A cyber-espionage group called Suckfly is targeting governments and big enterprises, mainly located in India, using a backdoor named Nidiran, a credential dumping tool named Hacktool, Windows OLE exploit CVE-2014-6332, and.
The group came first to Symantec’s attention when in March it was caught stealing digital certificates from various South Korean companies.
A few months later, while investigating clues left behind by the group, Symantec experts claimed to have discovered Suckfly activity going back as early as April 2014.
Suckfly group focused on Indian targets
The group mainly targeted Indian companies, but researchers also found hacked businesses in Saudi Arabia as well. Symantec says it detected the group targeting two Indian government organizations, a large e-commerce company, one of the country’s largest financial organization, one of its top five IT companies, a shipping vendor, and a US-based healthcare provider for various Indian companies.
Except one privately-owned company, the group spent more time attacking the two Indian government agencies than anyone else.
“There is no evidence that Suckfly gained any benefits from attacking the government organizations, but someone else may have benefited from these attacks,” Symantec’s Joe DiMaggio reported. “The nature of the Suckfly attacks suggests that it is unlikely that the threat group orchestrated these attacks on their own.”
Suckfly uses APT-style tactics
of Suuckfly’s mode of operation reveals cyber-warfare tactics employed by many APT and economic espionage groups.
Suckfly attacks start with phishing emails that deliver boobytrapped documents. These files exploit CVE-2014-6332 to infect the target with the Nidiran backdoor, which attackers use to install Hacktool, a password dumping utility.
Crooks then use these passwords to scout and search the local network, gather any potentially interesting data and use the backdoor again to send it off to their servers.
Symantec noted that these attacks took place only on weekdays when the group was sure to find people at work to read the spear-phishing emails.
At the moment, security researchers could not exactly tell if the group is state-sponsored or not.