メインコンテンツにスキップする

StrongPity’s Summer Watering-holes Trap a Thousand Users in Search of Encryption

2016年10月10日

A stealthy threat actor known as StrongPity has spent the summer luring users of encryption software to its watering holes and infected installers, according to a paper presented at Virus Bulletin by Kaspersky Lab security researcher, Kurt Baumgartner.

A stealthy threat actor known as StrongPity has spent the summer luring users of encryption software to its watering holes and infected installers, according to a paper presented at Virus Bulletin by Kaspersky Lab security researcher, Kurt Baumgartner. Users in Italy and Belgium were hardest hit, but people in Turkey, North Africa and the Middle East were also affected.

StrongPity is a technically capable APT interested in encrypted data and communications. Over the last few months, Kaspersky Lab has observed a significant escalation in its attacks on users looking for two respected encryption tools: WinRAR document and TrueCrypt system encryption. 

The StrongPity malware includes components that give the attackers complete control of the victim’s system, enables them to steal disk contents and also to download additional modules to gather up communications and contacts. Kaspersky Lab has so far detected visits to StrongPity sites and the presence of StrongPity components across more than a thousand target systems.

Watering holes and poisoned installers

To trap victims, the attackers built fraudulent websites. In one instance, they transposed two letters in a domain name to fool customers into thinking it was a legitimate installer site for WinRAR software. They then placed a prominent link to this malicious domain on a WinRAR distributor site in Belgium, apparently substituting the site’s “recommended” link with that of the malicious domain. When visitors browsed the site, it led those unsuspecting users to the StrongPity poisoned installer. Kaspersky Lab first’s detection of a successful redirection was on May 28th, 2016.

At almost the same time, on May 24th, Kaspersky Lab began to spot malicious activity on an Italian WinRAR distributor site. In this instance, however, users were not redirected to a fraudulent website, but were served the malicious StrongPity installer directly from the distributor site. 

StrongPity also directed visitors from popular software-sharing sites to its trojanized TrueCrypt installers. This activity was still ongoing at the end of September.

The malicious links from the WinRAR distributor sites have now been removed, but at the end of September the fraudulent TrueCrypt site was still up.

Geography of those affected

Kaspersky Lab data reveals that in the course of a single week, malware delivered from the distributor site in Italy appeared on hundreds of systems throughout Europe and Northern Africa/Middle East, with many more infections likely. Over the entire summer, Italy (87%), Belgium (5%) and Algeria (4%) were most affected. The victim geography from the infected site in Belgium was similar, with users in Belgium accounting for half (54%) of more than 60 successful hits.

Attacks on users through the fraudulent TrueCrypt site ramped up in May 2016, with 95% of victims located in Turkey.

”The techniques employed by this threat actor are quite clever. They resemble the approach undertaken in early 2014 by the Crouching Yeti/Energetic Bear APT, which involved trojanizing legitimate IT software installers for industrial control systems and compromising genuine distribution sites. These tactics are an unwelcome and dangerous trend that the security industry needs to address. The search for privacy and data integrity should not expose an individual to offensive waterhole damage. Waterhole attacks are inherently imprecise, and we hope to spur discussion around the need for easier and improved verification of encryption tool delivery,” said Kurt Baumgartner, Principal Security Researcher, Kaspersky Lab.

Kaspersky Lab detects all StrongPity components as: HEUR:Trojan.Win32.StrongPity.gen and Trojan.Win32.StrongPity.* and as other generic detections.

To learn more about the StrongPity watering hole attacks, read the blog on Securelist.com.

For information on mitigating threats from infected encryption software, read the blog on Kaspersky Business.

To learn more about Kaspersky Lab’s APT Intelligence reporting service, please visit. http://www.kaspersky.com/enterprise-security/apt-intelligence-reporting.

StrongPity’s Summer Watering-holes Trap a Thousand Users in Search of Encryption

A stealthy threat actor known as StrongPity has spent the summer luring users of encryption software to its watering holes and infected installers, according to a paper presented at Virus Bulletin by Kaspersky Lab security researcher, Kurt Baumgartner.
Kaspersky logo

Kaspersky について

Kasperskyは1997年に設立された、グローバルなサイバーセキュリティおよびデジタルプライバシーの企業です。これまでに10億台以上のデバイスを新たなサイバー脅威や標的型攻撃から保護しています。深い脅威インテリジェンスとセキュリティの専門知識を生かし、革新性に富んだセキュリティソリューションやサービスを提供することで、世界中の企業、重要インフラ、政府機関、そして個人のお客様を守っています。当社の包括的なセキュリティポートフォリオには、業界をリードするエンドポイント保護製品、専門的なセキュリティ製品とサービス、そして高度なデジタル脅威に対抗するためのサイバーイミューン(Cyber Immune)ソリューションが含まれます。当社は22万社を超える法人のお客様の重要な資産を守る力になっています。詳しくはwww.kaspersky.co.jpをご覧ください。

関連記事 ウイルスニュース