Story image

Gather around the watering hole: Bronze Union attackers likely based in China

04 Jul 2017

A China-based espionage group may be responsible for targeting Turkey's high profile government and private sector networks, in addition to other attacks on organisations in the UK, US and Canada.

The Bronze Union group, believed to be operating from China, has been active since 2015. The group was originally responsible for attacks on various sectors including government, technology, media and aerospace organisations.

In late 2016 the group heavily targeted high-profile Turkish organisations over an eight-day period. Five banks, two academic networks and 17 Turkish government IP addresses downloaded the group's malware.

The attack on Turkey is suspected to be an effort to take advantage of the country's political, economic and military ties to Europe and the Middle East.

According to SecureWorks, the group is still an 'active and formidable group', capable of large-scale intrusion attacks against high-profile systems.

The group uses watering hole attacks, also known as strategic web compromises to infiltrate networks. Researchers have also found that the group is now finding vulnerable internet-facing service to find networks and infiltrate them.

The group has been able to quickly understand infiltrated networks, disable logging and delete individual logs. Through watering holes, the group can collect credentials escalate privilege and deploy web shells.

Researchers also found that the Bronze Union group uses watering holes and scan-and-exploit techniques to deliver malware to systems. The group has also been able to bank on previously compromised websites to further its malware spread.

When the group was blocked from accessing a compromised environment, they tried to reconnect to its web shells using account credentials that may have come from an earlier attack phase.

Notably, the group also took advantage of other infrastructure. Researchers suspect this is to legitimise re-entry attempts, and it shows that there must be constant vigilance about possible re-entry attacks.

While the group is targeting specific industries and organisations, SecureWorks researchers suggest that all users take care to prevent attacks.

"To mitigate these threats, CTU researchers recommend that clients conduct regular internal vulnerability scanning, patching, and upgrading of priority systems, particularly Internet-facing systems and users' devices," the SecureWorks blog says.

Advanced endpoint threat detection will be able to suspicious activity that may indicate web shells or lateral movement, while sandboxing can stop malicious traffic from penetrating networks.

"Early detection and response can minimize exposure and damage."

Oracle updates enterprise blockchain platform
Oracle’s enterprise blockchain has been updated to include more capabilities to enhance development, integration, and deployment of customers’ new blockchain applications.
Used device market held back by lack of data security regulations
Mobile device users are sceptical about trading in their old device because they are concerned that data on those devices may be accessed or compromised after they hand it over.
Gartner names ExtraHop leader in network performance monitoring
ExtraHop provides enterprise cyber analytics that deliver security and performance from the inside out.
Symantec acquires zero trust innovator Luminate Security
Luminate’s Secure Access Cloud is supposedly natively constructed for a cloud-oriented, perimeter-less world.
Palo Alto releases new, feature-rich firewall
Palo Alto is calling it the ‘fastest-ever next-generation firewall’ with integrated cloud-based DNS Security service to stop attacks.
The right to be forgotten online could soon be forgotten
Despite bolstering free speech and access to information, the internet can be a double-edged sword, because that access to information goes both ways.
Opinion: 4 Ransomware trends to watch in 2019
Recorded Future's Allan Liska looks at the past big ransomware attacks thus far to predict what's coming this year.
Red Box gains compliance boost with new partnership
By partnering with Global Relay, voice platform provider Red Box is improving the security of its offerings for high-value and risk voice data.