Spear Phishing
Attack Alert: Beware Olympic Emails
The Winter Olympics has become the latest event to become embroiled in a spear phishing campaign. Lucy Ingham looks at the incident and what lessons can be learned
At the start of January, security firm McAfee announced that it had identified a malicious email campaign targeting organisations involved with the Pyeongchang Winter Olympics. The email, which was sent to a large list of South Korean organisations, appeared to be from the South Korean National Counter-Terrorism Center (NCTC), but in reality originated from an IP address in Singapore.
Attached was a Word document entitled, in Korean, ‘Organized by Ministry of Agriculture and Forestry and Pyeongchang Winter Olympics’. As with all documents, if a user opens the document in Word it will initially do so in protected mode, but the file instructs users to select ‘Enable Content’, disabling this mode and allowing the hidden malicious scripts it contains to run.
Such tactics would be unlikely to be widely effective from most sources, but with the Olympics name, a seemingly trustworthy sender and considering its relevance to its recipients, it is likely to have successfully fooled many into opening it.
This sophisticated attack is the latest example of spear phishing, where targeted emails are designed to fool recipients into believing they are from a trusted, relevant source and is unlikely to be the last that uses the Olympic name to achieve its goal.
“With the upcoming Olympics, we expect to see an increase in cyberattacks using Olympics-related themes,” said McAfee Labs in a post detailing the campaign. “In similar past cases, the victims were targeted for their passwords and financial information.”
Be wary of Word: Using software to launch malicious scripts
Word is increasingly being used to hide malicious scripts, which in this case were designed to allow other malicious software to be remotely installed onto infected computers at a later date.
“Based on our analysis, this implant establishes an encrypted channel to the attacker’s server, likely giving the attacker the ability to execute commands on the victim’s machine and to install additional malware,” wrote McAfee.
“This implant establishes an encrypted channel to the attacker’s server, likely giving the attacker the ability to execute commands on the victim’s machine and to install additional malware.”
This is particularly unusual in South Korea, where attackers have previously focused on using documents designed for Hangul, a popular alternative word processing software. However, this latest attack was able to be much harder to detect by threat protection software by using Word, as it allowed the embedded scripts to run while heavily disguised.
As a result, it would not have been caught by much of the software designed to prevent malicious emails from getting to users’ inboxes.
For non-security professionals, then, the lesson is to be extremely wary of disabling protected mode on Word documents unless you are absolutely certain of their source, even if they look as if they come from a reliable origin. And if they ask you to disable protected mode, that’s even more reason to be wary.
A screenshot of the document requesting users to disable protected mode. Image courtesy of McAfee Labs
Spear phishing: A sophisticated threat to all industries
Even if you have no involvement with the Olympics, the lessons learned from this campaign have significant implications for all industries, as attackers will use similar methods to reach a host of targets, posing as very different but relevant organisations.
"The malware infected emails targeted at organisations linked to the Winter Olympics fits into the general trend we are observing at the moment where cyber criminals are increasingly relying upon targeted attacks rather than mass attacks,” said Wieland Alge, General Manager of EMEA at Barracuda Networks.
“Cyber criminals are increasingly relying upon targeted attacks rather than mass attacks.”
“Traditionally we have seen mass campaigns that promise something fairly generic – such as lottery winnings or free tickets to an event. However, cyberattacks are becoming ever more targeted and sophisticated as spear phishing emails become an increasingly lucrative tool for cyber criminals.”
In particular, major events, exhibitions or conferences may be a choice target for specific industries, alongside well-known suppliers. Always be cautious about files that you have not specifically requested, and if in doubt, delete the email or contact the apparent sender without opening the attachment to confirm the email is genuine.
Image courtesy of mg Park / Shutterstock.com
PR nightmares: Ten of the worst corporate data breaches
LinkedIn, 2012
Hackers sold name and password info for more than 117 million accounts
Target, 2013
The personal and financial information of 110 million customers was exposed
JP Morgan, 2014
One JP Morgan Chase’s servers was compromised, resulting in fraud schemes yielding up to $100m
Home Depot, 2014
Hackers stole email and credit card data from more than 50 million customers
Sony, 2014
Emails and sensitive documents were leaked, thought to be by North Korea im retaliation for Sony’s production of a film mocking the country’s leader Kim Jong Un
Hilton Hotels, 2015
Dozens of Hilton and Starwood hotels had their payment systems compromised and hackers managed to steal customer credit card data
TalkTalk, 2015
The personal data of 156,959 customers, including names, addresses, dates of birth and phone numbers, were stolen
Tesco, 2016
Hackers made off with around $3.2m from more than 9,000 Tesco Bank accounts
Swift, 2016
Weaknesses in the Swift payment system resulted in $81m being stolen from the Bangladesh Central Bank’s account at the New York Federal Reserve
Chipotle, 2017
Phishing was used to steal the credit card information of millions of Chipotle customers, thought to be part of a wider restaurant customer scam orchestrated by an Eastern European criminal gang
LinkedIn, 2012
Hackers sold name and password info for more than 117 million accounts
Target, 2013
The personal and financial information of 110 million customers was exposed
JP Morgan, 2014
One JP Morgan Chase’s servers was compromised, resulting in fraud schemes yielding up to $100m
Home Depot, 2014
Hackers stole email and credit card data from more than 50 million customers
Sony, 2014
Emails and sensitive documents were leaked, thought to be by North Korea im retaliation for Sony’s production of a film mocking the country’s leader Kim Jong Un
Hilton Hotels, 2015
Dozens of Hilton and Starwood hotels had their payment systems compromised and hackers managed to steal customer credit card data
TalkTalk, 2015
The personal data of 156,959 customers, including names, addresses, dates of birth and phone numbers, were stolen
Tesco, 2016
Hackers made off with around $3.2m from more than 9,000 Tesco Bank accounts
Swift, 2016
Weaknesses in the Swift payment system resulted in $81m being stolen from the Bangladesh Central Bank’s account at the New York Federal Reserve
Chipotle, 2017
Phishing was used to steal the credit card information of millions of Chipotle customers, thought to be part of a wider restaurant customer scam orchestrated by an Eastern European criminal gang