Pacific Rim: Sophos vs. Chinese Hackers – A Spy Hunter’s Report

Sophos, a global leader of innovative security solutions for defeating cyberattacks released “Pacific Rim”. This is a report detailing its defensive and counter-offensive operation over the last five years with multiple interlinked nation-state adversaries based in China targeting perimeter devices, including Sophos Firewalls. The attackers used a series of campaigns with novel exploits and customized malware to embed tools to conduct surveillance, sabotage and cyberespionage as well as overlapping tactics, tools and procedures [TTPs] with well-known Chinese nation-state groups including Volt Typhoon, APT31 and APT41. The adversaries targeted both small and large critical infrastructure and government targets, primarily located in South and South-East Asia. Including nuclear energy suppliers, a national capital’s airport, a military hospital, state security apparatus, and central government ministries.

Read the Sophos Report: Two-Thirds of Healthcare Organizations Hit by Ransomware

Pacific Rim

Throughout Pacific Rim, Sophos X-Ops. The company’s cybersecurity and threat intelligence unit, worked to neutralize the adversaries’ moves and continuously evolved defenses and counter-offensives. After Sophos successfully responded to the initial attacks, the adversaries escalated their efforts and brought in more experienced operators. Sophos subsequently uncovered a vast adversarial ecosystem.

While Sophos released details in the Pacific Rim report starting in 2020 on the campaigns associated, including Cloud Snooper and Asnarök. The company is sharing the overall investigation analysis to raise awareness of the persistence of Chinese nation-state adversaries and their hyperfocus to compromise perimeter. This included unpatched and end-of-life [EOL] devices, often via zero-day exploits they are creating for those devices. The organization is also encouraging all organizations to urgently apply patches for vulnerabilities discovered in any of their internet-facing devices. This is important so as to migrate any older unsupported devices to current models. Sophos regularly updates all of its supported products based on new threats and indicators of compromise [IoCs] to protect customers. Sophos protects firewall customers by deploying rapid hotfixes, now enabled by default.

“The reality is that edge devices have become highly attractive targets for Chinese nation-state groups. For example Volt Typhoon and others as they look to build operational relay boxes [ORBs] to obfuscate and support their activity. This includes directly targeting an organization for espionage, or indirectly leveraging any weak points for onward attacks. Essentially becoming collateral damage. Even organizations that are not targets are getting hit. Network devices designed for businesses are natural targets for these purposes – they are powerful, always on, and have constant connectivity.” Said Ross McKerchar, CISO at Sophos.

“When a group seeking to build a global network of ORBs targeted some of our devices. We responded by applying the same detection and response techniques we use to defend our corporate endpoints and network devices. This allowed us to burn multiple operations and tap into a valuable stream of threat intelligence. That we applied to protect our customers from both future widespread attacks and highly targeted operations.”

Highlights of the Pacific Rim Report
  • On Dec. 4, 2018, a low-privileged computer connected to an overhead display began to scan the Sophos network. Seemingly on its own—at the India headquarters of Cyberoam, a company Sophos acquired in 2014. Sophos found a payload quietly listening for specialized inbound internet traffic on the computer that contained a novel type of backdoor and a complex rootkit “Cloud Snooper.”
  • In April 2020, after several organizations reported a user interface pointing to a domain with “Sophos” in its name. Sophos worked with European law enforcement, which tracked down and confiscated the server the adversaries used to deploy malicious payloads in what Sophos later dubbed Asnarök. Sophos neutralized Asnarök, which the company was able to attribute to China, by taking over the malware’s command and control [C2] channel. It also allowed Sophos to neutralize a planned wave of botnet attacks.
  • After Asnarök, Sophos advanced its intelligence operations by creating an additional threat actor tracking program focused on identifying and disrupting adversaries looking to exploit Sophos devices deployed in customer environments. The team built the program by combining open-source intelligence, web analytics, telemetry monitoring, and targeted kernel implants deployed on the attackers’ research devices.
  • Next, the attackers showed an increasing level of persistence, upleveling their tactics and deploying increasingly stealthy malware. However, using its threat actor tracking program and enhanced telemetry gathering capabilities. Sophos pre-empted several attacks and obtained a copy of a UEFI bootkit and custom exploits before they could be deployed broadly.
  • A few months later, Sophos tracked some of the attacks to an adversary who has demonstrated links to China and Sichuan Silence Information Technology’s Double Helix Research Institute in the country’s Chengdu region.
  • In March 2022, an anonymous security researcher reported a zero-day remote code execution vulnerability. It was designated CVE-2022-1040, to Sophos as part of the company’s bug bounty program. Further investigation revealed that this CVE was already being exploited in the wild in multiple operations. Operations that Sophos was then able to stop impacting customers. After deeper analysis, Sophos determined the person reporting the exploit may have had a connection to the adversaries. This was the second time Sophos received a suspiciously timed “tip” about an exploit before it was used maliciously.
SMBs as Targets

Recent advisories from CISA have made it clear that Chinese nation-state groups have become a perennial threat to nations’ critical infrastructure.” McKerchar continued. “What we tend to forget is that small- and medium-sized businesses—those that form the bulk of the supply chain for critical infrastructure—are targets since they are often the weak links in this supply chain. Unfortunately, these businesses often have fewer resources to defend against such sophisticated threats. Further complicating matters is the tendency for these adversaries to gain a foothold and dig in. This makes it hard to evict them. The modus operandi of China-based adversaries is creating long-term persistence and complex obfuscated attacks. They won’t stop until they’re disrupted.”

Industry Quotes About Sophos’ Pacific Rim Report

“Through the JCDC, CISA obtains and shares crucial intelligence on the cybersecurity challenges we face. Including the advanced tactics and techniques used by People’s Republic of China [PRC] state-sponsored cyber actors. The expertise of partners like Sophos and reports like its Pacific Rim report. Provides the global cyber community more insights into the PRC’s evolving behaviors. By working side-by-side, we are helping cyber defenders understand the scale and widespread exploitation of edge network devices and implement mitigation strategies.” Said Jeff Greene, executive assistant director for cybersecurity at CISA.

“CISA continues to highlight how classes of vulnerabilities. Including SQL injections and memory safety vulnerabilities, continue to be exploited en masse. We urge software manufacturers to review our Secure by Design resources and, as Sophos has done in this case, put its principles into practice. We encourage others to take the pledge and to review our alerts on how to eliminate common classes of defects.”

“Many cybersecurity vendors conduct adversarial research operations. But few are able to successfully do so against such a challenging set of nation-state adversaries for such a long period of time.” Said Eric Parizo, managing principal analyst with the cybersecurity research group at Omdia. “Sophos made the most of a highly unique opportunity. It should be lauded for delivering research and tactical takeaways that will help better defend its customers now and well into the future.”

“At NCSC-NL, one of our tasks is to share information and connect organisations. Facilitating communication and cooperation between national and international organisations is of great importance to improve cyber resilience. We are happy to have been able to make a contribution to this investigation with Sophos,” said Hielke Bontius, head of operations, NCSC-NL.

Advice for Defenders

Organizations should expect all internet-facing devices are prime targets for nation-state adversaries, especially those devices in critical infrastructure. Sophos encourages organizations to take the following actions to strengthen their security posture.

  • Minimize internet-facing services and devices when possible
  • Prioritize patching with urgency for internet-facing devices and monitor these devices
  • Enable hotfixes for edge devices to be allowed and applied automatically
  • Collaborate with law enforcement, public-private partners, and government to share and act on relevant IoCs
  • Create a plan for how your organization deals with EOL devices

“We need to work collaboratively across the public and private sector, law enforcement and governments, and the security industry, to share what we know about these adversarial operations. Attackers are using a bold and clever tactic by targeting the same edge devices deployed to protect networks. Organizations, channel partners, and Managed Service Providers must recognize these devices as prime targets and ensure they are properly hardened, with critical patches applied as soon as they are released.

In fact, we know that attackers are actively hunting for EOL devices. Vendors play a big part here, too. They need to help customers by supporting reliable and well-tested hot fixing, making it easy to upgrade from EOL platforms, systematically refactoring or removing legacy code that can harbor lingering vulnerabilities, continuously improving secure by default designs to offload the customer burden of hardening, and monitoring the integrity of our deployed devices,” concluded McKerchar.

Related Posts
Total
0
Share