Operation HangOver, Monsoon, Viceroy Tiger
Description
(Shadowserver Foundation) On Sunday March 17th 2013 the Norwegian newspaper Aftenposten reported that the telecommunications giant Telenor had filed a case with Norwegian criminal police (“KRIPOS”) over what was perceived as an unlawful intrusion into their computer network. The infection was reported to have been conducted via “spear phishing” emails sent to people in the upper tiers of management.
Initially, we had no information or visibility into this case. However, after some time Norwegian CERT (NorCERT) shared some data from the event, which included md5 hashes of malicious files and information about which Command and Control servers were used.
However, the data we were given acted as a starting point for more data mining, and within a short period of time it became obvious that we were seeing a previously unknown and very extensive infrastructure for targeted attacks. This paper is the result of the ensuing investigation.
The samples we have uncovered seem to have been created from approximately September 2010 until the present day. It appears 2012 was a very active year for this group, which saw escalation not only in numbers of created malware files but also in targets. There is no sign that the attacks will slow down in 2013, as we see new attacks continuously.
In a great number of isolated cases and contexts, the word “Appin” shows up and there seems to be some connection with the Indian security company called Appin Security Group.
Names
Name | Name-Giver |
---|---|
Operation HangOver | Shadowserver Foundation |
Monsoon | Forcepoint |
Viceroy Tiger | CrowdStrike |
Neon | ? |
Country
Motivation
- Information theft and espionage
First Seen
2010
Observed Sectors
Observed Countries
- Austria
- Bangladesh
- Canada
- China
- France
- Germany
- India
- Indonesia
- Iran
- Jordan
- Kuwait
- Myanmar
- Norway
- Oman
- Panama
- Pakistan
- Poland
- Romania
- Russia
- Singapore
- Sri Lanka
- Taiwan
- Thailand
- UAE
- UK
- USA
- Africa and Far East
Tools
Operations
- 2020-01: Updated BackConfig Malware Targeting Government and Military Organizations in South Asia https://unit42.paloaltonetworks.com/updated-backconfig-malware-targeting-government-and-military-organizations/
Information
- https://keybase.pub/kung_foo/papers_and_presentations/Unveiling_an_Indian_Cyberattack_Infrastructure.pdf
- https://paper.seebug.org/papers/APT/APT_CyberCriminal_Campagin/2013/Unveiling%20an%20Indian%20Cyberattack%20Infrastructure%20-%20appendixes.pdf
- https://www.darkreading.com/attacks-breaches/hangover-persists-more-mac-malware-found/d/d-id/1140147
- https://www.forcepoint.com/sites/default/files/resources/files/forcepoint-security-labs-monsoon-analysis-report.pdf
- https://unit42.paloaltonetworks.com/threat-assessment-hangover-threat-group/
- https://www.sentinelone.com/labs/elephant-hunting-inside-an-indian-hack-for-hire-group/
Mitre Attack
Playbook
Other Information
Uuid
af67327e-b4c9-443b-bcc9-3fb2efd41401
Last Card Change
2023-11-30