Poseidon Group Carries Out Global Cyber Espionage by Land, Air and Sea

Poseidon Group Carries Out Global Cyber Espionage by Land, Air and Sea

The first ever publicly-known Brazilian Portuguese-speaking cyber-espionage campaign has been uncovered, targeting financial institutions as well as telecommunications, manufacturing, energy and media companies.

The Poseidon Group is an advanced threat actor active in global cyber-espionage operations. According to the Kaspersky Lab Global Research and Analysis Team, it was heretofore undiscovered despite being active since at least 2005.

“The Poseidon Group is a long-standing team operating on all domains: land, air and sea. Some of its command and control centers have been found inside ISPs providing Internet service to ships at sea, wireless connections as well as those inside traditional carriers,” said Dmitry Bestuzhev, director, Global Research and Analysis Team, Kaspersky Lab Latin America. “In addition, several of its implants were found to have a very short life span which contributed to this group being able to operate for such a long time without being detected.”

The group’s standard M.O. is to manipulate victim companies into contracting the Poseidon Group as a security consultant, under the threat of exploiting the stolen information in a series of shady business deals.

“What makes the Poseidon Group stand out is that it’s a commercial entity, whose attacks involve custom malware digitally signed with rogue certificates deployed to steal sensitive data from victims to coerce them into a business relationship,” researchers said in a blog post. “In addition, the malware is designed to function specifically on English and Brazilian Portuguese Windows machines, a first for a targeted attack.”

At least 35 victim companies have been identified. Along with various verticals, Kaspersky Lab experts have also detected attacks on service companies that cater to top corporate executives. However, the victim spread is heavily skewed towards Brazil, where many of the victims have joint ventures or partner operations.

The Poseidon Group relies on spear-phishing emails with RTF/DOC files, usually with a human resources lure, that drop a malicious binary into the target’s system when clicked on. Once a computer is infected, the malware reports to the command and control servers before beginning a complex phase of lateral movement.

“This phase will often leverage a specialized tool that automatically and aggressively collects a wide array of information including credentials, group management policies and even system logs to better hone further attacks and assure execution of the malware,” the firm said.

By doing this, the attackers actually know what applications and commands they can use without alerting the network administrator during lateral movement and exfiltration.

Source: Information Security Magazine