We calculated the statistics and discovered that there were 312,000 legitimate WatchGuard certificates, but just over 50 Cyclops Blink custom certificates. That is how we identified the other addresses of infected devices, determined which organizations they belonged to, and warned the potential victims about the threat.
It is crucial that researchers follow the principles of engineering neutrality, which is not a straightforward issue. About two years ago,
Facebook released a report about the notorious APT32 group, also called OceanLotus and linked to the Vietnamese government. In the report, the experts tried to link the hackers to a local IT company, but they did not provide any additional attribution data in the post. Despite our business interests in the region, we found and confirmed a link between APT32 and the IT company based on documented digital fingerprints. We shared our findings on
Twitter. I believe that such information should be published openly and made available to all researchers, no matter the country involved. Security is about data. That is why it shocks me when someone says: "We are no longer exchanging information with this person or entity". Do you realise that someone with whom you have decided to cut off all contact could warn you about an attack tomorrow?
The speed at which data from particular groups is replenished is directly related to their skill levels as hackers. In the case of Iranian groups, we are likely to find some of their domains and servers and successfully track them in the future. Analysing the activities of advanced groups like APT28 and Dark Halo is much more difficult. The results also depend on the tools that the group uses. On the one hand, custom tools are easier to detect. But as soon as they are discovered, analysts start examining them very actively, so the next time that the tool is found, it is more easily attributed to the corresponding group and the case is solved. On the other hand, the situation is worse when it comes to publicly available tools. For example,
CobaltStrike — which is well known to all — it’s a a framework for penetration tests that means it can be used for attacks on computers. It is often used by cybercriminals and even pro-government APTs because they think it will help them blend in with other attackers and not stand out. Yet when we see how the attackers are running this server and what commands they are executing, it becomes obvious who is doing what. It's not easy to get away from us…