• Trend Micro
  • About TrendLabs Security Intelligence Blog
Search:
  • Home
  • Categories
    • Ransomware
    • Vulnerabilities
    • Exploits
    • Targeted Attacks
    • Deep Web
    • Mobile
    • Internet of Things
    • Malware
    • Bad Sites
    • Spam
    • Botnets
    • Social
    • Open source
Home   »   Malware   »   Operation Pawn Storm: The Red in SEDNIT

Operation Pawn Storm: The Red in SEDNIT

  • Posted on:October 22, 2014 at 3:41 am
  • Posted in:Malware, Targeted Attacks
  • Author:
    Jim Gogolinski (Senior Threat Researcher)
0

Pawn Storm is an active economic and political cyber-espionage operation targeting a wide range of entities, mostly those related to the military, governments, and media. Specific targets include:

  • Military agencies, embassies, and defense contractors in the US and its allies
  • Opposition politicians and dissidents of the Russian government
  • International media
  • The national security department of a US ally

The cyber criminals behind Operation Pawn Storm are using several different attack scenarios: spear-phishing emails with malicious Microsoft Office documents lead to SEDNIT/Sofacy malware, very selective exploits injected into legitimate websites that will also lead to SEDNIT/Sofacy malware, and phishing emails that redirect victims to fake Outlook Web Access login pages.

A Closer Look at SEDNIT

Our investigation into Pawn Storm has shown that the attackers have done their homework. Their choices of targets and the use of SEDNIT malware indicate the attackers are very experienced; SEDNIT has been designed to penetrate their targets’ defenses and remain persistent in order to capture as much information as they can.

SEDNIT1

Figure 1. Phases 1 and 2 in an Operation Pawn Storm attack

The spear phishing emails sent by Pawn Storm attacks can be aimed at very specific targets. In one example, a spear phishing email was sent to only 3 employees of the legal department of a billion-dollar multinational firm. The e-mail addresses of the recipients are not advertised anywhere online. The company in question was involved in an important legal dispute, so this shows a clear economic espionage motive of the attackers. Luckily nobody clicked on the link in the spear phish e-mail and Trend Micro was able to warn the company in an early stage, thus preventing any further damage.

This attack, however, is just one of the many attacks launched, and there will surely be more. The attackers behind Operation Pawn Storm have been active since at least 2007 and they continue to launch new campaigns. Just in June 2014 they compromised government websites in Poland and in September 2014 the website for Power Exchange in Poland, www.irgit.pl, by inserting a malicious iframe pointing to an exploit server at yovtube[dot]co and defenceiq[dot]us. The exploit server was however very selective in infecting victims with SEDNIT, so that SEDNIT malware only got installed on selected systems.

Another technique used by the Pawn Storm attackers is a very clever phishing attack that specifically targets Outlook Web Access users. We will discuss that part in another entry that we will release soon. In the mean time, check the full details of our research in our paper: Operation Pawn Storm.





Learn how to protect Enterprises, Small Businesses, and Home Users from ransomware:
ENTERPRISE »
SMALL BUSINESS»
HOME»
Tags: APTOperation Pawn StormRussiaSEDNITTargeted AttackUS

Featured Stories

  • Pawn Storm Ramps Up Spear-phishing Before Zero-Days Get Patched
  • New Bizarro Sundown Exploit Kit Spreads Locky
  • The Internet of Things Ecosystem is Broken. How Do We Fix It?
  • CVE-2016-3298: Microsoft Puts the Lid on Another IE Zero-day Used in AdGholas Campaign
  • FastPOS Updates in Time for the Retail Sale Season

Business Email Compromise

  • How can a sophisticated email scam cause more than $2.3 billion in damages to businesses around the world?
    See the numbers behind BEC

Latest Ransomware Posts

  • Mobile Ransomware: How to Protect Against It
  • Mobile Ransomware: Pocket-Sized Badness
  • HDDCryptor: Subtle Updates, Still a Credible Threat
  • Businesses as Ransomware’s Goldmine: How Cerber Encrypts Database Files
  • New Bizarro Sundown Exploit Kit Spreads Locky

Recent Posts

  • Alice: A Lightweight, Compact, No-Nonsense ATM Malware
  • Fake Apps Take Advantage of Super Mario Run Release
  • Mobile Ransomware: How to Protect Against It
  • Home Routers: Mitigating Attacks that can Turn them to Zombies
  • Patch Tuesday of December 2016: Microsoft Releases 12 Bulletins, Six Critical

Ransomware 101

  • This infographic shows how ransomware has evolved, how big the problem has become, and ways to avoid being a ransomware victim.
    Check the infographic

Popular Posts

  • One Bit To Rule A System: Analyzing CVE-2016-7255 Exploit In The Wild
  • Alice: A Lightweight, Compact, No-Nonsense ATM Malware
  • New Flavor of Dirty COW Attack Discovered, Patched
  • CEO Fraud Email Scams Target Healthcare Institutions
  • New SmsSecurity Variant Roots Phones, Abuses Accessibility Features and TeamViewer

Latest Tweets

  • A series of unexpected incidents made 2016 an interesting year for #cybersecurity. Recap: bit.ly/2gWkCWB
    about 59 mins ago
  • #Ransomware can derail your operations, but it can be prevented with a strong defense strategy. Learn more:… twitter.com/i/web/status/8…
    about 4 hours ago
  • Smart devices for kids can be fun and educational, but how can you make sure they're secure?… twitter.com/i/web/status/8…
    about 7 hours ago

Stay Updated

  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © Trend Micro Incorporated. All rights reserved.