back to article Be wary of that Russian. He might HAMMERTOSS a software nasty at you

Security researchers have blown the lid on another Russian cyberspy crew, rated as the most sophisticated yet by security firm FireEye. APT29 – which has only been operational since around the end of last year – uses a strain of malware called Hammertoss. "The group has demonstrated an understanding of network defenders’ …

  1. elDog

    Neat sleuthing there! How about some breaks?

    There may be some additional hints as to the perps if their fingers seem a bit more leaden around mid-morning and all afternoon (Moscow time.)

  2. Gordon 10

    eerrr

    What hacker worth their salt works office hours?

    Or are they subtley implying they are state sponsored?

    1. Martin Summers Silver badge

      Re: eerrr

      I would say they are 'subtley' implying that yes...

      1. Anonymous Coward
        Anonymous Coward

        Re: eerrr

        Of course it's completely beyond the wits of any other nation's intelligence agency to deliberately run their C&C operations outside their nation's normal working hours... or from foreign soil...

    2. organiser

      Re: Argies are too late @Flocke Kroes

      The unions won't allow them to work outside of standard office hours.

  3. Destroy All Monsters Silver badge
    Holmes

    Miss Kusanagi explains....

    The malware beacons to custom Twitter handles, where it scans for specific links and hashtags, then goes to Github where it obtains an image that APT29 applies steganography to, to decrypt commands, and finally executes commands on the victim machine before uploading to popular cloud storage services.

    This makes as much sense as anything from "Ghost In The Shell: Man-Machine Interface". Can I have this explained, please?

    1. Someone

      Mr Saito explains.…

      It seems fairly clear to me, unless I've got it wrong.

      The malware looks at the posts made by certain Twitter accounts. The account usernames/handles may be fixed or may be generated algorithmically. I'll agree that the use of the word "beacon" isn't clear. The malware could be looking for either public tweets or direct messages that already exist, or it could make tweets or direct messages itself and then wait for responses.

      It looks for posts containing certain hashtags and links. Similarly, the hashtags and the format of the links may be fixed or generated algorithmically.

      It uses the information in those posts to create links to images stored on Github. The links may have been placed directly into the posts, or the links may be constructed algorithmically from parts of one or more post. It fetches the images from Github. The images contain commands hidden within them.

      Some commands will tell the malware what data to exfiltrate, what cloud storage service to send that data to, the account name on that cloud storage service and the password for that account.

      The tweets or direct messages, images and cloud storage accounts are created by members of APT29, to be picked up and used by the malware.

      In principle, none of this is hard to get working. What's hard is to make it reliable. The software is trying to behave like a user. There are likely to be lots of horrible edge cases. And if one of the services changes slightly, a user will normally take it in their stride. Software is much more brittle. You don't want all your hard work to crumble because Twitter decides to reformat some of its HTML or tweak an API.

  4. Anonymous Coward
    Anonymous Coward

    Hmmm, isn't it more likely that.....

    state sponsored hacking has become a mainstream form of IT employment, complete with pension plans, scheduled coffee breaks, year-end bonuses and other nice perks?

    I still remember when such things were offered by major corporations, but today they only seem to offer massive layoffs, punctuated by temporary employment opportunities for the lowest bidders. Of course, if you want to help build Skynet and have the right connections, you might find some work too.

    Face it, the opportunity to work long, stressful hours in a sunless basement (waiting for the knock on the door) will never attract the best talent.

    So proletariat of the world, unite ! You have nothing to lose but your chains! And remember, come the revolution, the bean counters will be the first against the wall!

    So kids, if you are seeking a lucrative career in IT when you grow up, perhaps you should start looking for a black-hat internship in Moscow or St-Petersburg. You don't even have to move out there. Of course, you could always TRY to bag a more secure, above-ground job option out here in the Wild, Wild West.

    Funny how that works, innit?

    (hollow laughter in background)

    1. Anonymous Coward
      Anonymous Coward

      Re: Hmmm, isn't it more likely that.....

      Well, it's all tax-payer sponsored (i.e. PEONS SHALL PAY), so it is bound to either dry up or terminate at the business end of a pitchfork eventually.

  5. Anonymous Coward
    Anonymous Coward

    Ah, a report from the 'Reds Under the Bed' organisation FireEye. There are just so many holes in the report it could be a cover up for the NSA or any other US government agency.

  6. Your alien overlord - fear me

    Olympic effort

    If you look at the Olympics medal table for hammertoss - last 4 gold winners = women 2 Russian and 2 ex-CCCP, men = 3 ex-CCCP and 1 from Japan.

    No wonder the malware does gymnastics to get anything done....

  7. Jediben
    Devil

    So this malware is totally dependent on access to Twitter? Just as well, it might cause harm to real people otherwise!

  8. disgruntled yank

    The holidays may be convincing

    But in my experience, many of the 20-somethings in the US eastern time zone prefer to work at least London hours, and maybe Moscow hours.

POST COMMENT House rules

Not a member of The Register? Create a new account here.

  • Enter your comment

  • Add an icon

Anonymous cowards cannot choose their icon

Other stories you might like