News

Industries

Companies

Jobs

Events

People

Video

Audio

Galleries

My Biz

Submit content

My Account

Advertise with us

New trend in hacking uncovered

A new trend among cyber espionage threat actors have been uncovered by Kaspersky Lab researchers - they are using tools available on the web for research purposes instead of developing customised hacking tools or buying them from third-party suppliers in the criminal underground. Several cyber espionage campaigns utilising such tools have been spotted recently by experts.
New trend in hacking uncovered
©Stefano Cavoretto via 123RF

This trend demonstrates that not only is the price of dangerous cyberattack tools falling, the tools are becoming more effective, and their accessibility higher. This means that even less professional, less skilled and less resourced hacker groups can now pose a threat to users and companies. Moreover, the use of legitimate tools for pen testing makes such attacks less visible to security solutions.

The BeEF

The browser exploitation framework, or BeEF, is one such tool. Originally developed by the security community to make the security testing of browsers better and easier, it is now used by several cyber espionage groups to attack targets around the world.

To exploit vulnerabilities in targets’ browsers, the hackers compromise websites of interest, plant BeEF on it, and then just wait for potential victims to visit these websites. The BeEF content enables the precise identification of both system and user and allows for the exploitation and theft of authentication credentials which in turn enable additional malware to be downloaded to a compromised device and more. This infection tactic is called setting up a watering hole and is often used by cyber espionage actors.

Watering hole websites

During their research, the Kaspersky Lab specialists were able to identify tens of such “watering hole” websites. The nature and topics of these websites reveal a lot about the types of potential targets:

• Middle-eastern embassy in the Russian Federation
• Indian military technology school
• Regional presidency office
• Ukrainian ICS Scanner mirror
• European Union education diversification support agency
• Russian foreign trade management organisation
• Progressive Kazakh news and political media
• Turkish news organisation
• Specialised German music school
• Japanese textile manufacturing inspection organisation
• Middle Eastern social responsibility and philanthropy
• Popular British "lifestyle" blog
• Algerian University's online course platform
• Chinese construction group
• Russian overseas business development and holding company
• Russian gaming developer forum
• Romanian Steam gaming developer
• Chinese online gaming virtual gold seller
• Brazilian music instrument retailer

What is different now?

“Previously we’ve seen cyber espionage groups using different open-sourced, legitimate pen testing tools, either in combination with their own malware or without it. What is different now is that we’re seeing more and more groups using BeEF as an attractive and effective alternative. This fact should be taken into account by corporate security departments in order to protect the organisation from this new threat vector,” said Kurt Baumgartner, principal security researcher at Kaspersky Lab.

Read more about the malicious usage of BeEF and other legitimate offensive tools by threat actors like Newsbeef/Newscaster, Crouching Yeti, and TeamSpy APT, and how to protect from such attacks at Securelist.com.

Let's do Biz