Follow Us

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

Hackers used "Poison Ivy" malware to steal chemical, defense secrets

Symantec traces one command-and-control server to China

Article comments

Attackers used an off-the-shelf Trojan horse to sniff out secrets from nearly 50 companies, many of them in the chemical and defense industries, Symantec researchers said today.

The attack campaign - which Symantec tagged as "Nitro" - started no later than last July and continued until mid-September, targeting an unknown number of companies and infecting at least 48 firms with the "Poison Ivy" remote-access Trojan (RAT).

Poison Ivy, which was created by a Chinese hacker, is widely available on the Internet, including from a dedicated website .

The malware has been implicated in numerous attacks, including the March campaign that hacked the network of RSA Security and swiped information about that company's SecurID authentication token technology.

In a paper published today, Symantec researchers spelled out their analysis of the Nitro attacks and the use of Poison Ivy.

"Nitro wasn't at the level of sophistication of a Stuxnet," said Jeff Wilhelm, a senior researcher with Symantec's security response, in an interview today. "But there are similarities with other advanced threats."

Among those common traits, said Wilhelm, was the attack's narrow focus.

Phony software updates and meeting requests 

Poison Ivy was planted on Windows PCs whose owners fell for a dodge delivered via email, said Symantec. Those emails, which were delivered in small numbers - sometimes to only a few people in a company - touted meeting requests from reputable business partners, or in some cases, as updates to antivirus software or for Adobe Flash Player.

When users fell for the trick and opened the message attachment, they unknowingly installed Poison Ivy on their machines. After that, the attackers were able to issue instructions to the compromised computers, troll for higher-level passwords to gain access to servers hosting confidential information, and eventually offload the stolen content to hacker-controlled systems.

Many of the same techniques, including substantial time spent scouting targets and crafting individual emails, have characterised a number of notable attacks in the last two years, including the 2009-2010 "Aurora" campaign against Google and dozens of other Western firms, and the attacks against RSA this year.

Wilhelm declined to connect the dots between Nitro and the RSA attack, but did admit that there were similarities.

Twenty-nine of the 48 firms that were successfully attacked were in the chemical and advanced materials trade - some of the latter with connections to military vehicles - while the other 19 were in a variety of fields, including the defence sector.

A dozen of the targeted organisations were US-based, said Symantec, while five were headquartered in the UK and others in Denmark, Italy, the Netherlands and Japan.

Symantec declined to comment on whether the sole Japanese firm was Mitsubishi Heavy, that country's largest defense contractor. Last month, Mitsubishi confirmed that scores of its servers had been infected with malware in August, a time right in the middle of the Nitro two-and-a-half-month run.

Corporate espionage or recreational hacking?

Last week, Mitsubishi Heavy said that secret information may have been stolen from its network during the attack.

Mitsubishi has not identified the attack's origin, or the malware that was placed on its servers and PCs.

China has denied that its government was involved in the attacks against Mitsubishi.

Symantec drew a second connection to China - the first being Poison Ivy itself - during its Nitro investigation, saying that it had contacted an individual who owned one of the command-and-control (C&C) servers.

That person, which Symantec named "Covert Grove," was located in the Hebei region of the People's Republic of China. Hebei is a province in northern China, and surrounds the capital, Beijing.

But the information Symantec had on the Nitro attacks was of little use in determining whether Covert Groove acted alone, or if he did, whether he was fronting for a hacking group or even a national government.

"We were able to trace this back to this individual, which is unusual," said Wilhelm. "But we just don't know whether he is the sole hacker."

And Wilhelm was hesitant to draw conclusions about the motivation for the attacks. "It could have been corporate espionage, or it could be anything," he said.


More from Techworld

More relevant IT news


Son_of_blue said: Sorry - should tag against OS X in the workplace

Son_of_blue said: VirtualBoxfrom Oracle works very well in my office environment except for one Sentinel dongle protceted application The Mac Mini and MacBook Pro perform equally well

Send to a friend

Email this article to a friend or colleague:

PLEASE NOTE: Your name is used only to let the recipient know who sent the story, and in case of transmission error. Both your name and the recipient's name and address will not be used for any other purpose.

Techworld White Papers

Choose – and Choose Wisely – the Right MSP for Your SMB

End users need a technology partner that provides transparency, enables productivity, delivers...

Download Whitepaper

10 Effective Habits of Indispensable IT Departments

It’s no secret that responsibilities are growing while budgets continue to shrink. Download this...

Download Whitepaper

Gartner Magic Quadrant for Enterprise Information Archiving

Enterprise information archiving is contributing to organisational needs for e-discovery and...

Download Whitepaper

Advancing the state of virtualised backups

Dell Software’s vRanger is a veteran of the virtualisation specific backup market. It was the...

Download Whitepaper

Techworld UK - Technology - Business

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.

Techworld Mobile Site

Access Techworld's content on the move

Get the latest news, product reviews and downloads on your mobile device with Techworld's mobile site.

Find out more...

From Wow to How : Making mobile and cloud work for you

On demand Biztech Briefing - Learn how to effectively deliver mobile work styles and cloud services together.

Watch now...

Site Map

* *