• Trend Micro
  • About TrendLabs Security Intelligence Blog
Search:
  • Home
  • Categories
    • Ransomware
    • Vulnerabilities
    • Exploits
    • Targeted Attacks
    • Deep Web
    • Mobile
    • Internet of Things
    • Malware
    • Bad Sites
    • Spam
    • Botnets
    • Social
    • Open source
Home   »   Targeted Attacks   »   Pawn Storm Targets MH17 Investigation Team

Pawn Storm Targets MH17 Investigation Team

  • Posted on:October 22, 2015 at 11:59 am
  • Posted in:Targeted Attacks
  • Author:
    Feike Hacquebord (Senior Threat Researcher)
0

pawnstormPawn Storm has a long history of targeting government agencies and private organizations to steal sensitive information. Our most recent findings show that they targeted the international investigation team of the MH17 plane crash from different sides.

The Dutch Safety Board (known as Onderzoeksraad) became a target of the cyber-espionage group before and after the safety board published their detailed report on the MH17 incident on October 13, 2015. We believe that a coordinated attack from several sides was launched to get unauthorized access to sensitive material of the investigation conducted by Dutch, Malaysian, Australian, Belgian, and Ukrainian authorities.


Figure 1. Official site of the Dutch Safety Board and the press release for the MH17 investigations 

We discovered that a fake server mimicking an SFTP server of the Dutch Safety Board was set up on September 28, 2015; later a fake VPN server of the same organization was set up on October 14, 2015. It is very likely these were used for credential phishing attacks against personnel of the Safety Board in order to get unauthorized access to both the SFTP and the VPN server.

This is the first time we have seen direct evidence that an APT group attempted to get unauthorized access to a VPN server. The VPN server of the Safety Board looks to use temporary tokens for authentication. However, these tokens can be phished in a straightforward way and tokens alone do not protect against one-time unauthorized access by third parties, once the target falls for the phishing attack.

The attacks weren’t limited to the Dutch Safety Board. On September 29 2015, a fake Outlook Web Access (OWA) server was set up to target an important partner of the Dutch Safety Board in the MH17 investigation. We were able to warn the affected party in a very early stage, thus probably preventing the attack to succeed.

These discoveries show that it is very likely that Pawn Storm coordinated attacks against different organizations to get sensitive information on the MH17 plane crash.

Pawn Storm and Syria

Pawn Storm has also intensified attacks against Syrian opposition groups and Arab countries that voiced objections against the recent interventions of Russia in Syria.

Last September, several Syrian opposition members in exile were the targets of advanced credentials attacks. Then in September and October 2015, several fake OWA servers were set up, targeting the military, ministries of defense, and foreign affairs of about all Arab countries that criticized the Russian intervention in Syria.


Figure 2. Fake OWA server of the armed forces of a targeted Arab country

The Pawn Storm Campaign

Pawn Storm is a long-running cyber-espionage campaign that has had numerous international targets, including the White House and the North Atlantic Treaty Organization.  But our research also shows that while Pawn Storm’s targets have mostly been external political entities outside of Russia, a great deal of targets can actually be found within the country’s borders. Some of their “local” targets include peace activists, bloggers, and politicians.

For its cyber-espionage attacks, Pawn Storm is known for launching simple but effective phishing campaigns against organizations that have their webmail exposed to the Internet. The group is also known to use zero-day exploits.





Related posts:

  • Pawn Storm Campaign Adds Turkey To Its List of Targets
  • Pawn Storm Targets German Christian Democratic Union
Learn how to protect Enterprises, Small Businesses, and Home Users from ransomware:
ENTERPRISE »
SMALL BUSINESS»
HOME»
Tags: APTmh17Pawn StormSyriaTargeted Attack

Featured Stories

  • Pawn Storm Ramps Up Spear-phishing Before Zero-Days Get Patched
  • New Bizarro Sundown Exploit Kit Spreads Locky
  • The Internet of Things Ecosystem is Broken. How Do We Fix It?
  • CVE-2016-3298: Microsoft Puts the Lid on Another IE Zero-day Used in AdGholas Campaign
  • FastPOS Updates in Time for the Retail Sale Season

Business Email Compromise

  • How can a sophisticated email scam cause more than $2.3 billion in damages to businesses around the world?
    See the numbers behind BEC

Latest Ransomware Posts

  • Mobile Ransomware: How to Protect Against It
  • Mobile Ransomware: Pocket-Sized Badness
  • HDDCryptor: Subtle Updates, Still a Credible Threat
  • Businesses as Ransomware’s Goldmine: How Cerber Encrypts Database Files
  • New Bizarro Sundown Exploit Kit Spreads Locky

Recent Posts

  • Alice: A Lightweight, Compact, No-Nonsense ATM Malware
  • Fake Apps Take Advantage of Super Mario Run Release
  • Mobile Ransomware: How to Protect Against It
  • Home Routers: Mitigating Attacks that can Turn them to Zombies
  • Patch Tuesday of December 2016: Microsoft Releases 12 Bulletins, Six Critical

Ransomware 101

  • This infographic shows how ransomware has evolved, how big the problem has become, and ways to avoid being a ransomware victim.
    Check the infographic

Popular Posts

  • One Bit To Rule A System: Analyzing CVE-2016-7255 Exploit In The Wild
  • Alice: A Lightweight, Compact, No-Nonsense ATM Malware
  • New Flavor of Dirty COW Attack Discovered, Patched
  • CEO Fraud Email Scams Target Healthcare Institutions
  • New SmsSecurity Variant Roots Phones, Abuses Accessibility Features and TeamViewer

Latest Tweets

  • A series of unexpected incidents made 2016 an interesting year for #cybersecurity. Recap: bit.ly/2gWkCWB
    about 1 hour ago
  • #Ransomware can derail your operations, but it can be prevented with a strong defense strategy. Learn more:… twitter.com/i/web/status/8…
    about 4 hours ago
  • Smart devices for kids can be fun and educational, but how can you make sure they're secure?… twitter.com/i/web/status/8…
    about 7 hours ago

Stay Updated

  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © Trend Micro Incorporated. All rights reserved.