Poison Ivy malware back in vogue

Networks Asia Staff
28 Aug 2013
00:00

FireEye has warned of the resurgence of Poison Ivy, a malware Remote Access Tool (RAT) that has remained popular and effective eight years after its original release—attacking dozens of Fortune 1000 firms.

The company has published a report into the malware, and is also releasing Calamine, a set of free tools to help organizations detect possible Poison Ivy infections.

“Remote access tools may be the hacker’s equivalent of training wheels,” said Darien Kindlund, manager of threat intelligence at FireEye. “But dismissing this common breed of malware could be a costly mistake. Despite their reputation as a software toy for novice attackers, RATs remain a linchpin of many sophisticated cyber attacks and are used by numerous threat actors. Today, we see hundreds of attacks using Poison Ivy targeting very high profile enterprises.”

Poison Ivy has been used in several high-profile malware campaigns, most famously, the 2011 compromise of RSA SecurID data. In the same year, Poison Ivy powered a coordinated attack dubbed “Nitro” against chemical makers, government offices, defense firms, and human rights groups.

The FireEye report identifies several ongoing nation-state threat actors currently using Poison Ivy, including:

  • admin@338: Active since 2008, this actor mostly targets the financial services industry. FireEye has also observed activity from this actor in telecom, government, and defense sectors.
  • th3bug: First detected in 2009, FireEye has observed this actor targeting a number of industries, primarily higher education and healthcare.
  • menuPass: Also first detected in 2009, FireEye research suggests that this actor targets U.S. and overseas defense contractors.

Calamine is designed to help security professionals identify telltale indicators of a Poison Ivy attack - including the attacker’s Poison Ivy process mutex and password as well as decoded command and control traffic - to identify exfiltration/lateral movement, and a timeline of Poison Ivy malware activity.

Related content

Follow Telecom Asia Sport!
Comments
No Comments Yet! Be the first to share what you think!
This website uses cookies
This provides customers with a personalized experience and increases the efficiency of visiting the site, allowing us to provide the most efficient service. By using the website and accepting the terms of the policy, you consent to the use of cookies in accordance with the terms of this policy.