www.eweek.com
Open in
urlscan Pro
23.37.42.150
Public Scan
Submitted URL: http://www.eweek.com/c/a/Security/McAfee-Night-Dragon-Cyber-Attack-Unsophisticated-But-Effective-303870
Effective URL: https://www.eweek.com/security/mcafee-night-dragon-cyber-attack-unsophisticated-but-effective
Submission: On September 09 via api from US
Effective URL: https://www.eweek.com/security/mcafee-night-dragon-cyber-attack-unsophisticated-but-effective
Submission: On September 09 via api from US
Form analysis
3 forms found in the DOMName: cse-search-box — /googlecse
<form action="/googlecse" id="cse-search-box" name="cse-search-box" onsubmit="return checkSearchValue();">
<input type="hidden" name="cx" value="partner-pub-8768004398756183:8606422690">
<input type="hidden" name="cof" value="FORID:11">
<input type="hidden" name="ie" value="ISO-8859-1">
<input id="searchField" name="q" class="form-control search-query" type="text" value="" placeholder="Custom Search"
style="background: url("https://www.google.com/cse/static/images/1x/googlelogo_lightgrey_46x16dp.png") left center no-repeat rgb(255, 255, 255); text-indent: 48px;">
<input class="search-submit" type="submit" value="" alt="Search eWeek site">
<script type="text/javascript" src="//www.google.com/coop/cse/brand?form=cse-search-box&lang="></script><input name="siteurl" type="hidden" value="www.eweek.com/security/mcafee-night-dragon-cyber-attack-unsophisticated-but-effective"><input
name="ref" type="hidden" value=""><input name="ss" type="hidden" value="">
</form>
Name: cse-search-box-footer — /googlecse
<form action="/googlecse" id="cse-search-box-footer" name="cse-search-box-footer" onsubmit="return checkSearchFooterValue();">
<input type="hidden" name="cx" value="partner-pub-8768004398756183:8606422690">
<input type="hidden" name="cof" value="FORID:11">
<input type="hidden" name="ie" value="ISO-8859-1">
<input id="searchFieldFooter" name="q" class="form-control search-query" type="text" value="" placeholder="Custom Search"
style="background: url("https://www.google.com/cse/static/images/1x/googlelogo_lightgrey_46x16dp.png") left center no-repeat rgb(255, 255, 255); text-indent: 48px;">
<input class="search-submit" type="submit" value="" alt="Search eWeek site">
<script type="text/javascript" src="//www.google.com/coop/cse/brand?form=cse-search-box-footer&lang="></script><input name="siteurl" type="hidden"
value="www.eweek.com/security/mcafee-night-dragon-cyber-attack-unsophisticated-but-effective"><input name="ref" type="hidden" value=""><input name="ss" type="hidden" value="">
</form>
Name: newsletterSubscribForm — POST
<form id="newsletterSubscribForm" method="post" name="newsletterSubscribForm">
<div class="newsletter-icon"></div>
<div class="newsletter-header">
<div class="newsletter-arrow floatL"></div>
<div class="newsletter-header-text floatL">
<div class="subscribe-text">Subscribe <span class="newsletter-text">to</span></div>
<div class="floatL newsletter-text">Editor's Pick</div>
</div>
</div>
<div id="nlsubscribeMessage" class="error"></div>
<div class="newsletter-form" id="newsletter-form">
<div class="floatL">
<input type="text" id="nl_email" name="nlemail" class="nlemail" maxlength="255" placeholder="Enter Email Address">
</div>
<div class="floatL">
<input type="button" name="btnSubscribe" id="nl_submit_button" value="GO >" onclick="newsletterGlobalSubmit('newsletterSubscribForm','nlsubscribeMessage', 'nlsubscribeMessage'); return false;">
</div>
</div>
<!-- <div class="login-form center-text">
Or <span class="submit_button" onclick="showGFrame('login', 'full');return false;">Log in</span>
</div> -->
<div class="newsletter-more">
<a id="morenewsletters" data-placement="left" data-toggle="popover" data-container="body" type="button" data-html="true" data-original-title="" title="">Click for more newsletters</a>
</div>
<div class="myeweek_vspace"></div>
<div id="listContent" class="hide orig_listContent">
<ul class="list-group no_border nlcheckbox">
<li class="list-group-item no_border nlcheckbox">
<span class="custom-checkbox"><input type="checkbox" id="subscribe_1" name="nlNewsletterKey" value="9310"></span>
<label for="subscribe_1">Editor's Pick</label>
</li>
<li class="list-group-item no_border nlcheckbox">
<span class="custom-checkbox"><input type="checkbox" id="subscribe_3" name="nlNewsletterKey" value="8710"></span>
<label for="subscribe_3">Cloud Computing Digest</label>
</li>
<li class="list-group-item no_border nlcheckbox">
<span class="custom-checkbox"><input type="checkbox" id="subscribe_4" name="nlNewsletterKey" value="10710"></span>
<label for="subscribe_4">Mobile and Wireless Update</label>
</li>
<li class="list-group-item no_border nlcheckbox">
<span class="custom-checkbox"><input type="checkbox" id="subscribe_5" name="nlNewsletterKey" value="8810"></span>
<label for="subscribe_5">Best of eWEEK</label>
</li>
<li class="list-group-item no_border nlcheckbox">
<span class="custom-checkbox"><input type="checkbox" id="subscribe_7" name="nlNewsletterKey" value="8910"></span>
<label for="subscribe_7">Careers Smart Moves</label>
</li>
<li class="list-group-item no_border nlcheckbox">
<span class="custom-checkbox"><input type="checkbox" id="subscribe_8" name="nlNewsletterKey" value="9010"></span>
<label for="subscribe_8">Enterprise Applications Update</label>
</li>
<li class="list-group-item no_border nlcheckbox">
<span class="custom-checkbox"><input type="checkbox" id="subscribe_13" name="nlNewsletterKey" value="10410"></span>
<label for="subscribe_13">Storage Report</label>
</li>
<li class="list-group-item no_border nlcheckbox">
<span class="custom-checkbox"><input type="checkbox" id="subscribe_17" name="nlNewsletterKey" value="9810"></span>
<label for="subscribe_17">Infrastructure Update</label>
</li>
<li class="list-group-item no_border nlcheckbox">
<span class="custom-checkbox"><input type="checkbox" id="subscribe_18" name="nlNewsletterKey" value="9910"></span>
<label for="subscribe_18">Linux & Open Source Update</label>
</li>
<li class="list-group-item no_border nlcheckbox">
<span class="custom-checkbox"><input type="checkbox" id="subscribe_20" name="nlNewsletterKey" value="10310"></span>
<label for="subscribe_20">Securing the Enterprise</label>
</li>
<li class="list-group-item no_border nlcheckbox">
<span class="custom-checkbox"><input type="checkbox" id="subscribe_22" name="nlNewsletterKey" value="10610"></span>
<label for="subscribe_22">What's Hot Now</label>
</li>
<li class="list-group-item no_border nlcheckbox">
<span class="custom-checkbox"><input type="checkbox" id="subscribe_23" name="nlNewsletterKey" value="9410"></span>
<label for="subscribe_23">eWEEKend</label>
</li>
</ul>
</div>
</form>
Text Content
Advertiser Disclosure * Big Data and Analytics * AT&T Cybersecurity vs. Splunk: SIEM Comparison * Signifyd: Product Overview and Insight * Five Technology Trends in 2020 that Will Affect Your... * Cisco Systems Uncovers Its 'Internet of the Future'... * NVIDIA Brings AI To Health Care While Protecting Patient... * Cloud * IT Science Case Study: Preparing Students for Connected... * Strategic News Service's Top 10 Predictions for 2020 * Four Mistakes for CIOs to Avoid in 2020, or Any Other... * AT&T Cybersecurity vs. Splunk: SIEM Comparison * Win 7 Sunset Increases Ransomware Risk: 5 Tips to Secure... * Mobile * Four Mistakes for CIOs to Avoid in 2020, or Any Other... * Aruba Combines Several Components in New SD-Branch... * Why AMD Had Such an Impressive CES Showing * At CES 2020, Dell Shows New Premium Latitude Line and... * Product Review: OnePlus 7T Pro 5G McLaren Phone * Networking * Aruba Combines Several Components in New SD-Branch... * Five Technology Trends in 2020 that Will Affect Your... * Zscaler Now Offering Freemium IoT Monitoring Dashboard * NVIDIA’s Recommendation Engine: Game Changer For Retail? * Cisco Systems Uncovers Its 'Internet of the Future'... * Security * Strategic News Service's Top 10 Predictions for 2020 * How Digicert CertCentral Reduces Angst of Certificate... * Aruba Combines Several Components in New SD-Branch... * AT&T Cybersecurity vs. Splunk: SIEM Comparison * Signifyd: Product Overview and Insight * Storage * How Digicert CertCentral Reduces Angst of Certificate... * At CES 2020, Dell Shows New Premium Latitude Line and... * Win 7 Sunset Increases Ransomware Risk: 5 Tips to Secure... * The Inextricable Link Between Data Security and End-of-Life... * Cobalt Iron: Product Overview and Insight * Applications * How Digicert CertCentral Reduces Angst of Certificate... * Aruba Combines Several Components in New SD-Branch... * AT&T Cybersecurity vs. Splunk: SIEM Comparison * Signifyd: Product Overview and Insight * Cisco Systems Uncovers Its 'Internet of the Future'... * Sponsored Content * All Articles * More * IT Management * Innovation * Small Business * Development * Database * Servers * Research * All Articles Toggle navigation Toggle search Advertiser Disclosure * Big Data and Analytics * Cloud * Mobile * Networking * Security * Storage * Applications * Sponsored Content * All Articles Advertisement Close X * Home * Security MCAFEE: NIGHT DRAGON CYBER-ATTACK UNSOPHISTICATED BUT EFFECTIVE By: Brian Prince | February 10, 2011 Researchers say "Night Dragon" was effective at targeting critical infrastructure companies but was not very sophisticated in its methods. It is no secret critical infrastructure companies are on the hit list of cyber-attackers. The latest entry on the list today comes courtesy of McAfee, whose researchers uncovered a campaign of coordinated, covert attacks targeting oil, energy and petrochemical companies that stretches back to November 2009. The attacks, which McAfee has collectively dubbed "Night Dragon" (PDF), are believed to emanate from China and relied on a mix of spear-phishing, social engineering, Windows bugs and remote administration tools (RATs) for success--none of which are particularly advanced, researchers said. "The attacks were not very sophisticated and did not use any zero-day exploits," said Dmitri Alperovitch, vice president of threat research at McAfee Labs. "They were, however, very successful, and information that (has) been (exfiltrated) has enormous potential value to competitors." That information, he said, includes financial documents related to oil and gas field exploration and bid negotiations, as well as operational details on oil and gas field production supervisory control and data acquisition (SCADA) systems. FURTHER READING * #eWEEKchat Sept. 8: Confidential Computing and Next-Gen... * Russian Attempt to Attack Tesla a Stark Warning to... The attacks - which are still ongoing - span the globe, and have touched companies, individuals and executives in Kazakhstan, Taiwan, Greece and the United States. Circumstantial evidence found by McAfee points to attackers based in China. For example, McAfee said it identified an individual based in Heze City who provided crucial command and control (C&C) infrastructure to the attackers. "The individual runs a company that, according to the company's advertisements, provides 'Hosted Servers in the U.S. with no records kept' for as little as 68 RMB (US$10) per year for 100 MB of space," McAfee said in its report. "The company's U.S.-based leased servers have been used to host the zwShell C&C application that controlled machines across the victim companies." "Beyond the curious use of the "zw.china" password that unlocks the operation of the zwShell C&C Trojan, McAfee has determined that all of the identified data exfiltration activity occurred from Beijing-based IP addresses and operated inside the victim companies weekdays from 9:00 a.m. to 5:00 p.m. Beijing time, which also suggests that the involved individuals were "company men" working on a regular job, rather than freelance or unprofessional hackers," according to the report. "In addition, the attackers employed hacking tools of Chinese origin and that are prevalent on Chinese underground hacking forums. These included Hookmsgina and WinlogonHack, tools that intercept Windows logon requests and hijack usernames and passwords." To deploy their hacking tools, the attackers looked to compromise perimeter security through SQL injection attacks on extranet Web servers, targeted spear-phishing attacks aimed at mobile workers' laptops and compromising corporate VPN accounts. "Once the initial system was compromised, the attackers compromised local administrator accounts and Active Directory administrator (and administrative users) accounts," according to McAfee. "The attackers often used common Windows utilities, such as SysInternals tools (acquired by Microsoft in 2006) - and other publicly available software...to establish "backdoors" through reverse proxies and planted Trojans that allowed the attackers to bypass network and host security policies and settings. Desktop antivirus and anti-spyware tools were also disabled in some instances - a common technique of targeted attacks." Using password racking and pass-the-hash tools, the attackers gained additional usernames and passwords. In addition, they used RAT malware to connect to other machines and swipe e-mail archives and documents belonging to executives. "What's remarkable about the MO [modus operandi], is these are fairly standard techniques from Network Breach 101," said Anup Ghosh, founder and chief scientist of Invincea. "Unfortunately this looks like another successful user-targeted attack through spear phishing from what appears to be nation-state actors who make it their day job to go after critical U.S. industry assets." McAfee CTO George Kurtz blogged that it was possible the attack actually stretched back as far as four years. "Well-coordinated, targeted attacks such as Night Dragon, orchestrated by a growing group of malicious attackers committed to their targets, are rapidly on the rise," he wrote. "These targets have now moved beyond the defense industrial base, government and military computers to include global corporate and commercial targets. More and more, these attacks focus not on using and abusing machines within the organizations being compromised, but rather on the theft of specific data and intellectual property." SPONSORED CONTENT ON Which ERP solution is right for your business? By TechnologyAdvice Enterprise resource planning (ERP) software isn’t just for multinational corporations anymore. * Previous Story * Previous Mozilla Adds Do Not Track Feature to Firefox 4 Beta * * Next Array Networks Rolls Out Application Delivery Controllers... * Next Story Subscribe to Editor's Pick Click for more newsletters * Editor's Pick * Cloud Computing Digest * Mobile and Wireless Update * Best of eWEEK * Careers Smart Moves * Enterprise Applications Update * Storage Report * Infrastructure Update * Linux & Open Source Update * Securing the Enterprise * What's Hot Now * eWEEKend EDITOR'S CHOICE How RangeForce Brings Management, Measurement to Enterprise... By: Frank Ohlhorst | September 08, 2020 * * * * How Intel Optane Helps Unify the Memory-Storage Pool * * Why Dell’s New Global Channel Chief Has Such a Pivotal... * How IBM Is Bringing Confidential Computing into the... RELATED VIDEO How BlackBerry Has Become a Cyber-Security Player eWEEK VIDEO: BlackBerry CTO Charles Eagan explains where his company's cyber-security efforts... Why McAfee Is Integrating AI Into Next Gen Security eWEEK VIDEO: McAfee CTO Steve Grobman provides insight into why artificial intelligence is... View all Contact Us | About eWeek | Sitemap * * * * * Property of TechnologyAdvice. Terms of Service | Privacy Notice | Advertise | California - Do Not Sell My Info Copyright 2020 TechnologyAdvice. All Rights Reserved Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace. We use cookies to personalize and enhance your experience on our site. Visit our Privacy Policy to learn more or manage your personal preferences in our Cookie Consent Tool. By using our site, you agree to our use of cookies. Accept