Hades
Description
(Kaspersky) In March 2018 we published our research on Olympic Destroyer, an advanced attack that hit organizers, suppliers and partners of the Winter Olympic Games 2018 held in Pyeongchang, South Korea. Olympic Destroyer was a cyber-sabotage attack based on the spread of a destructive network worm. The sabotage stage was preceded by reconnaissance and infiltration into target networks to select the best launchpad for the self-replicating and self-modifying destructive malware.
We are calling the actor behind the Olympic Destroyer attack – “Hades”. We have previously emphasized that Hades is different from other threat actors because the whole attack was a masterful operation in deception. Despite that, the attackers made serious mistakes, which helped us to spot and prove the forgery of rare attribution artefacts. The attackers behind Olympic Destroyer forged automatically generated signatures, known as Rich Header, to make it look like the malware was produced by Lazarus Group, Hidden Cobra, Labyrinth Chollima APT, an actor widely believed to be associated with North Korea. If this is new to the reader, we recommend a separate blog dedicated to the analysis of this forgery.
Some of the TTPs and operational security used by Hades during the Olympic Destroyer attack bear a certain resemblance to Sofacy, APT 28, Fancy Bear, Sednit APT group activity. When it comes to false flags, mimicking TTPs is much harder than tampering with technical artefacts. It implies a deep knowledge of how the actor being mimicked operates as well as operational adaptation to these new TTPs. However, it is important to remember that Hades can be considered a master in the use of false flags: for now we assess that connection with low to moderate confidence.
Names
Name | Name-Giver |
---|---|
Hades | Kaspersky |
Country
Sponsor
State-sponsored, GRU
Motivation
- Sabotage and destruction
- Financial crime
First Seen
2017
Observed Sectors
Observed Countries
Tools
Operations
- 2019-06: Hades, the actor behind Olympic Destroyer is still alive https://securelist.com/olympic-destroyer-is-still-alive/86169/
- 2020-02: Operation “TrickyMouse” Attacks pretend to be from the Center for Public Health of the Ministry of Health of Ukraine and deliver bait document containing the latest news regarding COVID-19. A backdoor written in C# gets dropped by malicious macro code to perform remote control. https://twitter.com/RedDrip7/status/1230683740508000256 https://mp.weixin.qq.com/s/o6KC0k43AuOY5F8FKGbmMg
Counter Operations
- 2020-10: Six Russian GRU Officers Charged in Connection with Worldwide Deployment of Destructive Malware and Other Disruptive Actions in Cyberspace https://www.justice.gov/opa/pr/six-russian-gru-officers-charged-connection-worldwide-deployment-destructive-malware-and
Information
Other Information
Uuid
74367856-09d1-44d6-bff1-cb72a9514e11
Last Card Change
2023-06-22