Menu
Menu
As targeted email attacks proliferate, companies wince

As targeted email attacks proliferate, companies wince

Attacks such as 'Operation Shady Rat' are frequent and hard to detect.

The strange emails arrived in executives' inboxes around the same time that the Australian oil company was negotiating a deal with a Chinese energy company.

The emails had the same structure and format as those sent around the company and were baited with text that appeared to refer to a supposed continuing discussion between executives. The messages looked authentic from a nontechnical perspective, just part of normal electronic communication within a company.

But the corporate IT administrator felt something wasn't quite right. Upon closer examination, the administrator found the emails, while appearing to come from internal company servers, were actually coming from other domains not authorised to send email for the company.

The emails contained a malicious link that would redirect the person who opened it to a website of another energy company whose Web pages had been hacked in order to deliver malicious software designed to steal data. Victims would have no indication they'd been attacked.

It became clear that hackers were on a campaign to find out more about the pending deal.

"This was just their [the hackers] idea of due diligence," said the Australian IT administrator, who did not want himself or his company to be identified in this story due to the sensitivity of the intrusion.

The situation that faced the Australian company is one that is confronting companies and organisations worldwide regardless of their industry: hackers are getting a lot better at breaking through the defenses designed to keep information safe.

The attacks these days are "getting worse," said Alex Lanstein, a network and systems architect at security vendor FireEye, which makes systems designed to thwart Web-based attacks.

On Tuesday, McAfee - a major security vendor now owned by Intel - said it had gained access to a server that had logged intrusions into 72 companies, nongovernmental organisations and governments, including the U.N., U.S. defense contractors and the World Anti-Doping Agency, among many others.

Dubbed "Operation Shady RAT" (remote access tool), McAfee heralded the operation as one of the most significant examples of "advanced persistent threats," or cyberattacks that are undetected for a long time.

Some of the most frequently targeted organisations are financial institutions, energy companies, defense contractors and pharmaceutical companies, but hackers are also expanding their remit to other areas, such as law firms, Lanstein said.

Law firms are always at the core of many business transactions, ranging from mergers and acquisitions to patent negotiations and more. And their computer security practices are not quite as good as more frequently targeted organisations, Lanstein said.

"There are always lawyers involved and they always have the most sophisticated information," he said.

Governments are a frequent target. William Hague, the U.K.'s foreign secretary, said in a speech in February that three of his staff were sent emails from a purported colleague outside the Foreign Office, the U.K.'s equivalent of the U.S. State Department.

"The email claimed to be about a forthcoming visit to the region and looked quite innocent," Hague said. "In fact it was from a hostile state intelligence agency and contained computer code embedded in the attached document that would have attacked their machine. Luckily, our systems identified it and stopped it from ever reaching my staff."

Cisco's ScanSafe division, which specialized in products that scan Web traffic for malicious activity, released a report earlier this week that looked at how frequently employees of enterprises encounter malicious software on the Internet. It found employees as a group ran into malware an average of 335 times per month for the first half of this year.

Companies in pharmaceutical, chemical, energy and oil industries are at the highest risk for encountering malware on the web, the report said.

In response to the targeted attacks against the Australian oil company, the IT administrator said he built a tool that automatically strips out links in emails that come from outside his company. That may be inconvenient for some users, but "we can do without the links but we can't do without security," he said.

Fundamentally, the administrator said many executives still regard computer security as a hindrance and that "these geeks are just trying to make their life hard."

"I still think they think this is a nuisance and that the security guy will take care of it," the IT administrator said. "They are not elected [to the board] for IT savvy. They're old-school business people."

Join the CIO New Zealand group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.

Join the newsletter!

Error: Please check your email address.

Tags securitymcafeeoperation shady RAT

Show Comments