Facebook says hackers backed by Vietnam’s government are linked to IT firm

  News
image_pdfimage_print
Stylized photo of desktop computer.

Facebook said it has linked an advanced hacking group widely believed to be sponsored by the government of Vietnam to what’s purported to be a legitimate IT company in that country.

The so-called advanced persistent threat group goes under the monikers APT32 and OceanLotus. It has been operating since at least 2014 and targets private sector companies in a range of industries along with foreign governments, dissidents, and journalists in South Asia and elsewhere. It uses a variety of tactics, including phishing, to infect targets with fully featured desktop and mobile malware that’s developed from scratch. To win targets’ confidence, the group goes to great lengths to create websites and online personas that masquerade as legitimate people and organizations.

Earlier this year, researchers uncovered at least eight unusually sophisticated Android apps hosted in Google Play that were linked to the hacking group. Many of them had been there since at least 2018. OceanLotus repeatedly bypassed Google’s app-vetting process, in part by submitting benign versions of the apps and later updating them to add backdoors and other malicious functionality.

FireEye published this detailed report on OceanLotus in 2017, and BlackBerry has more recent information here.

On Thursday, Facebook identified Vietnamese IT firm CyberOne Group as being linked to OceanLotus. The group lists an address in Ho Chi Minh city.

Email sent to the company seeking comment returned an error message that said the email server was misconfigured. A report from Reuters on Friday, however, quoted a person operating the company’s now-suspended Facebook page as saying: “We are NOT Ocean Lotus. It’s a mistake.”

At the time this post went live, the company’s website was also unreachable. An archive of it from earlier on Friday is here.

A recent investigation, Facebook said, uncovered a variety of notable tactics, techniques and procedures including:

  • Social engineering: APT32 created fictitious personas across the Internet posing as activists and business entities or used romantic lures when contacting people they targeted. These efforts often involved creating backstops for these fake personas and fake organizations on other Internet services so they appear more legitimate and can withstand scrutiny, including by security researchers. Some of their Pages were designed to lure particular followers for later phishing and malware targeting.
  • Malicious Play Store apps: In addition to using Pages, APT32 lured targets to download Android applications through Google Play Store that had a wide range of permissions to allow broad surveillance of people’s devices.
  • Malware propagation: APT32 compromised websites and created their own to include obfuscated malicious javascript as part of their watering hole attack to track targets’ browser information. A watering hole attack is when hackers infect websites frequently visited by intended targets to compromise their devices. As part of this, the group built custom malware capable of detecting the type of operating system a target uses (Windows or Mac) before sending a tailored payload that executes the malicious code. Consistent with this group’s past activity, APT32 also used links to file-sharing services where they hosted malicious files for targets to click and download. Most recently, they used shortened links to deliver malware. Finally, the group relied on Dynamic-Link Library (DLL) side-loading attacks in Microsoft Windows applications. They developed malicious files in exe, rar, rtf and iso formats, and delivered benign Word documents containing malicious links in text.

The naming of CyberOne Group isn’t the first time researchers have publicly linked a government-backed hacking group to real-world organizations. In 2013, researchers from Mandiant, now a part of security firm FireEye, identified a 12-story office tower in Shanghai, China, as the nerve center for Comment Crew, a hacking group that was responsible for hacks on more than 140 organizations over the previous seven years. The building was the headquarters for the People’s Liberation Army Unit 61398. And in 2018, FireEye said that potentially life-threatening malware that tampered with the safety mechanisms of an industrial facility in the Middle East was developed at a research lab in Russia.

Facebook said it was removing the ability of OceanLotus to abuse the company’s platform. Facebook said it expected the group’s tactics to evolve but that improved detection systems will make it harder for the group to evade exposure.

Thursday’s report provides no specifics about how Facebook linked OceanLotus to CyberOne Group, making it hard for outside researchers to corroborate the finding. Facebook told Reuters that providing those details would provide the attackers and others like them with information that would allow them to evade detection in the future.

https://arstechnica.com/?p=1729408