'Hackers for hire' group Hidden Lynx on mission to collect corporate data

News by Danielle Walker

Researchers believe that a group of 'hackers for hire' based in China are linked to numerous high-profile attacks on US companies, including those against Google and security firm Bit9.

Researchers believe that a group of 'hackers for hire' based in China are linked to numerous high-profile attacks on US companies, including those against Google and security firm Bit9.

On Tuesday, Symantec released findings that a network of sophisticated attackers, dubbed the 'Hidden Lynx' group, has been active since at least 2009 and continues to target organisations in the US and in many other countries.

Symantec estimated that between 50 to 100 individuals make up the Hidden Lynx group, as a number of campaigns are being actively carried out simultaneously. Since 2011, Hidden Lynx has targeted hundreds of organisations around the world, with more than half, 52 per cent, being in the US.

Due to the diverse array of entities infected by the group, whose mission seems to be to collect intellectual property and other corporate intelligence, Symantec came to the conclusion that Hidden Lynx is likely a professional group of hackers willing to provide their services for pay.  

Currently, Hidden Lynx primarily uses two backdoor Trojans: Moudoor – a customised version of Gh0st RAT malware that the group used against a wide range of industries, including financial, government, health care and education sectors; and Naid, specially-crafted malware used to infiltrate entities in the defence sector.

According to a blog posted by Symantec on Tuesday, Naid is dispatched only on 'elite' missions and 'when failure is not an option'.

Symantec also determined that Hidden Lynx was operating in China and consisted of two teams, named Naid and Moudoor, after the malware the saboteurs used. The malware share technical similarities with other Trojans linked to China-based espionage campaigns, the firm found.

Symantec discovered that Naid was signed with a Bit9 certificate – revealing new details on the breach the company disclosed in February. That month, Bit9 said hackers had accessed its code-signing certificates, enabling attackers to digitally sign malware and distribute them to the firm's clients.

In addition, Symantec found that Naid was downloaded in the 2010 Aurora attacks, to which Google fell victim. The Trojan was downloaded in stage three of the attack, after the Hydraq Trojan infected victims' systems.

In their years of use, both Naid and Moudoor have leveraged exploits in Microsoft products, including Internet Explorer, and in Oracle's Java platform.

In an interview with SCMagazine.com on Tuesday, Kevin Haley, director of security response at Symantec, said the group is skilled and highly resourced given the fact they've been quick to “throw away” zero-days after details about the threats become public knowledge, unlike some hacker groups that continue to make use of vulnerabilities with available patches.

“The unique thing they do with zero-days is they are willing to throw them away once everybody knows about them,” Haley said. “Even when the patch comes out, there's still time before many users will patch. But for these guys, as soon as anybody knows about it, they stop using [the exploit], and that shows how stealthy they are, because there's a potential of getting caught.”

Haley warned that watering hole attacks appear to be the attack vector of choice for Hidden Lynx hackers, meaning the group infects legitimate websites frequently visited by their targets.

He also advised that entities patch their software as soon as possible, and not underestimate their value to hackers looking for a way into organisations.

“A lot of companies assumed they wouldn't be targeted,” Haley said. “Ultimately, they might not want you, but they may want someone you do business with. If it ends up that one of your partner businesses has been attacked through you, that could be devastating for your business relationship with them,” Haley warned.


Find this article useful?

Get more great articles like this in your inbox every lunchtime

Video and interviews