Foreign affairs ministries of European nations were targeted by Chinese hackers with Syria-themed attacks around the time of the G20 meeting in Russia, which focused on the war-torn country.
The Ke3chang group has been operational since 2010, but only started targeting foreign affairs departments of European governments in August this year, researchers from security firm FireEye said.
Having gained access to one of the 23 command and control servers used by the hackers, the researchers discovered 21 infected machines, nine of which were based in governments from five different European nations. They have not revealed the names of nations that were successfully penetrated.
“The attackers have used three types of malware over the years and have traditionally targeted the aerospace, energy, government, high-tech, consulting services, and chemicals/manufacturing/mining sectors,” the FireEye report read.
“However, the number of attacks against entities in these sectors has been small. The scarcity of individual attacks may indicate the attackers are selective about their targets.”
To exploit their targets, the attackers used a Java zero-day vulnerability, and now-patched flaws in Microsoft Word and Adobe PDF Reader.
Back in 2011, the attackers used the theme of nude photos of the French prime minister’s wife, Carla Bruni, in their spear phishing attempts. Another campaign used information about the London Olympics as bait, and just after the event the attackers used a McAfee threat report as a lure.
FireEye said it believed the attackers were Chinese, as it appeared their control panel used Chinese characters, whilst when testing their malware it appeared they were using the Windows operating systems,with the default language set to Chinese.
“Attackers are able to successfully penetrate government targets using exploits for vulnerabilities that have already been patched and despite the fact that these ministries have defenses in place,” the report read.
“This illustrates the limitations of traditional defenses and highlights the need for security strategies that not only leverage advanced technologies designed to defend against targeted threats, but also the incorporation of threat intelligence and an incident response capability.”
Are you a security expert? Try our quiz!
Suspended prison sentence for Craig Wright for “flagrant breach” of court order, after his false…
Cash-strapped south American country agrees to sell or discontinue its national Bitcoin wallet after signing…
Google's change will allow advertisers to track customers' digital “fingerprints”, but UK data protection watchdog…
Welcome to Silicon In Focus Podcast: Tech in 2025! Join Steven Webb, UK Chief Technology…
European Commission publishes preliminary instructions to Apple on how to open up iOS to rivals,…
San Francisco jury finds Nima Momeni guilty of second-degree murder of Cash App founder Bob…