Operation Orca - a cyber espionage diving in the ocean for at least six years

Presented at VB2017, Oct. 5, 2017, 9:30 a.m. (30 minutes)

An APT attack is often just the tip of the iceberg - researchers have to dive as deeply as possible in order to paint the whole picture. In 2011, one Japanese heavy industry firm, which is also one of biggest defence contractors in Japan, disclosed that it had been the target of APT attackers. Six years have now passed, during which time we have been investigating and tracking the group, and we believe that this APT group is still active. Furthermore, the group's main targets are not only in Japan, but also in Korea, India and Russia. The high-value intelligence for them is defence-related. In this talk, we will discuss how the group penetrates its targets and how it keeps enhancing its malware to avoid being detected. We will also demonstrate how victims are controlled, and the tools used. Moreover, we will describe the evolution of RAT and C&C communication protocols and how they make a great covert channel for evading network security devices. This presentation will cover the following: * The background of Operation Orca. * The technologies used in Operation Orca. * Victims and disaster assessment. * The attribution of Operation Orca. * Countermeasures against Orca. We will share our knowledge of the cutting-edge APT with attendees, and explore the skills and tools that the threat actors adopt. In the end, attendees will leave with a suitable defence strategy against Orca.

Presenters:

  • Shih-Hao Weng - Trend Micro
    Shih-Hao Weng Shih-Hao Weng is a senior threat researcher at Trend Micro. He has focused on targeted attack investigation, incident response, and threat solution research for more than 15 years.
  • Chia-Ching Fang - Trend Micro
    Chia-Ching Fang Chia-Ching Fang is a threat researcher at Trend Micro. He has over 12 years of experience in malware analysis, malicious document analysis, and vulnerability assessment. His current research focuses on targeted attacks and threat intelligence.

Links:

Similar Presentations: