Hackers who wiped tens of thousands of PC hard drives in South Korea
earlier this year also appear to be targeting the country's military secrets,
according to a report.
A study by McAfee Labs said the group has created malware which scanned
systems for keywords including "weapon", "US Army" and "secret".
It said that once a computer's contents had been catalogued, the attackers
could "grab documents at will".
South Korea has played down the threat.
Its defence ministry told the Associated Press news agency that it was
technically impossible to have lost classified reports because the computers on
which it stored military secrets were not connected to the net.
A spokesman for the Pentagon said it planned to review the report.
Social network
McAfee said the attacks were part of a long-term spying operation dating
back to at least 2009 which it called Operation Troy because the name of the
ancient city repeatedly appeared in the hackers' code.
It began investigating the group following an attack in March which caused
data held on PCs used by several banks and TV networks to be deleted.
Although the security firm said that the malware used to wipe the disks was
distinct from that used to hunt for the military secrets, it said there were so
many similarities between the two that it believed they must be created by the
same team.
It traced the spying effort back to at least 2009 when it said the hackers
managed to place an exploit on a military social networking site. It added that
it believed the code was also spread through the use of "spear phishing" - email
or other messages masquerading as official communications which were designed to
fool specific individuals into handing over logins and other sensitive
information.
The report said that once the malware was in place it searched the infected
systems for "interesting" documents.
To do this it scanned for a variety of Korean and English-language
keywords.
The study lists dozens of examples including "tactics", "brigade",
"logistics" and "Operation Key Resolve" - a military exercise involving both
South Korean and US forces carried out every year. McAfee said it had opted to
withhold other "sensitive" terms at the request of US officials.
The report explained the software then flagged which computers appeared to
have the most valuable contents and uploaded copies of their directories to the
attackers' servers.
It said the hackers were then able to pick and choose which files to
download in order to keep network traffic to a minimum, helping them avoid
detection.
McAfee also warned that it had discovered a version of the spying malware
which had the ability to destroy data in a way similar to the one used against
the civilian targets.
"This capability could be devastating if military networks were to suddenly
be wiped after an adversary had gathered intelligence," it said.
"There was at least one limitation, however. We found the malware of
February 2011 could wipe its targets only if it was detected that it was being
debugged or analysed by a security product."
No comments:
Post a Comment