{"id":7491,"date":"2021-03-23T17:56:10","date_gmt":"2021-03-23T20:56:10","guid":{"rendered":"https:\/\/www.fie.undef.edu.ar\/ceptm\/?p=7491"},"modified":"2021-03-23T17:56:10","modified_gmt":"2021-03-23T20:56:10","slug":"mcafee-descubre-una-campana-de-espionaje-dirigida-a-las-principales-empresas-de-telecomunicaciones","status":"publish","type":"post","link":"https:\/\/www.fie.undef.edu.ar\/ceptm\/?p=7491","title":{"rendered":"McAfee descubre una campa\u00f1a de espionaje dirigida a las principales empresas de telecomunicaciones"},"content":{"rendered":"<p>El equipo de Inteligencia Estrat\u00e9gica de Investigaci\u00f3n de Amenazas Avanzadas de McAfee ha identificado una campa\u00f1a de espionaje dirigida espec\u00edficamente a las empresas de telecomunicaciones en un ataque denominado &#8220;Operaci\u00f3n Di\u00e0nx\u00f9n&#8221;. El ataque, se cree originado en China y se vincula a la prohibici\u00f3n del 5G de Huawei.<\/p>\n<hr \/>\n<p>The McAfee Advanced Threat Research Strategic Intelligence team has identified an espionage campaign that is <a href=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/operation-dianxun-cyberespionage-campaign-targeting-telecommunication-companies\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">specifically targeting telecommunication companies<\/a> in an attack dubbed &#8220;Operation Di\u00e0nx\u00f9n.&#8221; McAfee researchers Thomas Roccia, Thibault Seret and John Fokker said in a blog post that the malware is using tactics similar to those seen from groups like RedDelta and Mustang Panda.<\/p>\n<p>Roccia, Seret and Fokker wrote that they believe the campaign&#8217;s goal is to steal or gain access to covert information related to <a href=\"https:\/\/www.techrepublic.com\/article\/5g-mobile-networks-a-cheat-sheet\/\" target=\"_blank\" rel=\"noopener\" data-absolute=\"true\">5G<\/a> technology using malware masquerading as Flash applications.<\/p>\n<p>Cybersecurity companies Intsights and Positive Technologies both <a href=\"https:\/\/www.ptsecurity.com\/upload\/corporate\/ww-en\/analytics\/cybersecurity-threatscape-2020-q1-eng.pdf\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">identified Mustang Panda<\/a> last year as an <a href=\"https:\/\/intsights.com\/resources\/COVID-19-Cyber-Threat-Impact-Report\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">advanced persistent threat group behind a number of COVID-19-themed attacks<\/a> on people in Vietnam and Mongolia. The attacks involved COVID-19-related <a href=\"https:\/\/www.techrepublic.com\/article\/phishing-and-spearphishing-a-cheat-sheet\/\" target=\"_blank\" rel=\"noopener\">phishing<\/a> emails loaded with malicious .rar files that, when unzipped, installed a backdoor trojan on the victim&#8217;s machine.<\/p>\n<p>RedDelta is also well known by security researchers for its work attacking the Vatican, the former civilian government of Myanmar and two Hong Kong universities last year. According to McAfee, the attacks used &#8220;the PlugX backdoor using DLL side loading with legitimate software, such as Word or Acrobat, to compromise targets.&#8221;<\/p>\n<p>Now, the group&#8211;which is believed to be based in China&#8211;is going after the telecom sector, and McAfee researchers wrote that they believe the attack is <a href=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-defenders-blog-operation-dianxun\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">related to the ban of Chinese technology<\/a> in the global 5G rollout.<\/p>\n<p>&#8220;While the initial vector for the infection is not entirely clear, we believe with a medium level of confidence that victims were lured to a domain under control of the threat actor, from which they were infected with malware which the threat actor leveraged to perform additional discovery and data collection,&#8221; the McAfee report said.<\/p>\n<p>&#8220;We believe with a medium level of confidence that the attackers used a phishing website masquerading as the Huawei company career page to target people working in the telecommunications industry. We discovered malware that masqueraded as Flash applications, often connecting to the domain &#8220;hxxp:\/\/update.careerhuawei.net&#8221; that was under control of the threat actor. The malicious domain was crafted to look like the legitimate career site for Huawei, which has the domain: hxxp:\/\/career.huawei.com. In December, we also observed a new domain name used in this campaign: hxxp:\/\/update.huaweiyuncdn.com.&#8221;<\/p>\n<p>According to McAfee&#8217;s research, the targets for the attacks are based in the United States, Europe and Southeast Asia, with a specific focus on German and Vietnamese telecommunication companies.<\/p>\n<figure id=\"attachment_7493\" aria-describedby=\"caption-attachment-7493\" style=\"width: 770px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" class=\"size-full wp-image-7493\" src=\"https:\/\/www.fie.undef.edu.ar\/ceptm\/wp-content\/uploads\/2021\/03\/img-4596.png\" alt=\"\" width=\"770\" height=\"374\" srcset=\"https:\/\/www.fie.undef.edu.ar\/ceptm\/wp-content\/uploads\/2021\/03\/img-4596.png 770w, https:\/\/www.fie.undef.edu.ar\/ceptm\/wp-content\/uploads\/2021\/03\/img-4596-300x146.png 300w, https:\/\/www.fie.undef.edu.ar\/ceptm\/wp-content\/uploads\/2021\/03\/img-4596-768x373.png 768w\" sizes=\"(max-width: 770px) 100vw, 770px\" \/><figcaption id=\"caption-attachment-7493\" class=\"wp-caption-text\">A map of where the attacks were targeted. Image: McAfee<\/figcaption><\/figure>\n<p>&#8220;McAfee ATR&#8217;s research into Operation Di\u00e0nx\u00f9n reveals a capable threat actor that continuously updates tactics in an effort to extract data for their own purposes,&#8221; Raj Samani, a McAfee fellow and chief scientist, told TechRepublic.<\/p>\n<p>&#8220;Whilst the focus will be on the threat actor, the recommendation is to focus on the available IoCs and TTPs to not only hunt for the threat but implement controls that prevent such adversaries from being successful.&#8221;<\/p>\n<p>While there was initial interest from dozens of governments in allowing Chinese companies like Huawei and ZTE to build out 5G networks, the United States and some European countries have in recent months <a href=\"https:\/\/foreignpolicy.com\/2020\/10\/27\/trump-europe-huawei-china-us-competition-geopolitics-5g-slovakia\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">pressed countries to stop rollout efforts<\/a> over concerns that the Chinese government <a href=\"https:\/\/www.reuters.com\/article\/us-huawei-europe\/europe-telecoms-lobby-group-denounces-bans-on-chinese-vendors-idUSKBN2711I7\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">would have some level of access or control over the systems<\/a>, according to Foreign Policy and Reuters.<\/p>\n<p>Former President Donald Trump and his administration pressed other countries through a series of bilateral declarations to avoid hiring Chinese companies for 5G systems, sparking outrage from the Chinese government, who <a href=\"https:\/\/www.reuters.com\/article\/us-sweden-huawei-china\/china-urges-sweden-to-reverse-its-huawei-zte-ban-to-avoid-harming-its-companies-idUSKBN2760W1\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">accused the US and Europe of rigging<\/a> the free market in favor of companies based in their own countries.<\/p>\n<p>&#8220;In this report we have brought to light a recent espionage operation allegedly attributed to a Chinese APT group. Regarding the targeted sector (telecoms), we believe that this campaign was used to access sensitive data and to spy on companies related to 5G technology. Additionally, the use of a fake Huawei website gives more clues about the telecom targets,&#8221; <a href=\"https:\/\/www.mcafee.com\/enterprise\/en-us\/assets\/reports\/rp-operation-dianxun.pdf\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">the report said<\/a>.<\/p>\n<p>&#8220;The announcement of the ban on Huawei in several countries could have motivated the operation. The operating methods were previously assigned to the Chinese groups RedDelta and Mustang Panda. While we believe that the two actors could be the same, based on similar techniques, tactics and procedures, we currently have no further evidence. Interestingly, the RedDelta group has previously targeted Catholic organizations, while this campaign is primarily focused on telecommunications.&#8221;<\/p>\n<p><strong>Fuente:<\/strong> <a href=\"https:\/\/www.techrepublic.com\/article\/mcafee-uncovers-espionage-campaign-aimed-at-major-telecommunication-companies\/\" target=\"_blank\" rel=\"noopener\"><em>https:\/\/www.techrepublic.com<\/em><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>El equipo de Inteligencia Estrat\u00e9gica de Investigaci\u00f3n de Amenazas Avanzadas de McAfee ha identificado una campa\u00f1a de espionaje dirigida espec\u00edficamente a las empresas de telecomunicaciones&hellip; <\/p>\n","protected":false},"author":1,"featured_media":7492,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[2,23],"tags":[],"_links":{"self":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/7491"}],"collection":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=7491"}],"version-history":[{"count":1,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/7491\/revisions"}],"predecessor-version":[{"id":7494,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/7491\/revisions\/7494"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/media\/7492"}],"wp:attachment":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=7491"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=7491"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=7491"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}