'Mask' spying campaign unmasked

2014-02-11 11:00
Kaspersky Lab does analysis of malware threats at its offices in Moscow. (Duncan Alfreds, News24)

Kaspersky Lab does analysis of malware threats at its offices in Moscow. (Duncan Alfreds, News24)

Multimedia   ·   User Galleries   ·   News in Pictures Send us your pictures  ·  Send us your stories

Punta Cana - A computer security software firm has uncovered what it calls the first cyber espionage campaign believed to be started by a Spanish-speaking country, targeting government agencies, energy companies and activists in 31 countries.

Dubbed "The Mask", the campaign had operated undetected since 2007 and infected more than 380 targets before it stopped last week, Moscow-based Kaspersky Lab said on Monday.

The firm declined to identify the government suspected to be behind the cyber spying, but said it had been most active in Morocco, followed by Brazil, the UK, France and Spain.

The suspected involvement of a Spanish-speaking nation is unusual as the most sophisticated cyber spying operations uncovered so far have been linked to the US, China, Russia and Israel. Those nations have been said to be behind the Duqu, Gauss and Flame malware, for example.

Kaspersky Lab said the discovery of The Mask suggests that more countries have become adept in internet spying. The firm's researchers only came across the operation because it infected Kaspersky's own software.

Spying operation

"There are many super-advanced groups that we don't know about. This is the tip of the iceberg," Costin Raiu, director of Kaspersky's global research team, said in an interview on the sidelines of a conference sponsored by his company in the Dominican Republic.

Raiu said The Mask hit government institutions, oil and gas companies and activists, using malware that was designed to steal documents, encryption keys and other sensitive files, as well as take full control of infected computers.

The operation infected computers running Microsoft's Windows and Apple's Mac software, and likely mobile devices running Apple's iOS and Google's Android software, according to Kaspersky Lab.

The companies did not immediately respond to requests for comment.

Kaspersky Lab said it worked with Apple and other companies last week to shut down some of the websites that were controlling the spying operation.

The Russian-based company named the operation "The Mask" for the translation of the Spanish word "Careto", which appears in the malware code.

Among other things, The Mask hackers took advantage of a known flaw in Adobe Systems' ubiquitous Flash software that permitted attackers to get from Google's Chrome web browser into the rest of a target's computer, Raiu said. Adobe fixed the flaw in 2012, he said.

Government clients

A spokesperson for Adobe confirmed that the company released an update to Flash in April 2012 that fixed the vulnerability. She declined to comment on Kaspersky Lab's research on The Mask.

Raiu said The Mask attackers may have been aided by a booming grey market for undisclosed software flaws and the tools for exploiting them, known as "Zero day" exploits because the makers of affected software have no notice of the danger. Buyers of zero days often leave the software vulnerabilities unfixed in order to deploy spy software.

The Flash flaw had been uncovered in 2012 by a Paris-based company called Vupen, which specialises in finding such weaknesses. Vupen revealed the vulnerability at a hacking competition that year, but did not demonstrate how it can be exploited. Instead, Vupen said it would sell its research to its government clients.

Kaspersky Lab said The Mask was one of the few internet spying campaigns exposed to date that appear to have links to a zero day sale. Vupen Chief Executive Chaouki Bekrar disputed any connection to his company.

"Believe it or not, but there are many other companies selling zero days," Vupen said via e-mail.

Security experts have become increasingly concerned about the zero day market, where governments including the US are active buyers. A former top US cyber security official, Richard Clarke, said that deliberately leaving vulnerabilities unfixed puts US assets at risk.

Liam O'Murchu, a researcher at Symantec, said it was difficult to know who was behind The Mask.

"Just looking at the targets, it is not obvious who would want to target them; there is no obvious pattern," O'Murchu said via e-mail. "The code is professionally written, but it's even difficult to say whether it is written by a government or by a private company that sells this type of software."
Read more on:    cybercrime

Join the conversation!

24.com encourages commentary submitted via MyNews24. Contributions of 200 words or more will be considered for publication.

We reserve editorial discretion to decide what will be published.
Read our comments policy for guidelines on contributions.

24.com publishes all comments posted on articles provided that they adhere to our Comments Policy. Should you wish to report a comment for editorial review, please do so by clicking the 'Report Comment' button to the right of each comment.

Comment on this story
Comments have been closed for this article.

Inside News24

Traffic Alerts
There are new stories on the homepage. Click here to see them.


Create Profile

Creating your profile will enable you to submit photos and stories to get published on News24.

Please provide a username for your profile page:

This username must be unique, cannot be edited and will be used in the URL to your profile page across the entire 24.com network.


Location Settings

News24 allows you to edit the display of certain components based on a location. If you wish to personalise the page based on your preferences, please select a location for each component and click "Submit" in order for the changes to take affect.

Facebook Sign-In

Hi News addict,

Join the News24 Community to be involved in breaking the news.

Log in with Facebook to comment and personalise news, weather and listings.