SBN

Buckeye’d

Mighty Fine Buckeyes, Folks. Mighty Fine.

Mighty Fine Buckeyes, Folks. Mighty Fine.

Astounding flaws, reported by both Symantec and Ars Technica… What happended to OpSec? As importantly: The true ramifications for our country are yet unknown… Unless of course, this and other ‘leaks’ of the same or similar ilk – are, in fact – structured information operations of the highest caliber. Crafted to ensnare the miscreant espionage bounders wandering amongst us… You be the judge.

Key Findings

  • The Buckeye attack group was using Equation Group tools to gain persistent access to target organizations at least a year prior to the Shadow Brokers leak.
  • Variants of Equation Group tools used by Buckeye appear to be different from those released by Shadow Brokers, potentially indicating that they didn’t originate from that leak.
  • Buckeye’s use of Equation Group tools also involved the exploit of a previously unknown Windows zero-day vulnerability. This zero day was reported by Symantec to Microsoft in September 2018 and patched in March 2019.
  • While Buckeye appeared to cease operations in mid-2017, the Equation Group tools it used continued to be used in attacks until late 2018. It is unknown who continued to use the tools. They may have been passed to another group or Buckeye may have continued operating longer than supposed. – via Symantec Corporation’s Threat Intelligence Blog

*** This is a Security Bloggers Network syndicated blog from Infosecurity.US authored by Marc Handelman. Read the original post at: https://www.infosecurity.us/blog/2019/5/7/buckeyed