Jun 5, 2019

Notorious Platinum hacker group resurfaces

The secretive Platinum group — hackers known for advanced tools and thought to be state sponsored — has resurfaced, according to Kaspersky.

Why it matters: Platinum is a formidable group. When Microsoft first profiled them in 2016, it was for malware that the group had used undetected for at least seven years — an eternity in hacker time and evidence of how talented the group is.

  • The Kaspersky discovery, too, has been used for at least seven years.

Background: Little is known about Platinum. What is known is pretty formidable.

  • Platinum burst on to the scene with malware taking advantage of Windows "hotfixing," a feature that allowed computers to be updated without rebooting. That malware used four previously unseen security bugs. Most malware don't use any due to the extremely high cost for each one.
  • In 2017, Platinum hackers took advantage of Intel's management engine, a second processor in Intel CPUs intended to be used by network administrators.

Details: The new Platinum discovery also has some unique features, especially in how the command-and-control server sent commands to the malware hidden in the HTML code of a website that appeared to be a domain for sale.

  • HTML ignores tabs and spaces in the code. It also ignores the order of certain formatting commands. For example, if you say text should be at the center of a page and colored white, it is the same as saying text should be white and at the center of a page.
  • Commands were encoded into the webpage in the form of ordered commands, spaces and tabs.
  • Kaspersky notes in a press release that would make commands "almost impossible" to detect in network traffic.

Victims: Kaspersky caught the new malware targeting south and southeast Asian "diplomatic, government and military entities." That's in line with what Microsoft reported in 2016.

Go deeper