This wasn’t a case of a man-in-the-middle attack against the site’s members though, nor was it a compromise of Microsoft servers, but instead was a use of public accounts to obfuscate the group’s actions. Using its latent talents, APT17 set up standard profiles on the TechNet website and then filled them with malware, according to a FireEye report.
This wasn’t just an attack designed to go after TechNet members. What makes this particular hack so dangerous is that it was able to keep itself hidden thanks to the use of the support platform.
The particular malware that the group proliferated around the TechNet site was a variant of the BLACKCOFFEE malware. While that sort of nefarious software was detectable by botnet hunters, it took some time for it to be discovered, as most trackers considered TechNet traffic to be a secure source and not likely to have been compromised.
Fortunately it was eventually discovered and stamped out by Microsoft and FireEye in late 2014. In a bit of poetic justice, they gave APT17 a taste of its own medicine, with counter-malware code added to the TechNet profiles, which allowed those chasing the hackers to learn about the malware being used and who it may have affected.
Through its announcement and accompanying break-down of these techniques, FireEye hopes that it can warn other platform providers to be on the lookout for such malware hiding techniques — though it’s hardly a poor advert for the firm’s services either.
- Attacks from Chinese hacking group have spiked, U.S. firm says
- Apple pays $75,000 to hacker for discovery of exploits to hijack iPhone camera
- How to tell if your security camera has been hacked
- Why are hackers snooping on smart home security cameras? I asked an ex-hacker
- What is Wi-Fi Direct? Here’s everything you need to know