Equation Group: The creator of digital espionage

For several years, the World Research and Analysis Group of the Kaspersky Lab has closely watched more than 60 advanced threats, who are responsible for digital attacks around the world.

Experts of the company have seen almost everything, attacks have become increasingly complex, as even states have been involved in these activities and have tried to "equip" themselves with the most advanced tools.

However, only now, its experts Kaspersky Lab they were able to confirm that they have discovered a threat carrier that goes beyond anything known for the complexity and expertise of its techniques. In fact, this body has been active for almost two decades! This is the team Equation GROUP.Equation Group Equation Group Equation Group Equation Group

According to Kaspersky Lab researchers, this group is unique in almost every aspect of its activities. It uses highly sophisticated and costly tools to deploy victims, recover data, and hide their activity in an extremely professional manner, using classic spy techniques to transport malicious loads to the victims.

In order to "infect" its victims, this group uses a powerful "arsenal" with "implants" (Trojans), including the following (based on names assigned by Kaspersky Lab): Equation Laser, Equation Drug, Double Fantasy , Triple Fantasy, Fanny and Gray Fish. Without doubt, there will be other active "implants" other than those mentioned above.

Equation Group

What makes the Equation Group unique?

Absolute perseverance and concealment  

Kaspersky Lab's Worldwide Research and Analysis Team has been able to recover two units that allow the reprogramming of firmware hard drives from more than 12 popular manufacturers. This is probably the most powerful tool in the Equation Group's arsenal and the first known malware to be capable of "infecting" hard drives.

Equation Group 1

«Ένας ιδιαίτερος κίνδυνος είναι ότι μόλις ο σκληρός δίσκος «μολυνθεί» με αυτό το κακόβουλο φορτίο, είναι αδύνατο να σκαναριστεί το firmware του. Για να το θέσω απλά: στους περισσότερους σκληρούς δίσκους υπάρχουν to write to the firmware area, but there are no functions to read it again. This means that we are almost blind and have no ability to detect hard drives that have been 'infected' by this malware”, warns Costin Raiu, Director of Kaspersky Lab's Worldwide Research and Analysis Group.

Possibility to retrieve data from individual networks

The worm "Fanny" stands out from all the attacks made by the Equation Group. Its main purpose was to map air gap networks. In other words, understand the topology of networks that are not accessible and execute commands on these individual systems. For this purpose, a single USB-based command and control mechanism is used that allowed attackers to transfer data to and from networks with "air gap".

In particular, an uninfected USB stick with hidden storage was used to collect basic system information from a computer not connected to the Internet, as well as to send it to the C&C mechanism when the USB was connected to an infected computer. by the "Fanny" worm and was connected to the Internet. If the attackers wanted to execute commands on "air gap" networks, they could store the commands in the USB cache. Once the USB was connected to the computer with "air gap", "Fanny" recognized the commands and executed them.

Classic espionage methods for transferring malicious software

Attackers used general methods to "contaminate" their targets, not just through it but also in the natural world. For this reason, they used an interception technique, intercepting data and replacing it with their corresponding Trojan versions. One such example involved the targeting of attendees at a scientific conference in Houston. On their way home, some of the attendees received a copy of the conference materials on CD-ROM, which was then used to install the 'Double Fantasy' Trojan on the target's device. The exact method by which the CDs became available is unknown.

Familiar friends: Stuxnet and Flame

There are serious indications that the Equation Group has been interacting with other powerful teams like Stuxnet and Flame. In general, this group seems to be superior to other players. Equation Group had access to zero-day threats before they were even used by Stuxnet and Flame. To some extent, they shared exploits with others.

For example, in 2008 "Fanny" used two zero-day threats introduced on Stuxnet in June 2009 and March 2010. One of Stuxnet's zero-days was actually a Flame unit operating the same vulnerabilities and which was detached directly from the Flame platform and integrated into Stuxnet.

Strong and geographically distributed infrastructure

Equation Group uses a huge C&C infrastructure that includes more than 300 domains and over 100 servers. The servers are hosted in many countries, such as the USA, the United Kingdom, Italy, Germany, the Netherlands, Panama, Costa Rica, Malaysia, Colombia and the Czech Republic. Kaspersky Lab currently uses sinkholing methods for over 20 of the 300 C&C servers.

Thousands of high profile victims worldwide

From 2001, the Equation Group has "infected" thousands or even tens of thousands of victims in more than 30 countries. Victims are in the following areas: Government and Diplomatic Organizations, Telecommunications, Aeronautics, Energy, Nuclear Research, Oil and Natural Gas, Military Organizations and Nanotechnology. He also turned against Islamic activists, scientists, mass media, transport companies, financial institutions and companies developing encryption technologies.

Localization

Kaspersky Lab observed seven exploits used by the Equation Group in the eponymous malware. At least four of them were used as zero-day threats. In addition, unknown exploits, possibly zero-day, were observed to target Firefox 17 in the same way they are used in Tor .

During the stage of "s", the team has the ability to use ten exploits in a chain. However, Kaspersky Lab experts noticed that no more than three are used. If the first is not successful, they try another, and then the third. If all three exploits fail, they do not "contaminate" the system.

Kaspersky Lab products identified a number of attacks on users. Many of these attacks have been unsuccessful thanks to Automatic Exploit Prevention, which detects and prevents the exploitation of unknown vulnerabilities. The "Fanny" worm was probably created in July of 2008, and it was first detected and included in the black list of Kaspersky Lab's automated systems in December of 2008.

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.087 registrants.

Written by Dimitris

Dimitris hates on Mondays .....

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).