[Infowarrior] - first interdiction against a state advanced threat group

Richard Forno rforno at infowarrior.org
Sun Nov 2 12:56:52 CST 2014


Begin forwarded message:

> From: dan
> Subject: referral: first interdiction against a state advanced threat group
> Date: November 2, 2014 at 1:27:32 PM EST
> 
> http://www.novetta.com/files/9714/1446/8199/Executive_Summary-Final_1.pdf
> 
> Axiom is responsible for directing highly sophisticated cyber espionage
> operations against numerous Fortune 500 companies, journalists,
> environmental groups, pro-democracy groups, software companies, academic
> institutions, and government agencies worldwide for at least the last
> six years. In our coordinated effort, we performed the first
> ever-private sponsored interdiction against a sophisticated state
> sponsored advanced threat group. Our efforts detected and cleaned 43,000
> separate installations of Axiom tools, including 180 of their top tier
> implants. This report will expand upon the following key findings:
> 
> *	A coordinated effort across the private sector can have
> quantifiable impact on state- sponsored threat actors.
> 
> *	The Axiom threat group is a well resourced, disciplined,
> and sophisticated subgroup of a larger cyber espionage group that has
> been directing operations unfettered for over six years.
> 
> *	Novetta has moderate to high confidence that the
> organization-tasking Axiom is a part of Chinese Intelligence Apparatus.
> This belief has been partially confirmed by a recent FBI flash released
> to Infragard stating the actors are affiliated with the Chinese
> government1.
> 
> *	Axiom actors have victimized pro-democracy
> non-governmental organizations (NGO) and other groups and individuals
> that would be perceived as a potential threat to the stability of the
> Chinese state.
> 
> *	Axiom operators have been observed operating in
> organizations that are of strategic economic interest, that influence
> environmental and energy policy, and that develop cutting edge
> information technology including integrated circuits, telecommunications
> equipment manufacturers, and infrastructure providers.
> 
> *	Later stages of Axiom operations leverage command and
> control infrastructure that has been compromised solely for the
> targeting of individual or small clusters of related targeted
> organizations.
> 
> *	Axiom uses a varied toolset ranging from generic malware
> to very tailored, custom malware designed for long-term persistence that
> at times can be measured in years. In descending order of observed
> scarcity these families are:
> 
>   Zox family (ZoxPNG, ZoxRPC)/Gresim
>   Hikit
>   Derusbi
>   Fexel/Deputy Dog
>   Hydraq/9002/Naid/Roarur/Mdmbot
>   ZXShell/Sensode
>   PlugX/Sogu/Kaba/Korplug/DestroyRAT
>   Gh0st/Moudour/Mydoor
>   Poison Ivy/Darkmoon/Breut
> 



More information about the Infowarrior mailing list