Equation Group Cyberspying Activity May Date Back To The '90s

New Kaspersky Lab findings show how the 'master APT' nation-state group likely the longest-running cyber espionage gang of all, and newly discovered code artifacts include English-language clues.

Dark Reading logo in a gray background | Dark Reading

The unprecedented cyber espionage operation conducted by the so-called Equation Group launched attacks mainly from a complex software platform that looks a lot like a mini operating system with carefully constructed components and plug-ins, researchers say.

Kaspersky Lab--which last month disclosed its findings on the highly advanced and well-funded nation-state actor--today published new details of the so-called EquationDrug software platform used by the group over the past 10 years. The research indicates that the Equation Group could have been active as far back as the 1990s, making it the longest-running cyber espionage group of all, according to Kaspersky Lab.

Igor Soumenkov, principal security researcher at Kaspersky Lab, says information on the timing of when the Equation Group registered command-and-control servers predate EquationDrug, and thus point to activity in the '90s. "There were also previous platforms like EquationLaser, which we didn't write much about. EquationLaser was before EquationDrug," its replacement, he says.

Researchers at Kaspersky Lab said last month that the Equation Group, which has ties to Stuxnet but predates it, were likely the "masters" over the Stuxnet attacks and provided exploits to the attackers who unleashed malware to sabotage centrifuges used for uranium enrichment at Iran's Natanz facility. While signs appear to point to the National Security Agency, Kaspersky Lab has stopped short of naming the nation-state behind the operation, but has noted a possible US connection with newly found English-language use in the code, as well as apparent East Coast business hours.

The so-called GrayFish platform, which includes plug-ins like the especially sophisticated one that reprograms hard drives, ultimately replaced EquationDrug, although EquationDrug is not yet obsolete. But Kaspersky Lab researchers still have been unable to detect any new activity from the Equation Group since 2014, likely because they've adopted an even stealthier tack, a "super-scary" prospect, according to Costin Raiu, head of Kaspersky's global research and analysis team. Raiu last month told Dark Reading that the attackers had registered new servers in 2014 and were still active, but no signs of new malware had been detected.

And no word on what the group is using in lieu of GrayFish: "We don't have any details on what software this group is using right now," Soumenkov says. "They must have implemented some better techniques to evade detection and discovery."

The Equation Group has always reused some code; Grayfish, for example, was basically an upgrade to EquationDrug, with encryption and a bootkit, as well as "well-hidden" plug-ins, he says.

Speaking of plug-ins, Kaspersky Lab today said it has found some 30 plug-ins for EquationDrug thus far, but there could be some 90 additional ones as well. All of the plugins are compatible, too, according to Soumenkov.

The plug-ins include network traffic interception, reverse DNS resolution, computer management (including start/stop processes, load drivers and libraries), file and directory management, targeted computer system information-gathering (including OS version, user name, keyboard layout, process list, and other information), network resource browsing, WMI information-gathering, cached password collection, processes enumeration, monitoring live user activity in browsers, NTFS file system access, removable storage drive monitoring, passive network backdoor, HDD and SDD firmware manipulation, keylogging, collection of browser history, as well as cached passwords and auto-fill data.

[The nation-state Equation Group compromise of most popular hard drives won't be a widespread threat, but future disk security -- and forensic integrity -- remain unclear. Read What You Need To Know About Nation-State Hacked Hard Drives.]

"The architecture of the whole framework resembles a mini-operating system with kernel-mode and user-mode components carefully interacting with each other via a custom message-passing interface. The platform includes a set of drivers, a platform core (orchestrator) and a number of plugins," Kaspersky Lab researchers wrote in a post today. "Every plugin has a unique ID and version number that defines a set of functions it can provide. Some of the plugins depend on others and might not work unless dependencies are resolved."

Kaspersky's study of EquationDrug illustrates how nation-states like the Equation Group constantly up the ante in their code, the researchers say in their new report.

Meanwhile, the researchers found references such as "Stealthfighter" and other English-speaking language in the code. "Some other names, such as kernel object and file names, abbreviations, resource code page, and several generic messages, point to English-speaking developers. Due to the limited number of such text strings, it's hard to tell reliably if the developers were native English speakers," according to the report.

About the Author

Kelly Jackson Higgins, Editor-in-Chief, Dark Reading

Kelly Jackson Higgins is the Editor-in-Chief of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise Magazine, Virginia Business magazine, and other major media properties. Jackson Higgins was recently selected as one of the Top 10 Cybersecurity Journalists in the US, and named as one of Folio's 2019 Top Women in Media. She began her career as a sports writer in the Washington, DC metropolitan area, and earned her BA at William & Mary. Follow her on Twitter @kjhiggins.

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like


More Insights