日期:2014-12-04 14:44


SAN FRANCISCO — For more than a year, a group of cybercriminals has been pilfering email correspondence from more than 100 organizations — the vast majority publicly traded health care or pharmaceutical companies — in apparent pursuit of information significant enough to affect global financial markets.
The group's activities, detailed in a report released Monday by FireEye, the Silicon Valley security company, shed light on a new breed of criminals intent on using their hacking skills to gain a market edge in the pharmaceutical industry, where news of clinical trials, regulatory decisions or safety or legal issues can affect a company's stock price.

Starting in mid-2013, FireEye began responding to intrusions at publicly traded companies — two-thirds of them, it said, in the health care and pharmaceutical sector — as well as advisory firms, such as investment banking offices or companies that provide legal or compliance services.
The attackers, whom FireEye named “Fin4” because of their focus on the financial sector, appear to be native English speakers, based in North America or Western Europe, who are well-versed in the Wall Street vernacular. Their email lures are precisely tailored toward each victim, written in flawless English and carefully worded to sound as if they were sent by someone with an extensive background in investment banking and with knowledge of the terms those in the industry employ.
Different groups of victims — frequently including top-level executives; legal counsel; regulatory, risk and compliance officers; researchers; and scientists — are sent different emails. Some senior executives have been duped into clicking on links sent from the accounts of longtime clients, in which the supposed client reveals that they found an employee's negative comments about the executive in an investment forum.
In other cases, attackers have used confidential company documents, which they had previously stolen, as aids in their deception. In some incidents, the attackers have simply embedded generic investment reports in their emails.
In each case, the links or attachments redirect their victim to a fake email login page, designed to steal the victim's credentials, so that the attacker can log into and read the contents of their emails.
The Fin4 attackers maintain a light footprint. Unlike other well-documented attacks originating in China or Russia, the attackers do not use malware to crawl further and further into an organization's computer servers and infrastructure. They simply read a person's emails, and set rules for the infiltrated inboxes to automatically delete any email that contains words such as “hacked,” “phished,” or “malware,” to increase the time before their victims learn their accounts have been compromised.
“Given the types of people they are targeting, they don't need to go into the environment; the senior roles they target have enough juicy information in their inbox,” said Jen Weedon, a FireEye threat intelligence manager. “They are after information protected by attorney-client privilege, safety reports, internal documents about investigations and audits.”
“从他们攻击的目标人群的类型来看,他们并不需要扩大活动范围;高级主管收件箱中的信息,就已经足够有料了,”FireEye威胁情报经理延·威登(Jen Weedon)说。“他们的目标是律师-委托人之间的机密信息、安全报告,内部调查和审计文件的信息。”
Because the attackers do not deploy malware, and communicate in correct English, they can be tricky to track. Weedon said FireEye first began responding to Fin4 attacks in mid-2013 but did not put together its findings until five months ago, when a few of its analysts concluded the attacks did not appear to be the work of familiar attackers in Russia or China, and warranted further investigation.
FireEye would not name the victims, citing nondisclosure agreements with its clients, but said that all but three of the affected organizations are publicly listed on the New York Stock Exchange or Nasdaq, while the others are listed on exchanges outside the United States.
Half of these companies fall into the biotechnology sector; 13 percent sell medical devices; 12 percent sell medical instruments and equipment; 10 percent manufacture drugs; and a small minority of targets include medical diagnostics and research organizations, health care providers and organizations that offer health care planning services.
FireEye said it had notified the victims, as well as the FBI, but did not know whether other organizations like the Securities and Exchange Commission were investigating.
FireEye说自己已经通知了受害者和联邦调查局,但不知道其他机构,比如美国证券交易委员会(Securities and Exchange Commission,简称SEC)是否会调查此事。
Representatives of the FBI declined to comment. Representatives of the SEC did not respond to requests for comment.
Weedon said that FireEye had not had time to assess the effects of the breaches to see whether the attackers had benefited financially.
In each case, attackers logged into their victim's email accounts using Tor, the anonymity software that routes Web traffic through Internet Protocol addresses around the globe, which can make it difficult, but not impossible, to trace their origins. Last month, the FBI seized dozens of criminal websites operating on the Tor network, in the largest operation of its kind.
“We don't have specific attribution, but we feel strongly this is the work of Americans or Western Europeans who have worked in the investment banking industry here in the United States,” Weedon said. “But it's hard because we don't have pictures of guys at their keyboards, just that they are native English speakers who can inject themselves seamlessly into email threads.”
Weedon added, “If it's not an American, it is someone who has been involved in the investment banking community and knows its colloquialisms really well.”

  • embeddedadj. 植入的,内含的,深入的 v. 埋入,植入,深入
  • legaladj. 法律的,合法的,法定的
  • manufacturen. (复)产品,制造,制造业 v. 制造,捏造
  • extensiveadj. 广泛的,广阔的,广大的
  • environmentn. 环境,外界
  • intentn. 意图,目的,意向,含义 adj. 专心的,决心的,
  • trackn. 小路,跑道,踪迹,轨道,乐曲 v. 跟踪,追踪
  • negativeadj. 否定的,负的,消极的 n. 底片,负数,否定
  • exchangen. 交换,兑换,交易所 v. 交换,兑换,交易
  • tracen. 痕迹,踪迹,微量 vt. 追踪,找出根源,描绘 v