Industrial espionage and targeted attacks: understanding the characteristics of an escalating threat

  • Authors:
  • Olivier Thonnard;Leyla Bilge;Gavin O'Gorman;Seán Kiernan;Martin Lee

  • Affiliations:
  • Symantec Research Labs, Sophia Antipolis, France;Symantec Research Labs, Sophia Antipolis, France;Symantec Security Response, Ballycoolin Business Park, Dublin, Ireland;Symantec Security Response, Ballycoolin Business Park, Dublin, Ireland;Symantec.cloud, Gloucester, UK

  • Venue:
  • RAID'12 Proceedings of the 15th international conference on Research in Attacks, Intrusions, and Defenses
  • Year:
  • 2012

Quantified Score

Hi-index 0.00

Visualization

Abstract

Recent high-profile attacks against governments and large industry demonstrate that malware can be used for effective industrial espionage. Most previous incident reports have focused on describing the anatomy of specific incidents and data breaches. In this paper, we provide an in-depth analysis of a large corpus of targeted attacks identified by Symantec during the year 2011. Using advanced triage data analytics, we are able to attribute series of targeted attacks to attack campaigns quite likely performed by the same individuals. By analyzing the characteristics and dynamics of those campaigns, we provide new insights into the modus operandi of attackers involved in those campaigns. Finally, we evaluate the prevalence and sophistication level of those targeted attacks by analyzing the malicious attachments used as droppers. While a majority of the observed attacks rely mostly on social engineering, have a low level of malware sophistication and use little obfuscation, our malware analysis also shows that at least eight attack campaigns started about two weeks before the disclosure date of the exploited vulnerabilities, and therefore were probably using zero-day attacks at that time.