{"id":5165,"date":"2016-02-09T10:31:15","date_gmt":"2016-02-09T10:31:15","guid":{"rendered":"https:\/\/kasperskydaily.com\/b2b\/?p=5165"},"modified":"2020-02-26T11:05:22","modified_gmt":"2020-02-26T16:05:22","slug":"poseidon-apt","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/poseidon-apt\/5165\/","title":{"rendered":"A Touch of Artistry: Poseidon&#8217;s APT Boutique"},"content":{"rendered":"<p>Targeted attacks are visibly commoditizing, choosing cost efficiency over sophistication. If a combination of social engineering, tweaks to widely-available malware and legit apps can do the trick, why bother to create something original and exquisite?<\/p>\n<p>Nevertheless there remain true adepts \u2013 those who perceive every cyberespionage operation as another stage in the quest for ultimate perfection. And, given the long and successful careers of some, they have good reason to stick with their own way of working.<\/p>\n<h2>Artistic Blackmailers<\/h2>\n<p>The Poseidon cyberespionage group very much fits this description. \u00a0The group has been using state-of-the-art custom malware since 2005, at least, and there\u2019s data to suggest that some could have been prototyped as early as 2001. Different components of their toolsets appeared regularly on the radar of security companies, but were not recognized as part of a bigger picture. Throughout this period, Poseidon were meticulously tailoring their toolsets to ensure easy and silent entry and efficient data acquisition, in line with their patrons\u2019 requirements. This perfectionist, artisan approach, together with the group\u2019s known fascination with Greek mythology and their one-time abuse of a maritime satellite communications system, earned their operations the nickname \u2018Poseidon\u2019s APT Boutique\u2019.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>A Touch of Artistry: Poseidon\u2019s APT Boutique #PoseidonAPT<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2F29jw&amp;text=A+Touch+of+Artistry%3A+Poseidon%26%238217%3Bs+APT+Boutique+%23PoseidonAPT\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>Setting aside their artistic finesse, some aspects of their \u2018business model\u2019 looked distinctly ugly. Masquerading behind a front-end \u2018security company\u2019, they used harvested secrets to blackmail targets into accepting them as IT security contractors. Meanwhile, they either\u00a0retained an\u00a0illegitimate presence within the \u2018secured\u2019 system or, having completed the task agreed, quietly resumed their presence within the perimeter. They were known to refer to one element their business cycle as \u2018financial forcasting\u2019, giving an idea of the long-term benefit they anticipated from a prolonged systems presence. With their focus on Windows-based systems and extremely developed skills, they could theoretically embed themselves within the victim\u2019s IT system for years without being detected.<\/p>\n<p><img decoding=\"async\" class=\"aligncenter size-full wp-image-5168\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2016\/02\/06020436\/poseidon2.jpg\" alt=\"poseidon2\" width=\"1000\" height=\"662\"><\/p>\n<p>\u00a0<\/p>\n<h2>Great Art Demands Sacrifices<\/h2>\n<p>The Poseidon\u2019s targets have tended to be large Enterprises, mainly centering round Brazil, the US, France, Kazakhstan and Russia. There appears an interesting language limitation to English and Brazilian Portuguese based systems: even in countries with different national languages, the IT networks of multi-national corporations having these locales and\/or keyboard layouts were preferred as targets. Their sphere of interest has encompassed Energy and Utilities, Manufacturing \u2013 and also Media and PR. The latter two could obviously provide attackers with plenty of information for use as ammunition against additional future targets.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>The Poseidon\u2019s targets have tended to be large Enterprises #PoseidonAPT<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2F29jw&amp;text=The+Poseidon%26%238217%3Bs+targets+have+tended+to+be+large+Enterprises+%23PoseidonAPT\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<h2>Tools of the Artisan\u2019s Trade<\/h2>\n<p>To many an artisan eye, elegance and simplicity go hand by hand. The Poseidon group seem to embrace this principle. For initial penetration, they use no exploits; only well-crafted spear-phishing emails carrying DOC\/RTF files with encapsulated executables \u2013 an uncommon approach nowadays. To fool existing security solutions, they often sign these binaries with real certificates \u2013 issued for fake companies or even belonging to genuine well-respected and trusted organizations. Having successfully infecting their first victims, the collection of extensive data about the attacked infrastructure begins. Using this information, and ace Windows admin skills, the attackers can then move laterally without triggering any alarms, their next objective being to obtain Domain Admin rights. With this level of power, they can then purge the majority of their own tools from the network, retaining only those essential to their ongoing presence and data exfiltration.<\/p>\n<p>As already mentioned, in one series of operations Poseidon used ships\u2019 satellite communication systems as hiding places for their Command &amp; Control (C&amp;C) servers, a similar <a href=\"https:\/\/business.kaspersky.com\/satellite-turla\/4515\/\" target=\"_blank\" rel=\"noopener nofollow\">mechanism to that used by the Turla actor<\/a>. No attempts to repeat this feat have, however, been recorded.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2016\/02\/06020435\/Poseidon_satellite_cut-1-1024x742.png\"><img decoding=\"async\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2016\/02\/06020435\/Poseidon_satellite_cut-1-1024x742-1024x742.png\" alt=\"\" width=\"1024\" height=\"742\" class=\"aligncenter size-large wp-image-15467\"><\/a><\/p>\n<h2>What Can Be Done?<\/h2>\n<p>Despite all Poseidon\u2019s attempts to disguise and disperse the evidence, experts from Kaspersky Lab\u2019s Global Research and Analysis Team have succeeded in piecing all the disparate pieces of data into a complete picture. Still, the Poseidon group remains active, which brings us to the question of adequate defense.<\/p>\n<p>Of course protecting endpoints is a must \u2013 which, as the well-known <a href=\"https:\/\/encyclopedia.kaspersky.com\/knowledge\/strategies-for-mitigating-advanced-persistent-threats-apts\/?utm_source=kdaily&amp;utm_medium=blog&amp;utm_campaign=termin-explanation\" target=\"_blank\" rel=\"noopener\">ASD Mitigation Strategies<\/a> suggest, should comprise non-signature detection mechanisms, such as Heuristics and Behavioral Detection Algorithms. Possessing all these, <a href=\"https:\/\/www.kaspersky.com\/business-security\/endpoint-advanced\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Endpoint Security for Business<\/a> is powered by the same superior Security Intelligence that enabled our experts to piece together the previously insoluble Poseidon puzzle.\u00a0 Kaspersky Endpoint Security for Business also provides further proactive security layers \u2013 including Security Controls, HIPS and a built-in Application Firewall \u2013 \u00a0\u00a0all fed by real-time global intelligence from the Kaspersky Security Network. These layers erect further barriers in the path of malware, from blocking launch attempts to preventing access to critical system elements and communications with C&amp;C.<\/p>\n<p>The extent of information harvesting by the Poseidon group also highlights the benefits of Data Encryption throughout the whole corporate infrastructure, enforced by appropriate policies. The <a href=\"https:\/\/www.kaspersky.com\/business-security\/endpoint-advanced\" target=\"_blank\" rel=\"noopener nofollow\">Advanced<\/a> tier of Kaspersky Endpoint Security for Business includes easy-to-use Encryption Technology, managed through the same single-pane-of-glass console of Kaspersky Security Center as all platform elements.\u00a0 Of course, with spear-phishing as the penetration method of choice for the majority of Targated Attack groups, scanning email streams is also absolutely crucial nowadays. <a href=\"https:\/\/www.kaspersky.com\/business-security\/mail-server\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Security for Mail Servers<\/a> erects another powerful defensive wall in the attacker\u2019s way.<\/p>\n<p>All in all, Kaspersky Lab\u2019s portfolio of solutions helps implement 19 of ASD\u2019s 35 Mitigation Strategies, including 3 of \u00a0the \u2018top 4\u2019 which between them prevent 85% Targeted Attack-related incidents. But even if you use another vendor\u2019s solutions to protect your infrastructure, we can help. Kaspersky Lab\u2019s achievements as APT discoverers demonstrate that the presence even of such a stealthy and capable APT actor as Poseidon can be uncovered; that\u2019s what our <a href=\"https:\/\/www.kaspersky.com\/business-security\/entrp\/solutions\/security-intelligence-services\" target=\"_blank\" rel=\"noopener nofollow\">Targeted Attack Discovery<\/a> service is for<a href=\"#_ftn1\" name=\"_ftnref1\" target=\"_blank\" rel=\"noopener\">[1]<\/a>.<\/p>\n<p>Secrets are worth most when they\u2019re sold red hot. Perhaps it\u2019s time to prevent your organization from getting burned.<\/p>\n<p>For more about the Poseidon\u2019s APT Boutique, read the following <a href=\"https:\/\/securelist.com\/blog\/research\/73673\/poseidon-group-a-targeted-attack-boutique-specializing-in-global-cyber-espionage\/\" target=\"_blank\" rel=\"noopener\">blogpost on Securelist<\/a>.<\/p>\n<p>Kaspersky Lab products detect Poseidon malware under the following verdicts:<\/p>\n<p>Backdoor.Win32.Nhopro<\/p>\n<p>HEUR:Backdoor.Win32.Nhopro.gen<\/p>\n<p>HEUR:Hacktool.Win32.Nhopro.gen<\/p>\n<p>\u00a0<\/p>\n<p><a href=\"#_ftnref1\" name=\"_ftn1\" target=\"_blank\" rel=\"noopener\">[1]<\/a> Available only in a limited number of regions. To find out whether this is available in your region, please <a href=\"https:\/\/www.kaspersky.com\/enterprise-security\/intelligence-services\" target=\"_blank\" rel=\"noopener nofollow\">contact Kaspersky Lab manager<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Targeted attacks are visibly commoditizing, choosing cost efficiency over sophistication. If a combination of social engineering, tweaks to widely-available malware and legit apps can do the trick, why bother to create something original and exquisite?<\/p>\n","protected":false},"author":610,"featured_media":15465,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,3052],"tags":[2390,1410],"class_list":{"0":"post-5165","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-poseidonapt","10":"tag-sas-2016"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/poseidon-apt\/5165\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/poseidon-apt\/5165\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/poseidon-apt\/5165\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/poseidonapt\/","name":"PoseidonAPT"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/5165","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/610"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=5165"}],"version-history":[{"count":5,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/5165\/revisions"}],"predecessor-version":[{"id":33634,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/5165\/revisions\/33634"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/15465"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=5165"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=5165"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=5165"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}