Years-Long Attack by Chinese-Linked APT Groups Discovered by McAfee

This article has been indexed from E Hacking News – Latest Hacker News and IT Security News

 

A cyber-attack that had been sitting on the target organization’s network for years stealing data was discovered during a McAfee investigation into a suspected malware infection. The sophisticated threat actors utilized a mix of known and novel malware tools in the attack, called Operation Harvest, to infiltrate the victim’s IT infrastructure, exfiltrate data, and avoid detection, according to the investigators. McAfee researchers were able to narrow down the list of suspects to two advanced persistent threat (APT) nation-state groups with ties to China during the course of the two-month investigation. 
“Operation Harvest has been a long-term operation whereby an adversary maintained access for multiple years to exfiltrate data,” Christiaan Beek, lead scientist and senior principal engineer for the Enterprise Office of the CTO at McAfee, wrote in a report. 
“The exfiltrated data would have either been part of an intellectual property theft for economic purposes and/or would have provided insights that would be beneficial in case of military interventions. The adversaries made use of techniques very often observed in this kind of attack but also used distinctive new backdoors or variants of existing malware families,” Beek added. 
The actor gained initial access by compromising the victim’s web server, which contained software to maintain the existence and storage of tools needed to acquire information about the victim’s network and lateral movement/execution of files, according to forensic investigations. 
Between the operating method of the unique encryption function in the custom backdoor and the code used in the

[…]
Content was cut in order to protect the source.Please visit the source for the rest of the article.

Read the original article: Years-Long Attack by Chinese-Linked APT Groups Discovered by McAfee