We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message
80,259 News Articles

Researchers find TeamViewer-based cyberespionage operation

A group of attackers uses the TeamViewer remote access tool to spy on high-profile targets, researchers say

Security researchers have uncovered yet another ongoing cyberespionage operation targeting political and human rights activists, government agencies, research organizations and industrial manufacturers primarily from Eastern European countries and former Soviet Union states.

The attacker group behind the campaign was dubbed TeamSpy because they use a malware toolkit built around the legitimate TeamViewer remote access application in order to control infected computers and extract sensitive information from them.

The operation was analyzed by researchers from the Laboratory of Cryptography and System Security (CrySyS Lab) of the Budapest University of Technology and Economics, who collaborated with several antivirus companies, including Kaspersky Lab, Symantec and ESET.

CrySyS Lab launched its investigation after being notified by the Hungarian National Security Authority about an attack against a high-profile Hungarian government target.

Evidence collected so far suggests that parts of the attack toolkit have been used since at least 2010, CrySyS Lab said in a report published Wednesday. "Many of the victims appear to be ordinary users, but some of the victims are high profile industrial, research, or diplomatic targets, including the case that triggered our investigation."

Some example of high-profile targets include: an electronics manufacturing company from Iran with ties to the Iranian government (April 2010), an unnamed high-profile Hungarian government victim (November 2012), the embassy of an unnamed NATO/EU state in Russia (March 2013), multiple research and educational organizations from France and Belgium (March 2013) and an industrial manufacturer from Russia (March 2013).

The toolkit contains a copy of the legitimate and digitally-signed TeamViewer executable file, a TeamViewer_Resource_ru.dll file that's used for Russian-language localization of the program, a malicious component called avicap32.dll that handles communication with the command and control (C2) servers and ensures the malware's persistence on the system and an encrypted configuration file called tv.cfg.

The malware is designed to download and execute other modules from the C2 servers as instructed by the attackers. The additional modules can perform various tasks including recoding keystrokes in various processes and taking screen shots, gathering information about the system and local accounts, grabbing the history of attached devices from iTunes and scanning the local hard disk and remote network shares for specific file types.

The file searching modules scan for documents (*.doc, *.rtf, *.xls, *.mdb, *.pdf), disk image files (*.tc, *.vmdk), files containing encryption keys (*. pgp, *.p12), as well as files that contain the words "password" or "secret" in English, Russian or Georgian.

Evidence found on the operation's command and control (C2) servers suggests that the TeamSpy gang is also responsible for older attack campaigns that used self-made malware tools and might date as far back as 2004. Some of those campaigns were a mix of targeted attacks and cybercrime activities like online banking fraud, the CrySyS researchers said.

Some of the more recent TeamViewer-based campaigns also targeted users from many other countries in Europe, the Middle East, Africa, North America and Asia. The campaigns were marked with unique ID numbers on the C2 servers and there are clear indications that different campaigns targeted different regions, the CrySyS researchers said.

There is strong evidence inside the malware components and the C2 infrastructure that the attackers are Russian-language speakers, security researchers from Kaspersky Lab, said in their own report on TeamSpy.

Some aspects of the operation, like the file search keywords and the use of Russian terms, are reminiscent of a different cyberespionage campaign called Red October, the Kaspersky researchers said. However there are no direct links between the two operations at the moment, they said.

"If we are to compare it to Red October, the TeamSpy Crew and the tools they use are far less sophisticated and professional," the Kaspersky researchers said. "Unlike Red October, where many IPs could be traced to governments and governmental institutions based on WHOIS data, in this case, the vast majority of IPs belong to ISPs which do not advertise such information. In case of TeamSpy crew, except for a very few cases, the identity of the victims remains a mystery."


IDG UK Sites

Best Black Friday 2014 tech deals: Get bargains on smartphones, tablets, laptops and more

IDG UK Sites

Tomorrow's World today (or next year)

IDG UK Sites

See how Trunk's animated ad helped Ade Edmondson plug The Car Buying Service

IDG UK Sites

Yosemite tips: Complete Guide to OS X Yosemite