European Foreign Ministries Breached By Chinese Hackers

Foreign affairs ministries of European nations were targeted by Chinese hackers with Syria-themed attacks around the time of the G20 meeting in Russia, which focused on the war-torn country.

The Ke3chang group has been operational since 2010, but only started targeting foreign affairs departments of European governments in August this year, researchers from security firm FireEye said.

Having gained access to one of the 23 command and control servers used by the hackers, the researchers discovered 21 infected machines, nine of which were based in governments from five different European nations. They have not revealed the names of nations that were successfully penetrated.

Hackers compromise government networks

“The attackers have used three types of malware over the years and have traditionally targeted the aerospace, energy, government, high-tech, consulting services, and chemicals/manufacturing/mining sectors,” the FireEye report read.

“However, the number of attacks against entities in these sectors has been small. The scarcity of individual attacks may indicate the attackers are selective about their targets.”

To exploit their targets, the attackers used a Java zero-day vulnerability, and now-patched flaws in Microsoft Word and Adobe PDF Reader.

Back in 2011, the attackers used the theme of nude photos of the French prime minister’s wife, Carla Bruni, in their spear phishing attempts. Another campaign used information about the London Olympics as bait, and just after the event the attackers used a McAfee threat report as a lure.

FireEye said it believed the attackers were Chinese, as it appeared their control panel used Chinese characters, whilst  when testing their malware it appeared they were using the Windows operating systems,with the default language set to Chinese.

“Attackers are able to successfully penetrate government targets using exploits for vulnerabilities that have already been patched and despite the fact that these ministries have defenses in place,” the report read.

“This illustrates the limitations of traditional defenses and highlights the need for security strategies that not only leverage advanced technologies designed to defend against targeted threats, but also the incorporation of threat intelligence and an incident response capability.”

Are you a security expert? Try our quiz!

Thomas Brewster

Tom Brewster is TechWeek Europe's Security Correspondent. He has also been named BT Information Security Journalist of the Year in 2012 and 2013.

Recent Posts

Craig Wright Sentenced For Contempt Of Court

Suspended prison sentence for Craig Wright for “flagrant breach” of court order, after his false…

2 days ago

El Salvador To Sell Or Discontinue Bitcoin Wallet, After IMF Deal

Cash-strapped south American country agrees to sell or discontinue its national Bitcoin wallet after signing…

2 days ago

UK’s ICO Labels Google ‘Irresponsible’ For Tracking Change

Google's change will allow advertisers to track customers' digital “fingerprints”, but UK data protection watchdog…

2 days ago

EU Publishes iOS Interoperability Plans

European Commission publishes preliminary instructions to Apple on how to open up iOS to rivals,…

3 days ago

Momeni Convicted In Bob Lee Murder

San Francisco jury finds Nima Momeni guilty of second-degree murder of Cash App founder Bob…

3 days ago