www.recordedfuture.com
Open in
urlscan Pro
104.18.43.111
Public Scan
Submitted URL: https://www.recordedfuture.com/hidden-lynx-analysis
Effective URL: https://www.recordedfuture.com/blog/hidden-lynx-analysis
Submission: On December 22 via api from US — Scanned from US
Effective URL: https://www.recordedfuture.com/blog/hidden-lynx-analysis
Submission: On December 22 via api from US — Scanned from US
Form analysis
0 forms found in the DOMText Content
This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy. Accept * Careers * Contact Us * Login * ENJPKO EN * Platform * Solutions * Products * Services * Research * Resources * Company Get a demo Book a demo Blog HUNTING HIDDEN LYNX: HOW OSINT IS CRUCIAL FOR APT ANALYSIS Posted: 1st May 2014 By: CHRIS THREAT INTELLIGENCE BROWSER EXTENSION Access instant threat intelligence and risk scores directly in any web app with our one-click browser extension Download for Free ANALYSIS SUMMARY * Visualization of open source intelligence on APTs reveals overlapping infrastructure, tools, and exploits used in the VOHO campaign and Operations Aurora, DeputyDog, and Ephemeral Hydra. * Two vulnerabilities were identified as exploited by Hidden Lynx in its VOHO campaign (2012) and the Elderwood Gang responsible for Operation Aurora (2010). Command and control infrastructure was also shared between Hidden Lynx and threat actors responsible for two campaigns during 2013: Operation DeputyDog and Operation Ephemeral Hydra. * Threat intelligence derived from disparate open web sources bolsters security efforts by identifying and contextualizing links between threat actors. When the_New York Times_ and Mandiant last year unmasked a large scale Chinese hacking operation, pinpointing its location down to the building, the report drew mainstream attention to what security professionals already well knew: sophisticated threat actors carry out persistent cyber operations over months and years. This post illustrates how open source intelligence (OSINT) from the web is not only useful but crucial to threat intelligence teams analyzing advanced persistent threats. Through OSINT analysis, we discover clues to APT attack methods that link together the research of independent threat intelligence teams, suggesting new lines of analysis that were not prominent when looking at the work of any single threat intel team in isolation. We will detail how the C&C infrastructure and tools used by hacker group Hidden Lynx during its VOHO campaign (2012), excellently documented by Symantec researchers last September, overlap with tools used in other high profile operations during the past few years. The other campaigns evaluated are Operation Aurora (2010), Operation DeputyDog (2013), and Ephemeral Hydra (2013). HISTORY OF HIDDEN LYNX MALWARE Security researchers have shown time and again that cyber actors frequently recycle effective attack methods. These attack methods retain telltale signatures even as a threat actor’s targeting and tools evolve. Therefore, our investigation looked for clues that linked hackers across one or more of the campaigns in question. Seeking to tease out any possible links between Operation Aurora, VOHO, Operation DeputyDog, and Ephemeral Hydra, we began with Symantec’s Hidden Lynx report as our foundation. The authors of that report identify three primary tools used in the campaigns attributed to Hidden Lynx: Trojan.Naid, Backdoor.Moudoor, and Backdoor.Hikit. Using Recorded Future, we quickly built a timeline of the reported use of those tools in major security incidents, finding many events prior to the early 2013 exposé on Hidden Lynx. CLICK IMAGE FOR LARGER VIEW CONNECTING THE DOTS Our analysis, based solely on information openly available on the web, builds on significant technical research that has explicitly linked elements of the aforementioned campaigns. In particular, FireEye during the fall of 2013 called out infrastructure overlap between Ephemeral Hydra and DeputyDog. Aspects of these two campaigns used tools and C&C infrastructure reportedly used by Hidden Lynx. These include a Hydraq/McRAT variant with lineage traceable to Aurora. Symantec during 2012 linked the Elderwood Project to Operation Aurora; Trojan.Naid and Backdoor.Moudoor were also used in Aurora, by the Elderwood Gang, and by Hidden Lynx. A brief summary of targets for each campaign: * Aurora: Technology, Finance, Energy and Defense * Elderwood: Defense and Supply Chain * VOHO: Government, Defense, and Education (Hidden Lynx separately targeted Finance) * DeputyDog: Government (Japan and China) * Ephemeral Hydra: Government and Defense Much of the above was well documented. However, some connections described over the course of several years, oftentimes by different research teams published across a variety of sources, are difficult to recall or might even be obscured by more recent information. What links did we discover in analysis using Recorded Future? * Two vulnerabilities were found to be exploited by both the Elderwood Gang and Hidden Lynx: CVE-2012-1875 and CVE-2012-1889. * One of those common exploits, targeting CVE-2012-1889, was on November 22, 2012 reportedly added to the “popular” Gong Da exploit kit. * Three C&C servers were known to be shared between VOHO and various elements of Operation DeputyDog and Operation Ephemeral Hydra: 58[.]64[.]143[.]244, 66[.]153[.]86[.]14, 111[.]68[.]9[.]93 * Backdoor.Hikit, which appears to have been developed post-Operation Aurora, was used in both VOHO and DeputyDog campaigns. * Reported use of the Hydraq Trojan from Aurora (2010) fell off until September 2012. The delivery method appears to have then switched from spearphishing to a watering hole attack when a variant of Hydraq was discovered in Ephemeral Hydra during November 2013. CLICK IMAGE FOR LARGER VIEW The above network shows relationships between three tools used by Hidden Lynx during its VOHO campaign: Trojan.Naid, Backdoor.Moudoor, and Backdoor.Hikit. The connections indicate actors, targets, vulnerabilities, and technical information related to those tools. Note the density of connections between Moudoor and Naid, which are commonly reported as complementary tools. Trojan.Naid specifically was used to attack security firm Bit9 ultimately compromising its digital code signing certificate. This allowed the hackers to then take on higher value targets as part of the VOHO campaign. Naid was also used in the 2010 campaign known as Operation Aurora. One of the key findings noted above was the identification of two vulnerabilities that were exploited by both Hidden Lynx and the Elderwood Gang, which has been linked to Operation Aurora. CVE-2012-1875 and CVE-2012-1889 are at the center of the network below, surrounded by targets and other related vulnerabilities. CLICK IMAGE FOR LARGER VIEW After visualizing these links, we explored the vulnerabilities at the edges of the graph, looking for connections with exploits used in other campaigns. We found such a link in CVE-2013-3893, which was leveraged in the August 2013 attacks on Japanese targets that FireEye dubbed Operation DeputyDog. Similar to our approach with Symantec’s report on Hidden Lynx, we used Recorded Future to organize the technical details about the DeputyDog attacks to reveal technical information described in the open source reporting across multiple campaigns. CLICK IMAGE FOR LARGER VIEW The above network shows technical details and locations, both server hosts and targets, related to Operation DeputyDog. This enabled creation of useful lists for us to seek overlap with other operations, establish the timing of exploits and C&C infrastructure used, and arrange alerts for ongoing monitoring. To wrap up our investigation, we built a timeline of events related to the IP addresses associated with both Hidden Lynx campaigns as well as operations DeputyDog and Ephemeral Hydra. The timeline details events related to the three previously cited IPs – 58.65[.]143[.]244, 66[.]153[.]86[.]14, and 111[.]68[.]9[.]93 – used in both the Bit9 attacks and either DeputyDog or Ephemeral Hydra. Analysts were able to track 66[.]153[.]86[.]14 back to an email address linking DeputyDog and the Hidden Lynx VOHO campaign. Separate analyses in November 2013 describe C&C servers used by Trojan.APT.9002 also used in the Hidden Lynx attacks against Bit9. CLICK IMAGE FOR LARGER VIEW REVEALING LINKS AND CONTEXT WITH WEB INTELLIGENCE This investigation sheds new light on these campaigns, without depending on private or freshly disclosed technical intelligence. Once assembled and structured for analysis, the collective knowledge about Hidden Lynx and many other APT campaigns, some publicly available for years, allows us to better understand intent and capabilities. We often hear leaders lament the present state of intelligence sharing, and advocate for new approaches with hold great promise. Meanwhile, large amounts of intelligence are already being shared in open source reporting. To yield insights, we must deal with great variety in sources and formats. The above data points were derived from PDFs, blog posts, and write ups from security firms coming from hundreds of websites. Recorded Future captures and structures that information, and provides analytic tools to help quickly make sense of this information from disparate sources. The results of such threat actor and campaign analysis, corroborating evidence across multiple sources and linking technical details across security blogs, social media, and research forums, are insights that are useful from incident response to threat intelligence. RELATED BLOG Blog LEADING WITH INTELLIGENCE: WINNING AGAINST CREDENTIAL THEFT Are security analytics the key to improving transparency and managing legal or compliance risks? View Blog Blog THREAT INTELLIGENCE IN AN ACTIVE CYBER DEFENSE (PART 2) Threat intelligence can be used in a number of ways, especially as part of an active cyber defense. View Blog Blog INTELLIGENCE TO RISK Threats become risks when reasonable controls are absent or lacking. In business, the distinction between threats and risks may be clear, but there is nuance in both the analysis and the final classification. View Blog ABOUT US * Intelligence Cloud * Services & Support * Research * Resources * Company HELPFUL LINKS * Careers * Contact Us * Get a Demo * The Intelligence Graph -------------------------------------------------------------------------------- JOIN US ONLINE * * * * * WANT TO LEARN MORE? Contact us today Copyright © 2023 Recorded Future, Inc. * Security FAQ * Cookies * Privacy Policy * Terms & Conditions