February 23, 2016 - 5:14 PM EST
Print Email Article Font Down Font Up
New Security Research From Cylance Spear? Team Uncovers Multi-Year, Multi-Attack Campaign Targeting Japanese Critical Infrastructure

"Operation Dust Storm" reveals increasingly sophisticated, targeted and successful cyber-attacks against Japanese electric utility, oil and gas, finance, transportation and construction companies

Cylance SPEAR(TM) team, the security research arm of Cylance, today released a report titled "Operation Dust Storm," which reveals a multi-year, multi-attack campaign against Japanese commercial interests and critical infrastructure. The research uncovers how a well-organized and well-funded threat group, likely associated with a nation/state, has used a variety of attack vectors and techniques to infiltrate and gather sensitive information from companies in electric utilities, oil and gas, finance, transportation and construction.

Logo - http://photos.prnewswire.com/prnh/20160222/336103LOGO

"Since 2010, a threat group with considerable resources has been using various exploits to attack commercial interests around the globe, with a specific focus on

Japan
," said Jon Miller, vice president of strategy, Cylance. "Whereas early activity by the group showed less sophistication and a broader set of targets, SPEAR's current research indicates the group's present focus has shifted specifically and exclusively to Japanese companies or Japanese subdivisions of larger foreign organizations. The group has also shown an ability to exploit Android-based mobile devices, illustrating that these types of attacks are more prevalent in the mobile-centric business cultures in
Asia
. The campaign continues to this day."

Specific findings of Operation Dust Storm include:

Exclusive Focus on

Japan
in Later Stages: Recent activity has shown an exclusive focus on Japanese companies or Japanese divisions of larger organizations not headquartered in
Japan
.

Sustained Attack Campaigns: The campaign spans more than five years of persistent, multiple cyber attacks against companies in

Japan
,
South Korea
, the
U.S.
and
Europe
.

Long-term Purpose: After evaluating the malware at the first stages of attack on the hacked networks and systems, the SPEAR team found evidence showing that the prime motives are long-term data exfiltration and theft.

Variety of Critical Infrastructure Targets: Critical infrastructure targets include electric utilities, oil and gas, finance, transportation and construction.

Increasing Focus on Japanese Commercial and Energy Interests: The campaign is most likely being directed by a nation/state attack group growing in sophistication and focus, who are specifically targeting Japanese companies or Japanese subsidiaries of multinational corporations.

Continuous, Undocumented Threats: Last year SPEAR discovered two more waves of attacks that started in July 2015 and October 2015. One of the primary targets was a Japanese subsidiary of a South Korean electric utility.

Wide Range of Attack Types and Vectors: Attacks have employed spear phishing, waterholes, unique backdoors and unique zero-day variants, among others, to breach corporate networks and Android-based mobile devices.

Targeted Corporate Attacks: The campaign has made use of malware that is customized for particular target organizations; one 2015 attack involved the use of an S-Type backdoor variant designed specifically to compromise the investment arm of a major Japanese automaker.

The full Operation Dust Storm report can be downloaded here and includes more detail on the types of attacks, targets and a complete timeline of attacks between 2010 and 2015. Future Cylance SPEAR research focused specifically on the mobile-based attacks covered in Operation Dust Storm will be released later this year. Through Cylance research and analysis work, previously undocumented attacks indicate that this activity is directed by one threat actor or entity, and there is undoubtedly more to discover. Cylance analysis is ongoing and there will be more updates as new aspects and new attacks are uncovered.

About Cylance Inc.

Cylance is the only company to offer a preventive cybersecurity solution that stops advanced threats and malware at the most vulnerable point: the endpoint. Applying a revolutionary artificial intelligence approach, the Cylance endpoint security solution, CylancePROTECT®, analyzes the DNA of code prior to its execution on the endpoint to find and prevent threats others can't, while using a fraction of the system resources associated with endpoint anti-virus and detect and respond solutions that are deployed in enterprises today. For more information visit www.cylance.com.

For More InformationCylance press releases and news Cylance events and Unbelievable Tour dates

Social Networks:Website: www.cylance.comBlog: blog.cylance.comTwitter: www.twitter.com/cylanceincLinkedIn: https://www.linkedin.com/company/cylanceincYouTube: www.youtube.com/cylanceinc

Press and Media Contacts

Cylance Inc.Cynthia SiemensDirector, PR and Communications+1(949) 242-9221csiemens@cylance.com

United StatesJill GerigInkHouse PR +1(916) 215-3286cylance@inkhouse.com

InternationalHannah WhitrowZonic Group+44 (0)1672 550126

DISCLOSURE: The views and opinions expressed in this article are those of the authors, and do not represent the views of equities.com. Readers should not consider statements made by the author as formal recommendations and should consult their financial advisor before making any investment decisions. To read our full disclosure, please go to: http://www.equities.com/disclaimer


Source: Equities.com News (February 23, 2016 - 5:14 PM EST)

News by QuoteMedia
www.quotemedia.com

Legal Notice