\" rel=\"noopener\">[1]<\/a> System Watcher behavioral technology provides protection from unknown malware and Advanced Threats in all tiers of <a href=\"https:\/\/www.kaspersky.com\/business-security\/small-to-medium-business\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Endpoint Security for Business<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Do you work with government or military contractors? Or are YOU the contractor? Then be warned: the Sofacy targeted attack actor has scaled up its activities \u2013 and may be<\/p>\n","protected":false},"author":611,"featured_media":15517,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,3052],"tags":[499,2361],"class_list":{"0":"post-15117","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-apt","10":"tag-sofacy"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/sofacy-apt\/15117\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/sofacy-apt\/3370\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/sofacy-apt\/15117\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/sofacy-apt\/15117\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/apt\/","name":"APT"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/15117","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/611"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=15117"}],"version-history":[{"count":6,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/15117\/revisions"}],"predecessor-version":[{"id":38212,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/15117\/revisions\/38212"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/15517"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=15117"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=15117"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=15117"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}