Russian Hackers Used Twitter, Photos to Reach US Computers: Reports

Advertisement
By Reuters | Updated: 29 July 2015 18:57 IST
Russian government-backed hackers who penetrated high-profile US government and defence industry computers this year used a method combining Twitter with data hidden in seemingly benign photographs, according to experts studying the campaign.

In a public report Wednesday, researchers at security company FireEye Inc said the group used the unusual tandem as a means of communicating with previously infected computers. FireEye has briefed law enforcement on what it found.

The technique, uncovered during a FireEye investigation at an unnamed victim organization, shows how government-backed hackers can shift tactics on the fly after they are discovered.

"It's striking how many layers of obfuscation that the group adopts," said FireEye Strategic Analysis Manager Jennifer Weedon. "These groups are innovating and becoming more creative."

Advertisement

The machines were given an algorithm for checking a different Twitter account every day. If a human agent registered that account and tweeted a certain message, instructions for a series of actions by the computer would be activated.

Advertisement

The tweeted information included a website address, a number and a handful of letters. The computer would go to the website and look for a photo of at least the size indicated by the number, while the letters were part of a key for decoding the instructions in a message hidden within the data used to display the picture on the website.

Weedon said the communication method might have been a failsafe in case other channels were discovered and cut. Vikram Thakur, a senior manager at Symantec Corp, said his team had also found Twitter controls combined with hidden data in photos, a technique known as steganography.

Advertisement

FireEye identified the campaign as the work of a group it has been internally calling APT29, for advanced persistent threat. In April, it said another Russian-government supported group, APT28, had used a previously unknown flaws in Adobe Systems Inc.'s Flash software to infect high-value targets.

Other security firms use different names for the same or allied groups. Symantec recently reported another data-stealing tool used in tandem with the steganography, which it calls Seaduke. Thakur said both tools were employed by the group it knows as the Duke family.

Advertisement

Thakur said another tool in that kit is CozyDuke, which Russian firm Kaspersky Lab says is associated with recent breaches at the State Department and the White House.

© Thomson Reuters 2015

 

Get your daily dose of tech news, reviews, and insights, in under 80 characters on Gadgets 360 Turbo. Connect with fellow tech lovers on our Forum. Follow us on X, Facebook, WhatsApp, Threads and Google News for instant updates. Catch all the action on our YouTube channel.

Further reading: Adobe, Internet, Kaspersky, Russia, Symantec, Twitter
Advertisement

Related Stories

Popular Mobile Brands
  1. OnePlus 15R Confirmed to Come With 32-Megapixel Selfie Camera
  2. Apple Finally Releases iOS 26.2 Update for iPhone With These Features
  3. Supernatural Thriller Jatadhara Now Streaming on OTT: All the Details
  1. Kepler and TESS Discoveries Help Astronomers Confirm Over 6,000 Exoplanets Orbiting Other Stars
  2. Supernatural Thriller Jatadhara Arrives on OTT: Where to Watch Sonakashi Sinha-Starrer Film Online?
  3. OnePlus 15R Confirmed to Come With 32-Megapixel Selfie Camera, 4K Video Recording Support
  4. Rocket Lab Clears Final Tests for New 'Hungry Hippo' Fairing on Neutron Rocket
  5. Apple Rolls Out iOS 26.2 Update for iPhone With Liquid Glass Customisation, Changes to Apple Music, and More
  6. Aaromaley Now Streaming on JioHotstar: Everything You Need to Know About This Tamil Romantic-Comedy
  7. Astronomers Observe Star’s Wobbling Orbit, Confirming Einstein’s Frame-Dragging
  8. Galaxy Collisions Found to Activate Supermassive Black Holes, Euclid Data Shows
  9. JWST Detects Oldest Supernova Ever Seen, Linked to GRB 250314A
  10. Chandra’s New X-Ray Mapping Exposes the Invisible Engines Powering Galaxy Clusters
Gadgets 360 is available in
Download Our Apps
Available in Hindi
© Copyright Red Pixels Ventures Limited 2025. All rights reserved.