Researchers in the U.S. and Canada have tracked and documented a sophisticated cyber-espionage network based in China, dubbed Shadow, that targeted computers in several countries, including systems belonging to the Indian government and military.
The Shadow network of compromised computers was detailed in a report released Tuesday by the Information Warfare Monitor — a project involving researchers at the University of Toronto’s Munk Center for International Studies and The SecDev Group — and the Shadowserver Foundation. Information Warfare Monitor is the group that uncovered and documented GhostNet, a similar cyber-espionage ring, last year.
The release of the latest report, which details the scope of the Shadow network and discusses some of the Indian government documents that were stolen, was first covered by The New York Times.
“We were able to document another network of compromised government, business, and academic computer systems in India, the Office of the Dalai Lama, and the United Nations as well as numerous other institutions, including the Embassy of Pakistan in the United States,” wrote Nart Villeneuve, the SecDev’s chief research officer and a research fellow at the Citizen Lab at the University of Toronto’s Munk Center for International Studies, in a blog post.
Shadow is the latest example of cyber-espionage efforts linked to China. Others include attacks on Google’s Gmail system that ultimately led the company to close the censored search engine it built for China. Like other such networks, such as GhostNet, targeted malware is believed to have allowed the attackers to compromise specific computer systems.
The cyber-espionage ring behind the Shadow network, which was traced to Chengdu, in China’s Sichuan province, used social media and blogs to control computers they had compromised using malware.
“In total, we found three Twitter accounts, five Yahoo Mail accounts, 12 Google Groups, eight Blogspot blogs, nine Baidu blogs, one Google Sites and 16 blogs on blog.com that were being used as part of the attacker’s infrastructure,” the report said, noting that those services were being misused but were not compromised.
The attackers used those services to circumvent security systems that might otherwise have blocked their access to compromised computers.
“The use of social networking platforms, blogs and other services offered by trusted companies allows the attackers to maintain control of compromised computers even if direct connections to the command and control servers are blocked at the firewall level,” it said.
The primary focus of the attackers appears to be the Indian government.
The “vast majority” of the 44 compromised computers identified by the researchers are either in India or belong to Indian government and military organizations, the report said, citing an analysis of stolen documents recovered from the Shadow network. …