Sophos, a global leader of innovative security solutions for defeating cyberattacks, recently released “Pacific Rim,” a report detailing its defensive and counter-offensive operation over the last five years with multiple interlinked nation-state adversaries based in China targeting perimeter devices, including Sophos Firewalls.
The attackers used a series of campaigns with novel exploits and customized malware to embed tools to conduct surveillance, sabotage and cyberespionage as well as overlapping tactics, tools and procedures (TTPs) with well-known Chinese nation-state groups including Volt Typhoon, APT31 and APT41.
The adversaries targeted both small and large critical infrastructure and government targets, primarily located in South and South-East Asia, including nuclear energy suppliers, a national capital’s airport, a military hospital, state security apparatus, and central government ministries.
Throughout Pacific Rim, Sophos X-Ops, the company’s cybersecurity and threat intelligence unit, worked to neutralize the adversaries’ moves and continuously evolved defenses and counter-offensives.
After Sophos successfully responded to the initial attacks, the adversaries escalated their efforts and brought in more experienced operators. Sophos subsequently uncovered a vast adversarial ecosystem.
While Sophos released details starting in 2020 on the campaigns associated, including Cloud Snooper and Asnarök, the company is sharing the overall investigation analysis to raise awareness of the persistence of Chinese nation-state adversaries and their hyperfocus to compromise perimeter, unpatched and end-of-life (EOL) devices, often via zero-day exploits they are creating for those devices.
Sophos is also encouraging all organizations to urgently apply patches for vulnerabilities discovered in any of their internet-facing devices and to migrate any older unsupported devices to current models. Sophos regularly updates all of its supported products based on new threats and indicators of compromise (IoCs) to protect customers. Sophos Firewall customers are protected via rapid hotfixes that are now turned on by default.
“The reality is that edge devices have become highly attractive targets for Chinese nation-state groups like Volt Typhoon and others as they look to build operational relay boxes (ORBs) to obfuscate and support their activity. This includes directly targeting an organization for espionage, or indirectly leveraging any weak points for onward attacks – essentially becoming collateral damage. Even organizations that are not targets are getting hit. Network devices designed for businesses are natural targets for these purposes – they are powerful, always on, and have constant connectivity,” said Ross McKerchar, CISO at Sophos.
“When a group seeking to build a global network of ORBs targeted some of our devices, we responded by applying the same detection and response techniques we use to defend our corporate endpoints and network devices. This allowed us to burn multiple operations and tap into a valuable stream of threat intelligence that we applied to protect our customers from both future widespread attacks and highly targeted operations.”
Highlights of the Report
- On Dec. 4, 2018, a low-privileged computer connected to an overhead display began to scan the Sophos network—seemingly on its own—at the India headquarters of Cyberoam, a company Sophos acquired in 2014. Sophos found a payload quietly listening for specialized inbound internet traffic on the computer that contained a novel type of backdoor and a complex rootkit — “Cloud Snooper.”
- In April 2020, after several organizations reported a user interface pointing to a domain with “Sophos” in its name. Sophos worked with European law enforcement, which tracked down and confiscated the server the adversaries used to deploy malicious payloads in what Sophos later dubbed Asnarök. Sophos neutralized Asnarök, which the company was able to attribute to China, by taking over the malware’s command and control (C2) channel. It also allowed Sophos to neutralize a planned wave of botnet attacks.
- After Asnarök, Sophos advanced its intelligence operations by creating an additional threat actor tracking program focused on identifying and disrupting adversaries looking to exploit Sophos devices deployed in customer environments; the program was built using a combination of open-source intelligence, web analytics, telemetry monitoring, and targeted kernel implants deployed to the attackers’ research devices.
- Next, the attackers showed an increasing level of persistence, upleveling their tactics and deploying increasingly stealthy malware. However, using its threat actor tracking program and enhanced telemetry gathering capabilities, Sophos was able to pre-empt several attacks and obtain a copy of a UEFI bootkit and custom exploits before they could be deployed broadly.
- A few months later, Sophos tracked some of the attacks to an adversary who has demonstrated links to China and Sichuan Silence Information Technology’s Double Helix Research Institute in the country’s Chengdu region.
- In March 2022, an anonymous security researcher reported a zero-day remote code execution vulnerability, designated CVE-2022-1040, to Sophos as part of the company’s bug bounty program. Further investigation revealed that this CVE was already being exploited in the wild in multiple operations—operations that Sophos was then able to stop impacting customers. After deeper analysis, Sophos determined the person reporting the exploit may have had a connection to the adversaries. This was the second time Sophos received a suspiciously timed “tip” about an exploit before it was used maliciously.
Chinese nation-state groups pose a persistent threat to critical infrastructure globally, according to McKerchar.
“Recent advisories from CISA have made it clear that Chinese nation-state groups have become a perennial threat to nations’ critical infrastructure,” McKerchar stated.
He emphasized the vulnerability of small- and medium-sized businesses, which often serve as weak links in the supply chain for critical infrastructure.
“These businesses often have fewer resources to defend against such sophisticated threats,” McKerchar said.
He noted that Chinese adversaries frequently employ tactics to establish a foothold, making it difficult to remove them once entrenched.
“The modus operandi of China-based adversaries is creating long-term persistence and complex obfuscated attacks,” McKerchar explained.
He warned that these groups will persist in their operations unless effectively disrupted.
The cybersecurity industry has commended Sophos for its Pacific Rim Report, which provides critical insights into the advanced tactics used by state-sponsored cyber actors from the People’s Republic of China (PRC).
Jeff Greene, executive assistant director for cybersecurity at the Cybersecurity and Infrastructure Security Agency (CISA), highlighted the importance of the report in aiding global cyber defense efforts.
“Through the JCDC, CISA obtains and shares crucial intelligence on the cybersecurity challenges we face, including the advanced tactics and techniques used by PRC state-sponsored cyber actors,” Greene said.
He noted that Sophos’ research helps the global cyber community understand the widespread exploitation of edge network devices and develop mitigation strategies.
Greene urged software manufacturers to adopt CISA’s “Secure by Design” principles to address vulnerabilities like SQL injections and memory safety flaws, which are frequently exploited.
“We encourage others to take the pledge and to review our alerts on how to eliminate common classes of defects,” Greene added.
Eric Parizo, managing principal analyst with Omdia’s cybersecurity research group, praised Sophos for its long-term efforts in adversarial research.
“Many cybersecurity vendors conduct adversarial research operations, but few are able to successfully do so against such a challenging set of nation-state adversaries for such a long period of time,” Parizo said.
He commended Sophos for delivering actionable insights that will strengthen defenses for its customers now and in the future.
Hielke Bontius, head of operations at the Netherlands’ National Cyber Security Centre (NCSC-NL), emphasized the collaborative nature of the investigation.
“At NCSC-NL, one of our tasks is to share information and connect organizations,” Bontius said.
He stressed that fostering communication between national and international organizations is vital to improving cyber resilience.
Bontius expressed satisfaction with NCSC-NL’s contribution to the Sophos investigation.
Advice for Defenders
Organizations should expect all internet-facing devices are prime targets for nation-state adversaries, especially those devices in critical infrastructure. Sophos encourages organizations to take the following actions to strengthen their security posture.
- Minimize internet-facing services and devices when possible
- Prioritize patching with urgency for internet-facing devices and monitor these devices
- Enable hotfixes for edge devices to be allowed and applied automatically
- Collaborate with law enforcement, public-private partners, and government to share and act on relevant IoCs
- Create a plan for how your organization deals with EOL devices
“We need to work collaboratively across the public and private sector, law enforcement and governments, and the security industry, to share what we know about these adversarial operations. Targeting the very same edge devices that are deployed to protect networks is a bold and clever tactic. Organizations, channel partners and Managed Service Providers need to understand that these devices are top targets for attackers and should ensure they are appropriately hardened, and critical patches are applied as soon as they are released. In fact, we know that attackers are actively hunting for EOL devices. Vendors play a big part here, too. They need to help customers by supporting reliable and well-tested hot fixing, making it easy to upgrade from EOL platforms, systematically refactoring or removing legacy code that can harbor lingering vulnerabilities, continuously improving secure by default designs to offload the customer burden of hardening, and monitoring the integrity of our deployed devices,” concluded McKerchar.
The cybersecurity landscape demands collaborative efforts across sectors to combat evolving threats, according to McKerchar.
“We need to work collaboratively across the public and private sector, law enforcement and governments, and the security industry, to share what we know about these adversarial operations,” McKerchar said.
He noted that targeting edge devices, often deployed to protect networks, is a bold and sophisticated tactic employed by attackers.
Organizations, channel partners, and Managed Service Providers must recognize that edge devices are prime targets and ensure they are adequately hardened, with critical patches applied promptly.
McKerchar emphasized the urgency of addressing end-of-life (EOL) devices, as attackers are actively hunting for vulnerabilities in outdated systems.
He highlighted the critical role of vendors in aiding customers by offering reliable and well-tested fixes, facilitating upgrades from EOL platforms, and systematically removing legacy code that may contain hidden vulnerabilities.
“Vendors play a big part here, too,” McKerchar said.
He urged vendors to continuously improve secure-by-default designs to ease the burden on customers and enhance the monitoring of deployed devices’ integrity.
Sophos’ insights underscore the need for a united approach to strengthen defenses against increasingly bold and innovative cyber adversaries.