{"id":15149,"date":"2016-07-08T06:00:43","date_gmt":"2016-07-08T06:00:43","guid":{"rendered":"https:\/\/kasperskydaily.com\/b2b\/?p=5731"},"modified":"2020-02-27T04:03:58","modified_gmt":"2020-02-26T17:03:58","slug":"dropping-elephant","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.au\/blog\/dropping-elephant\/15149\/","title":{"rendered":"Dropping Elephant: Inelegant Espionage"},"content":{"rendered":"<h3>A Disappointment for Spy Genre Fans, or\u2026<\/h3>\n<p>For most of us, the word \u2018espionage\u2019 conjures up visions of immaculately dressed men and women armed, not just with the traditional pistol and silencer, but with lots of highly sophisticated gadgetry. Add the word \u2018cyber\u2019, and the aura of sophistication increases, as we envisage the levels of technological finesse required to discreetly intercept and steal delicate political secrets.<\/p>\n<p>On this basis, the cyberespionage group \u2018Dropping Elephant\u2019 (aka Chinastrats) is a bit of a disappointment, both in terms of its name and of its approach.\u00a0 Until, that is, you look at just how successful their operations, despite using relatively simple techniques, have been.<\/p>\n<p>An Indian-speaking threat actor, Dropping Elephant chooses targets mainly in the Asian region, paying particular attention to Chinese government\/diplomatic organizations \u2013 and also to foreign embassies and diplomatic offices in China, including those of Pakistan, Sri-Lanka, Uruguay, Bangladesh, Taiwan, Australia and USA. It employs a toolset and techniques mainly based around well-executed social engineering, the exploitation of long-closed vulnerabilities and the adoption of legitimate software.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>Dropping Elephant: Inelegant Espionage\u2026 #APT<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2FBzn5&amp;text=Dropping+Elephant%3A+Inelegant+Espionage%26%238230%3B+%23APT\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<h3>Hand me that axe, please, then put your neck on this block\u2026<\/h3>\n<p>Dropping Elephant\u2019s standard attack scheme starts with two-stage phishing. The first stage is usually a mass email containing only a relatively harmless document, which nevertheless has an important role to play in the attack. When opened, the document sends a confirmatory \u2018ping\u2019 to the attackers\u2019 command &amp; control servers, together with \u00a0basic information about the attacked system that helps further identify the target. The second stage is usually an email carrying either an exploit-containing document (.docx or .pps) leveraging older vulnerabilities in Microsoft Office, or a link to a legitimate-looking \u2018watering hole\u2019 website dedicated to politics and offering a well-crafted political news digest in the form of a .pps (Powerpoint Slideshow) file, also exploit-fitted and containing a malicious payload.<\/p>\n<p>When the user, lured by the email\u2019s or website\u2019s apparent credibility, puts his or her neck on the block by opening the file, the embedded payload is triggered. It downloads and executes a number of additional tools that start searching for any important-looking documents they find on the victim\u2019s hard drive, including Word files, Excel tables, Powerpoint presentations and PDFs, complementing these with saved credentials they can extract from the browser. This information is then syphoned away to the attackers\u2019 servers.<\/p>\n<p>These attacks, and others like them, rely on a set of vulnerabilities which are generally assumed to be closed.\u00a0 But it was never possible for Microsoft to completely disable every piece of potentially dangerous functionality in MS Office. Given enough persuasiveness and the victim\u2019s genuine interest in the well-crafted bait, <strong>users still can and do click absently through multiple warnings and confirmations<\/strong> \u2013 straight to their own \u2013 and the whole organization\u2019s \u2013 doom.<\/p>\n<p>The consequences of a data breach in a sensitive area like government\/politics are hard to underestimate. But it\u2019s also important to understand that it\u2019s not just organizations directly related to politics or government that can become targets.\u00a0 To reach their supposed victims, the Elephant\u2019s operators may choose the long way round, starting by compromising their victim\u2019s trusted contacts and business connections. So if your company has any ties with government institutions \u2013 best keep your corporate security well prepared for any unexpected elephantine visit.<\/p>\n<h3>\u00a0<\/h3>\n<h3>To Defend, You Must Arm Yourself<\/h3>\n<p>Dropping Elephant\u2019s operators may not be very inventive in their choice of techniques, but they\u2019re well versed in the uses of social engineering, and do their homework thoroughly before setting out to attack a particular target. To reduce their chances for success to a minimum, bearing in mind that their most important ally is probably going to be your own hapless employee, a multilayered approach to security is necessary. Chinastrats operators dangle highly convincing and carefully tailored informational baits, so close attention should be paid to the sources of any email that doesn\u2019t fit the everyday working pattern. Security awareness training, such as offered by <a href=\"https:\/\/www.kaspersky.ru\/advert\/enterprise-security\/cybersecurity-awareness?campaign=kl-ru_kbusinesspost_pro_ona_smm__onl_b2b_kbusiness_lnk_______&amp;redef=1&amp;THRU&amp;referer1=kl-ru_kbusinesspost&amp;referer2=kl-ru_kbusinesspost_pro_ona_smm__onl_b2b_kbusiness_lnk_______\" target=\"_blank\" rel=\"noopener\">Kaspersky Lab, <\/a>\u00a0can develop the necessary defensive reflexes in your employees \u2013 invaluable in spotting and repelling the forms of attack that Dropping Elephant prefers.<\/p>\n<p>It\u2019s worth mentioning that Kaspersky Lab\u2019s experts have long-standing relationships with government and law enforcement organizations worldwide. They not only help investigate cyber-attacks, but also conduct <a href=\"http:\/\/media.kaspersky.com\/en\/business-security\/enterprise\/Kaspersky_Security_Intelligence_Services_Cybersecurity_training.pdf\" target=\"_blank\" rel=\"noopener nofollow\">professional training<\/a>, teaching employees the ways of cybersecurity, from the very basics to the high zen of malware analysis and digital forensics. This training is available not just to government institutions, but is to any company working in the field of cybersecurity or looking to create its own Security Operations Center.<\/p>\n<p>In the meantime, as we can see, even already patched vulnerabilities can pose a considerable danger \u2013 so human-agnostic exploit mitigation technologies are a must. <a href=\"http:\/\/media.kaspersky.com\/pdf\/kaspersky-lab-whitepaper-automatic-exploit-prevention.pdf\" target=\"_blank\" rel=\"noopener nofollow\">The Automatic Exploit Prevention<\/a> technology, available in all tiers of <a href=\"https:\/\/www.kaspersky.com\/business-security\/small-to-medium-business\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Endpoint Security for Business<\/a> is up to the task, preventing even the 0-day exploits from completing their dirty work.<\/p>\n<p>But the timely patching of vulnerabilities remains critical. One of the most complex IT tasks, vulnerability management requires enhanced awareness and automation \u2013 both of which are offered by <a href=\"https:\/\/www.kaspersky.com\/advert\/business-security\/systems-management?redef=1&amp;THRU&amp;reseller=gl_kbusinesspost_pro_ona_smm__onl_b2b_kbusiness_lnk_______\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Lab\u2019s Systems Management (Available both as part of <u>Kaspersky Endpoint Security for Business Advanced<\/u> and as a standalone solution )<\/a>. This technology considerably simplifies the process for IT specialists, reducing the pressure of work and freeing up time to think and plan more strategically during their everyday duties.<\/p>\n<p>When you\u2019re the custodian of some really important secrets, being strategic in planning your defenses is not a luxury but an absolute necessity. Keeping track of shifts in the threat landscape using <a href=\"https:\/\/www.kaspersky.com\/enterprise-security\/intelligence-services\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Lab\u2019s Intelligence Reports and Datafeeds<\/a> allows you to be better prepared for what\u2019s to come. And running the ever-alert <a href=\"https:\/\/www.kaspersky.com\/advert\/enterprise-security\/anti-targeted-attacks?redef=1&amp;THRU&amp;reseller=gl_kbusinesspost_pro_ona_smm__onl_b2b_kbusiness_lnk_______\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Anti Targeted Attack Platform<\/a> \u2013 constantly watching over different levels of your IT infrastructure including network, endpoints and mailing system \u2013 helps provide early warnings when the enemy is at the gate.<\/p>\n<p>Kaspersky Lab\u2019s products detect components of Dropping Elephant\u2019s toolset under the following verdicts:<\/p>\n<ul>\n<li>Exploit.Win32.CVE-2012-0158<\/li>\n<li>Exploit.MSWord.CVE-2014-1761<\/li>\n<li>Trojan-Downloader.Win32.Genome<\/li>\n<li>HEUR:Trojan.Win32.Generic<\/li>\n<\/ul>\n<p>To know more about Dropping Elephant attack group, read the following <a href=\"https:\/\/securelist.com\/blog\/research\/75328\/the-dropping-elephant-actor\/?utm_medium=blg&amp;utm_source=kb_post_160708&amp;utm_campaign=ww_promo\" target=\"_blank\" rel=\"noopener\">blog post at Securelist<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>An Indian-speaking threat actor, Dropping Elephant chooses targets mainly in the Asian region, paying particular attention to Chinese government\/diplomatic organizations &#8211; and also to foreign embassies and diplomatic offices in China.<\/p>\n","protected":false},"author":610,"featured_media":15317,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,2994],"tags":[499,2442,729],"class_list":{"0":"post-15149","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-apt","10":"tag-dropping-elephant","11":"tag-espionage"},"hreflang":[{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/dropping-elephant\/15149\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/dropping-elephant\/15149\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/dropping-elephant\/15149\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.au\/blog\/tag\/apt\/","name":"APT"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/15149","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/users\/610"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/comments?post=15149"}],"version-history":[{"count":3,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/15149\/revisions"}],"predecessor-version":[{"id":26899,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/15149\/revisions\/26899"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/media\/15317"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/media?parent=15149"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/categories?post=15149"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/tags?post=15149"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}