Hacker

FBI memo warns of malware possibly linked to hack at Sony Pictures

Pro
(Image: Stockfresh)

3 December 2014

A Flash Alert issued by the FBI on Monday is warning those within its distribution circle about a type of malware that has the ability to destroy any system it infects. The memo, #A-000044-MW, was obtained by Salted Hash from a source that wishes to remain anonymous.

Those who have seen the memo, including the group where it was first shared, are speculating that it’s related to the incident at Sony Pictures.

The speculation is based in part on the recent theory that North Korea is behind the attack on Sony Pictures due to possible outrage over the movie The Interview, and the malware’s resource section, which uses the Korean language. Moreover, similar malware was used in attacks on South Korea in 2013.

In both cases – South Korea then, and Sony Pictures now – the malware forced the victim’s networks offline according to local reports out of Korea and Sony’s own employees.

While pulling the plug and shutting down systems is usually frowned upon during an active incident, administrators targeted by this malware have little choice. Given its nature, it’s likely the only option available to Sony when the attacks started last week was to disable access to anything with an IP – or watch as the device is infected and erased.

This theory somewhat corroborated by employee reports last week, stating that VPN and Wi-Fi access was disabled almost immediately after the incident started.

The FBI says that the malware will make it “extremely difficult and costly, if not impossible, to recover the data using the standard forensic methods.”

Once installed on the victim’s system, by way of a malicious email attachment in most cases, the malware – called a wiper in some circles – will initiate a beacon and phone home.

The malware described by the FBI relies on hardcoded IP addresses (C&C servers) in Italy, Thailand, or Poland, and connect them on either port 8080 or 8000. The malware will attempt to make connections every 10 minutes to each of the IPs. If that fails, a two-hour sleep command is issued, after which the computer is shutdown and rebooted.

Read More:


Back to Top ↑

TechCentral.ie