Darknet Diaries - 174: Pacific Rim

Episode Date: May 5, 2026

For six years, Sophos fought a secret cyber war against a state-backed hacking group targeting its firewalls. This forced Sophos to drastically change tactics to properly secure their firewal...ls.Was it ethical? Was it effective? They disrupted nine zero-day attacks, exposed who was hacking them, and forced the hackers to change tactics. But at what cost?You have to listen to one of the most audacious corporate cyber defenses ever conducted.SponsorsSupport for this show comes from ThreatLocker®. ThreatLocker® is a Zero Trust Endpoint Protection Platform that strengthens your infrastructure from the ground up. With ThreatLocker® Allowlisting and Ringfencing™, you gain a more secure approach to blocking exploits of known and unknown vulnerabilities. ThreatLocker® provides Zero Trust control at the kernel level that enables you to allow everything you need and block everything else, including ransomware! Learn more at www.threatlocker.com.This show is sponsored by Meter, the company building networks from the ground up. Meter delivers a complete networking stack - wired, wireless, and cellular - in one solution that’s built for performance and scale. Alongside their partners, Meter designs the hardware, writes the firmware, builds the software, manages deployments, and runs support. Learn more at meter.com.Support for this show comes from Drata. Drata is the trust management platform that uses AI-driven automation to modernize governance, risk, and compliance, helping thousands of businesses stay audit-ready and scale securely. Learn more at drata.com/darknetdiaries.Sources https://news.sophos.com/en-us/2024/10/31/pacific-rim-timeline/ https://www.justice.gov/archives/opa/pr/seven-hackers-associated-chinese-government-charged-computer-intrusions-targeting-perceived https://www.fbi.gov/wanted/cyber/guan-tianfeng

Transcript
Discussion (0)
Starting point is 00:00:00 Hi, I'm Jackie Sider. Host of the show. Back in 2018, an interesting cyber attack took place. It's kind of a funny thing. I mean, it basically came onto my radar the second month I was working at Sophos. Oh, I should introduce you to Andrew. Yeah, so I'm Andrew Brandt, and throughout the time the research was going on for this story,
Starting point is 00:00:23 I was a principal researcher for Sophos, but I am now a principal threat researcher. for a company called Netcraft. So one of the things Sophos wanted Andrew to do was research novel threats and write about them on their newly established Sophos blog. The team that I was on eventually didn't exist.
Starting point is 00:00:43 I was the only person on it. And one of the analysts reached out to me through the company chat and said, hey, I've got a great story for some really cool research. I'd like to write it up and have you publish it on the blog and do some edits on it.
Starting point is 00:00:59 I said, great. tell me more, and he told me the story, but the one thing he didn't tell, or what he said he couldn't tell me, was who the target was. So he's like, okay, fine, send me what you got, let me research it, and I'll write about it. It started with a TV set.
Starting point is 00:01:16 So there was a sales office, and they had a bullpen, like you have a lot of, you know, in a lot of sales offices where people are on the phone, you're trying to sell the product. And so they had like this leaderboard that was on a computer screen that was running off a little Linux computer.
Starting point is 00:01:33 And that was the first machine that got infected. And the threat actors managed to pivot from that, you know, Intel NUC, which is like a tiny little computer that's small enough they can mount on the back of a TV monitor that's hanging on the wall, that they were able to pivot from the Nuck and find access to the repository where the source code was and then get into that. And then to do the CloudSenooper attack on that cloud service
Starting point is 00:01:59 where the source code was, it's just mind-boggling to me, like the amount of effort involved in pivoting from this to this to this to get into this and then to build this backdoor that allows them access, it's amazing to me. The attackers got access to the source code.
Starting point is 00:02:19 But why? Was this an insider trying to seek revenge? Were they stealing it in hopes to sell it to someone? Did they steal it so that they could copy the product and steal their intellectual property. At the time, nobody knew what their motive was. These are true stories from the dark side of the internet.
Starting point is 00:02:45 I'm Jack Recyder. This is Darknet Diaries. This episode is sponsored by Threat Locker. If you've listened to Darknet Daries for a while, you've already heard of Threat Locker. I've talked about how they lock environments down, deny by default, zero trust, all of it. But the problem they were solving changed
Starting point is 00:03:16 because attackers changed. They don't break in like they used to. Now they just log in with real credentials, real sessions, nothing that looks out of place. Once they're in, they're treated like they belong. So Threat Locker took what they already were doing and pushed it further with their Zero Trust Network Access and Zero Trust Cloud Access. So now Access isn't just about logging in, it's about the device, the connection, and whether any of it should be trusted at all.
Starting point is 00:03:44 If you want to see what Zero Trust looks like when it's done right, go to Threatlocker.com darknet that's threat locker.com slash darknet this episode is sponsored by meter the company building networks from the ground up if you employ and work with IT engineers you're going to know how hard it is for them to do their job well what your business needs is performant reliable secure networking infrastructure but what you get is IT resource constraints on predictable pricing and fragmented tools what you and your engineers need is a modern platform you can all trust to support your business. Enter Meter. Meter delivers a complete networking stack, wired, wireless, and cellular in one solution that's built for performance and scale. Alongside their partners, Meter designs the
Starting point is 00:04:31 hardware, writes the firmware, builds the software, manages deployment, and runs support. That means less time your employees spend writing to multiple vendors and more time working and improving your IT systems. Meter's full stack solution covers everything from first site survey to ongoing support, giving you a single partner for all your connectivity needs. Thanks to meter for sponsoring this show. Go to meter.com slash darknet to book a demo now. That's spelled M-E-T-E-R, meter.com slash darknet and go book a demo. So hackers broke into a company and copied the source code for that product.
Starting point is 00:05:07 So we managed Infosec there for a while and candidly too. It was the type of network that was in the process of being brought over to a set standard. This is Craig. He helped clean up the intrusion. So my name is Craig Jones. I'm the chief security officer of Antinue, but several years ago, I was actually the senior director of information security inside SOSOS. I mean, if you don't know SOS, we're a UK-based cybersecurity provider that has everything from kind of EDR, MDR, and through into firewall products.
Starting point is 00:05:41 And at the time, they had three different firewall products, one being Cybrome, the other one being a German-based firewall provider and the new Sophis firewall product. So essentially they were collapsing two products into one and the new one being Sophos Firewall. Yeah, Sophos' main product is their firewall. This is a network device that will act as a wall between a protected network and an unprotected one. Out of the box, nothing is allowed to pass. You have to tell it exactly what you want to allow through, because the point of a firewall is to stop unwanted traffic from coming into your network.
Starting point is 00:06:17 And believe me, there's a lot of unwanted traffic that's always trying to get into our networks. And in 2014, they bought another company called CyberRome, which was also making an interesting security product. That product, you know, we were flattening that product and make it into something else. You know, like CyberRome was very much purchased to be the development house for the new softest firewall product. You know, there's some super hot developers there.
Starting point is 00:06:43 And it was this newly acquired CyberRome network, which was the victim of this attack. Someone had gotten into CyberRome and was looking for their source code, and founded for one of their products, which Craig and his team had to go clean up that intrusion. There's some really cool stuff that those actors did. You know, there was several points when I sat down,
Starting point is 00:07:03 they thought, damn, these guys really know what they're doing. You know, I think for me, there was one where they'd actually attempted to intrude the network in several different ways, mostly at the same time. And what was really interesting about it is we could tell that there were two or three actors working together in different consoles. And one of the things they did, which is kind of funny, actually, was that they'd gotten hold of a secure shell key. And one had obviously copied it,
Starting point is 00:07:32 and another person was trying to type in the password for it. And we could tell in the logs that they were mistyping the password, you know? And, you know, the person had obviously taken the key had obviously tried to relay onto another person, and they were mistyping this thing. It was kind of crazy. You immediately knew then that this wasn't just like a dude. You know, this was a serious operation.
Starting point is 00:07:58 The attackers had really unique methods for getting in, not methods that were publicly known at the time, super sneaky and crafty ways to get into a network. And they got in through multiple ways. And then when they got in, they were able to move laterally in really unique ways too, so unique that the Sophos team had no idea. That stuff was even possible.
Starting point is 00:08:17 It was like exploiting bugs in the way AWS handles. One problem, though, is that they didn't have enough monitoring at first to know exactly what these hackers saw or took. They assumed because they got access to the repository with the source code that they took the source code, but they were unsure. So they had to enable a lot more logging and monitoring to fully eradicate them from the cyber realm network. Andrew wrote this attack up because it was so interesting and new and published it on the SOFO's blog, but didn't say who the target was. Yeah. So flash forward, two years go by. It's now 2020.
Starting point is 00:08:50 You know, we now have the team up and running. I've got a couple of people working with me. We're publishing a few blogs a week. And I find out from internal people within the company that there's a security incident. And the security incident started with a tech support call where someone sent an email to their support technician and said, hey, my firewall is showing this URL in the user interface. And I didn't put it there. And I don't know why it's there.
Starting point is 00:09:21 Hmm, it sounds like a minor problem at the surface. This firewall had a configuration which showed what IPs are allowed to access it and manage it and configure it. And a strange URL was showing up in that list of IPs. It didn't make any sense as to why it was there or why anyone would ever even put it there. So the Sophos has a firewall called the XG firewall. At this point, it was just called the XG firewall. And the firewall has its own operating system. running a version of Linux in it.
Starting point is 00:09:51 It has a UI that's running on the front of it so that you can manage it. At the same time, someone outside of Sophos submitted a bug into Sophos for this same issue. I think it was April 21st. They had, well, we actually had an external bug-binding report as a SQLI injunction. I was kind of weird about it was, you know,
Starting point is 00:10:15 I remember the user. actually claiming to be from Australia, but they had a Chinese name, you know. Now at the time, we didn't have amazing telemetry from any of the softest firewalls. We had kind of base telemetry, which gave you like, it was really designed for product managers
Starting point is 00:10:37 to understand what features that, you know, users were using. So they understood where to put their kind of limited resource time into, right? So we had that, We had a really good idea of where all of the serial numbers for these devices sat and their IP addresses associated. It's always kind of interesting to correlate the IP with the intended location of the researcher. So we got a researcher's device that's one that had never been turned on before, which was pretty suspicious. You know, had never been registered. It was a serial number that just come from a web trial of a VM.
Starting point is 00:11:17 And we found the IP actually related back to Changdao in China. Okay, odd. Someone from China with a trial license of the Sophos firewall found this bug and reported it to Sophos. And Sophos did, in fact, pay the bug bounty for this. It was about $10,000, I think. Hmm. Someone got paid a pretty penny for reporting this bug to Sophos
Starting point is 00:11:41 at almost the exact same time that they were seeing it being exploited by devices in the wild. Strange timing. We called it Asner Rock. So the team investigated this bug further. It was present in the front end web user interface of the firewall. To configure this firewall, you can use a browser and access it that way. Well, the web UI of this firewall had an SQL injection vulnerability in it. Basically, in one of the form fields of the firewall, like maybe the username field or something,
Starting point is 00:12:08 an attacker could enter in some commands there, which would glitch out the user input handling mechanism of the firewall, and allow the attacker to inject their own commands into the database of the firewall where the configuration sat. And this was a really bad bug for Sophos to discover. Their devices are supposed to be blocking hackers from getting into the network, yet it's the vulnerable device, which is allowing hackers into it. This is not good at all. And they found that essentially every firewall that was facing the public internet
Starting point is 00:12:39 was affected by this bug. These firewalls weren't just vulnerable. They all had been hacked into, exploited. Someone probably scanned the whole internet looking for these particular Sophos firewalls and then ran some kind of automation script to go infect them all. We kind of worked out that there were a huge amount of devices affected. I think in the aimed FBI report that came out by this,
Starting point is 00:13:07 I think they mentioned 80,000. It has a guess it's probably more. Hot dog, 80,000 Sophos firewalls hacked into. But just because someone put a URL in place where it shouldn't be, that's not all that damaging just by itself. So the team investigated what that URL did, and that's when they started to panic. The URL would trigger a Git request
Starting point is 00:13:33 in order to update the Sophos firewall itself. But what was really weird about it is that it was a W-GET to a domain called Sophos Firewall. update.com. And Sophos didn't own that domain. So it tried to blend in like it was supposed to be there, and it fooled many of the people even at Sophos who just figured the update domains changed.
Starting point is 00:13:54 But my goodness, this meant suddenly 80,000 firewalls were looking somewhere else for updates and not to Sophos? And it's kind of strange, because we actually monitor all domain registrations. It's kind of part of our kind of core security, like all its function. So every single, like, cert that was registered, every domain that was registered, we kind of pop up and, you know, anything infringed on software's IP would attempt to pull back, you know. And it was one that had popped up,
Starting point is 00:14:21 like a little while ago, but nothing had kind of come of it, you know? But actually seeing this thing in operation was quite like, quite jarring, you know? And I don't know if you fully understand what this means. If a malicious hacker is able to send your firewall software updates, then they can put in whatever they want. They can give themselves full access to the firewall, or they can log all traffic going through it. They can pull. poke a hole in the firewall and let themselves right into your network. And then from there, they could just infect your whole network with ransomware. The thing that is supposed to block unwanted traffic is no longer blocking anything if the attacker wants it that way. Not only that,
Starting point is 00:14:57 Sophos was worried that they had lost capability to update any of their firewalls properly. Yeah, so effectively, what they could do, I mean, the truth is anything. But what they really were after was system configuration and passwords. Now, I've always suspected that this was something that they expected to run quietly, for them to kind of pull that configuration, the passwords quietly, and then for them to kind of delete any presence they ever had on those firewalls, and then for them to have a really easy and simple access campaign. So the attackers took copies of the configurations from the firewalls,
Starting point is 00:15:36 and then passwords from it, this was a pretty darn scary event for the Sophos team to handle. So it was very much like an incredibly tense situation where we first had to get a hold of one of these devices. You know, we set multiple teams up to work out what happened and to really do some in-depth incident response on this. We're incredibly lucky, you know,
Starting point is 00:16:01 we had the entire arm of like Sophos Labs to help us kind of, reverse engineer this stuff. Okay, step one, fix the bug that made these things vulnerable. And step two is get the bug fix on as many firewalls as soon as possible. They were able to complete step one pretty quick, but step two was a little bit more tricky. If you buy a firewall, whether for your home or a large enterprise, typically you've got to update it yourself, just like how you have to do your own software updates on your phone or computer. And so forth's firewalls are no different. The customers are the ones who have to issue updates for this thing.
Starting point is 00:16:35 But to SOFOS, this was too critical of a bug to try to tell 80,000 customers go update your firewalls. Because I'm just guessing that less than 50% of them would do it in the first month. There's just not enough time or it's not a high enough priority for them to fix it. So FOS decided to do something they've never done before. They pushed out a hot fix to these firewalls. So hot fix is like a little software patch that can run in real time. They can live update all the firewalls remotely with these hot fixes. It doesn't require the firewall to reboot to be enabled.
Starting point is 00:17:11 And they felt like they had analyzed the attack and figured out exactly how the threat actors were, you know, leveraging their access. And they closed those loopholes with the hot fix. This was the first time SOFOS ever issued a hot fix to one of their customers' devices. Now, they had built the facility to do hotfix, and they had not really used them before this. So there had been no real reason to do it,
Starting point is 00:17:39 but I think they had built in the capability to do these hot fixes, anticipating that there might be an opportunity to use it if there was something that was a real problem. And it was fortunate that they had rolled this out in the previous firmware update that, you know, just before this attack had taken place. Yeah, I think this is a really big deal. Like, it makes me wonder if there's language in the small print,
Starting point is 00:18:03 of the terms of service that says SOFOS reserves the right to make configuration changes to your firewall or updated whenever they want. I think that's what's important as well. This isn't something that's just kind of done. And it's not something that's done willy-nilly, you know?
Starting point is 00:18:20 And you're right. I mean, it does feel kind of offensive someone coming in and tampering with my stuff, you know? But effectively, it's written into the Yula, like the end user license agreement. And candidly, you kind of need this. And I think that's where a lot of firewall providers actually fail,
Starting point is 00:18:38 is the fact that they rely on end users to patch everything. And candidly, so many firewallers are just bought and they never updated, you know? Gosh, I really don't know where I stand on this. I was a firewall admin for my previous employer for 10 years. Those Cisco firewalls were my babies. I knew everything about them and would review every single change that ever took place on them
Starting point is 00:19:04 and I don't think I would like it if Cisco just decided to patch them one day without my consent like some were in hospitals that were mission critical and some hadn't been patched for years because they were so finicky and any change to them
Starting point is 00:19:15 would just make them wig out and crash and when I had to update them I wouldn't do them all at once and one big swoop and do them one out of time and hold their hand and make sure that nothing broke after the upgrade
Starting point is 00:19:26 and everything came back up as expected So if a security vendor just slapped a hot fix on all my firewalls that I was in charge of, I would freak out. What? We did not get approval for this change. We aren't in a maintenance window. We don't even know what changes you made to the firewall or what's happening. How can you just come into our devices and make changes without us knowing? I would be upset.
Starting point is 00:19:49 I wondered, did the SOFOS team get approval from their lawyers before issuing a hot fix to their customers like this? Is this even legal? Yeah. I mean, that's a great question. I was not privy to those discussions. But I'm sure there were discussions like that about, you know, what is our legal liability? What are we allowed to do and not do remotely on these devices? I believe ultimately the decision was made, and I'm not sure if there were lawyers consulted on this or not,
Starting point is 00:20:18 but made a lot of sense that the harm of allowing the firewalls to basically try to ransomware the inside of networks was probably greater than the risk of somebody complaining that, oh, you made a change to my firewall without telling me first. So they just went ahead and did it. Yeah, I mean, I think not only that, but it's like this idea that the vendor can come in and change my device in any way. It's not just like crash logs that are being sent to it. It's, wow, what else can you do?
Starting point is 00:20:49 If you could put a hot fix in, can you see the password? Can you see the connections? Can you come in and do other work? can you update to different firmware that has malware on it or something? Like, could you do things that, you know, and, you know, your mind starts going, like, could you do things that the NSA wants you to do and go and spy on this customer or something like that, right? And so when you're a firewall admin, you're like, no, I have to make sure that this is, no other person and the planet can access this, but me and other people on my team,
Starting point is 00:21:21 because you can't risk some, like a backdoor. It's basically a backdoor that you had. Yeah, that's entirely accurate. And you're not wrong. And these are devices that are typically placed in a position in the network where they act as the barrier between the outside and the inside worlds of the networks. And I recognize that that is a risk. However, it is also worth noting that this is exactly what the bad guys were doing at this moment.
Starting point is 00:21:54 They were installing malware inside the firewall. So how do you fix that? I could just imagine the headlines at this point. And my question is, did any bad news come out to be like, Sophos found vulnerable, tens of thousands of customers impacted, huge vulnerability. Hacker has complete control over their firewalls patch immediately. Like that could make the stock tumble.
Starting point is 00:22:24 That could really hurt business. Yeah, I mean, it could. And that was one of the reasons that I was brought in, basically, on day zero of this happening. The company realized that they had a potential public relations nightmare on their hands, and they needed to communicate as openly and as forthrightly as possible, everything that they knew and everything that they were doing to fix it. And, you know, credit goes to the people, you know, in leadership at the company who decided that, you know, possibly against the conventional wisdom at the time,
Starting point is 00:23:00 that they were going to go public with everything we knew about this attack. It was not a common thing at that time. But as I said, I've worked for a long time doing in this kind of role where I do investigations and then publish about them to the public to warn people about bad things that are happening on the internet. And it's been my experience that, that the more information that you get out, the better protected people are.
Starting point is 00:23:31 And that being radically transparent benefits everyone. It helps the customers who are affected. It also warns the public that, like, hey, this is something that you need to be aware of in the future. And it might also put the threat actors on notice that, hey, we're watching you, and we're taking action to stop you. As the SOFOS team investigated this more, They learned that whoever did this attack had to have really in-depth knowledge of Sophos firewalls.
Starting point is 00:24:03 Like, there's no way they should have discovered this bug unless they had access to the source code, which wasn't publicly available. And that's when the pieces started clicking into place. The part of this firewall that was vulnerable was code from the Cyberrome firewall that was moved over to the Sophos firewall. And two years before this, as you know, there was an attack on CyberRome, and what server did the attackers get access to you, the one with the source code for their firewall. So they started to think,
Starting point is 00:24:34 holy crap, this is a very serious threat actor who's been attacking us for years. They spent tons of effort getting into CyberRomes Network to steal the source code only to study it for bugs and then launch a massive attack on our Sophos firewalls. Whoa, what do we even do with this information? To think your products are the target for a major cybersecurity campaign like this?
Starting point is 00:24:58 This is starting to smell like a nation-state actor is behind this. Who else has that much time and resources? And what the heck was the deal with someone from China submitting this bug the exact same time that Stofos discovered this? Very strange. One of the things that we've been kind of working on, even before this situation,
Starting point is 00:25:15 was pulling in our telemetry or firewall telemetry, the kind of basic telemetry I was talking about earlier into Splunk. And I remember talking to Mark, who was just this amazing Splunk engineer in my team. Like I said, well, can we go back on that data? Like, can we find out when this first started? Because I couldn't quite work out the exact moment in time or the first firewall that was hit by this Asnerok attack. And then I went back, well, how far does that data go back?
Starting point is 00:25:50 And then Mark said, well, actually, I think I've got like three months work. So we kind of rolled this thing back three months, and there was one single device that had been hit like a month or so beforehand. Like sometime in February, if my memory serves me right, and it was just really strange. So it was kind of registered to like a Chinese 163 address, and it sat again in Chengdu. Chengdu, China again? That's where the person who submitted the bug was from. So they took this firewall, and again, this one was running a trial license, which was actually just a software-based firewall running in a virtual machine.
Starting point is 00:26:31 And it's a virtual machine because Sophos isn't allowed to sell their firewalls to China due to export controls. So really, nobody in China should even have a Sophos firewall. Their suspicion was that the attackers were using this virtual firewall to practice their attacks against, develop them, and then unleash them against the world. Because Sophos has the ability to run in a virtual machine with trial license, is they can just spin one up real quick, try attacks on it. If they mess up the firewall, they can just reboot it, take it down, and bring a fresh one up in minutes.
Starting point is 00:27:01 We found this trial license, and they were also a 163 address and a moniker that we called GBig Mau. Okay, interesting. They looked up who registered that trial license, and this gave them an IP address, a username, and an email address. And the username was G. Big Mau. So now you pivot on that name. What other SOFOS products has G Big Mau downloaded?
Starting point is 00:27:29 We kind of pivoted on him. We found that he actually started to experiment with this database or SQLI injection like our mother-soco. And we kind of found then looking at his IP address, again, we had phenomenal telemetry here, that he was looking at different knowledge-based articles around our previous CVEs issues. He was looking through our forum system to look at maybe other potential issues or places that he could maybe pivot and work on. Then they took a look at his email address and wondered, has this email address been used anywhere else in the world? So they do some OSINT investigation to see if this email is known anywhere else. And we find that he was an actual firewall researcher, and he published a number of different, like, vulnerability.
Starting point is 00:28:22 We could see him on kind of Linux boards, publishing various different router vulnerabilities, up until about 2018, and then he went silent. He'd been really, really busy up until like 2018. Now, we kind of found out that he was working for a company called Chezhuan Silence Information Security Technology, mostly because doing some extra OSint, we found that his username appeared
Starting point is 00:28:52 in many Chinese hacking groups and lots of CTFs, so like Capture the Flag type events, where he'd been registered towards this company as well. So we found kind of corroborating evidence from a couple of different places that this was the same guy in the same company, you know? Again, located in Shengdao in China. So we found a really clear picture
Starting point is 00:29:19 of who this person was. Now, his external op-sect was pretty good. You know, like, you would not have been able to find him that easily, but because we could see the internal telemetry and get the license information, kind of connect the dots, we could actually pin these devices to him and his usage. But what we had to do at that point was find out more about these devices that were being used for research.
Starting point is 00:29:45 We found that from the limited telemetry that we'd started to gather with the first hot fix, But what we realized is we actually needed more. Like we really needed more detail, faster detail to like a greater depth to understand what these guys were doing. So we developed a kernel implant in house. A kernel implant. That's a nice way to say it.
Starting point is 00:30:12 I guess when the good guys make it, it's called an implant. But if the bad guys were to make it, it would just be called malware. But essentially a kernel implant is a hidden piece of software that they develop. to sneak onto their firewalls to covertly and sneakily spy on what the firewall is doing. Yeah, so there's
Starting point is 00:30:31 a lot of interest within the company. Well, we know that there's these firewalls that have been registered to people who have non-corporate or non-enterprise level email addresses,
Starting point is 00:30:45 like free webmail addresses. The firewalls are checking in all from Chengdu. We know they're serial, numbers. So we know the exact count of the number of firewalls that are being used in these places. And we could see from some of the log telemetry that the threat actors are running commands that are testing how these exploits are going to work. But we don't have the exploit code itself. So the security team decides they're going to build something that they just call the implant,
Starting point is 00:31:19 or sometimes they call it the kernel implant. And it's a small elf binary that gets distributed only to the machines that they are specifically interested in taking closer look at. So these machines that they believe are being operated by threat actors, where they're doing these commands that are way outside of the boundaries of normal firewall behavior. And these things are capable of doing more than just sending, you know, login, they're able to pick arbitrary fields from the file system on the firewall and send those files back. So that was how, in some cases, the team started throwing these kernel implants onto some of these firewalls that we could see were being used to do this experimentation. And they were retrieving all sorts of very malicious and pretty dangerous. files that were being dropped on these machines by the people who were developing these exploits
Starting point is 00:32:27 and were testing them out in advance of attacks. Wow, that is wild. This is going to take me a minute to fully grasp. Sophos developed an implant and sneakily put it on one of their customers' devices to essentially spy on them. Is that going too far? DeCollett malware is kind of a misnomer. I mean, I'm not going to defend the overall argument here,
Starting point is 00:32:55 but I will just say that, like, there is nothing malicious about wanting to know what someone who is doing malicious things with your product is doing. You know, it's kind of a, it's an ethical gray area. I've got a caveat this with, we only ever deployed this to devices where we would be absolutely safe. certain that they were a threat actor device, you know.
Starting point is 00:33:23 And not just threat actor controlled, but threat actor owned. Like, this is where they're doing their research. Exactly. So, number one, like, we never deployed it to any properly licensed devices. The second part is, like, we only ever deployed it to Chinese devices. We just didn't sell firewalls in China. So there was really, unless you're a company maybe bringing one from external, there's no real reason for you to actually have one legitimately in China.
Starting point is 00:33:47 So under the Yula, we could take steps to protect the firewall and gather intelligence. And that was covered clearly under the Yula. So that's what you got, in your 40 people in the room, the lawyers must be in there too. Like, are we allowed to hack into these devices that we think our own? That was a serious conversation we had. Yeah. I mean, it wasn't just a small one either. I mean, I don't think people have ever done this before, you know?
Starting point is 00:34:15 like we sat there debating this thing for hours and really ours because there's some serious ethical challenges around this you know it's not you know what happens like if we find the guy we you know we record him we see him doing it and we send it through to law enforcement you know like a wee
Starting point is 00:34:35 you know there's so many crazy things that we discussed there you know it's yeah it's a conversation that I never thought in my entire career that I would have, you know? Yeah. I mean, kind of leaked you, I never thought legitimately
Starting point is 00:34:49 in my entire career that I'd ever deploy a kernel implant either, you know? But it was certainly interesting, you know? Well, I've never heard of a security vendor doing anything like this.
Starting point is 00:35:02 Adding in stealthy secret implants to spy on their users, in my opinion, spyware is malware. And gosh, before hearing all this, I would have said, that is going too far. But now,
Starting point is 00:35:14 No, I'm not sure. My ethics are really being challenged here. And again, you know, I had amazing access to just quite incredible engineers. They built this kernel implant that allowed us to basically move sofas firewalls from like a normal update path to like a specific update wing. And we would then deploy this specialist kernel implant in a normal update. and you just wouldn't see it. But what it allowed us to do is like grab anything being needed from the device.
Starting point is 00:35:48 So for example, things like, you know, files, if there were entry updates, it would kind of record anything that was kind of written to specific writable directories. And it would start to give us a really good idea of what they're doing, what they're writing, why they were doing it. But some of the really cool things that we actually got from it were quite unexpected. So, for example, we started to pick up on the devices around the firewall. So we'd capture all the Mac addresses of devices connecting to this firewall. We'd also capture Mac addresses of things that also sat in the network alongside the firewall.
Starting point is 00:36:27 And then we suddenly realized that actually, this is huge. This isn't just like Sophos Firewalls. We've seen other vendors' devices on the same subnet alongside the Sophos Firewall. You know, they were looking at all sorts of devices. You can probably pool from the top of your head thinking about things that had been attacked in the past couple of years, the devices that were in the rack alongside that surface firewall, you know? Oh, wow.
Starting point is 00:36:55 So the firewalls that come to mind for me are like Cisco, Palo Alto, Juniper, checkpoint, Fortinette. And he says he saw other vendor firewalls set up alongside their firewall in this threat actor's lab. Now, just being the person who's telling this story of what happened, we were observing in the world, not just SOFOS firewalls, but every firewall vendor getting hit with zero days, there are customers being attacked in various ways, and there being no way to resolve this, and certainly no way to anticipate it.
Starting point is 00:37:34 Now, whether or not other companies are doing the same thing, no one else has disclosed that, but I don't think it's outside the realm of possibility to think that maybe some of them were. Oh, man, this is now tugging at me in new ways. If every firewall vendor is getting hit with the same type of attack and SOFOS is the only one being transparent about what they're seeing and what they're doing to mitigate this,
Starting point is 00:37:59 then yeah, I give them a lot of credit for that. Here's the test, I think, for whether your company is evil or not. first, it has to be transparent to its customers. Let them know exactly what kind of configuration changes, updates, or spying, or data collection you're doing on your customer's devices, and in what circumstances, and what's that you're being used for? And second, be proud of whatever it is you're doing around that. If you're a company which is making changes to the customer's products,
Starting point is 00:38:29 but then not telling them and secretly adding spyware, but making it so top secret that not many people on your team even know it exists, then I think you might be evil. If you're afraid to let the public know exactly how you operate, because you think it's going to look bad on you, or maybe because you think it's not even right, then either stop doing it or go public with it. And Sophos came to the conclusion that,
Starting point is 00:38:53 while this is not an ideal situation, this threat is novel and sophisticated in ways nobody's ever seen before, and not only that, whoever was doing this, they're being unethical themselves. So-So-Fo's how to deploy a novel and sophisticated approach to defending their device. And while it's not pretty, at least they came out and told us about it, through Andrew's blog posts. And they're basically saying, hey, we're in the middle of a nasty street fight here.
Starting point is 00:39:23 And the gloves are off until we can neutralize this threat. And again, I give them a lot of credit for that. Nice job. So at the same time, they were developing this implant to eavesdrop on the hackers. They were also in the process of studying those domains which were found in the exploited firewalls. The hackers pointed all the firewalls had two domains to get updates from, which were not owned by Sophos.
Starting point is 00:39:46 Yeah, well, there was Sophos Firewall Update.com and Sophos Product Update.com, which were registered at different registrars and hosted in different IP spaces. But because they both had Sophos in the name and they were part of this attack, Sophos went to ICAN and did the domain name seizure process on those domains so that they could pull those down and start to,
Starting point is 00:40:12 they wanted to sinkhole the domains and see what was connecting into them. How do you seize a domain? Well, with lawyers and money. And, you know, it's a really serious thing, you know, like attending court in Delaware, I think it was, you know, remotely. Because at the time, don't forget that this is the thick of COVID. it. Jeez, that's another thing that's wild to me.
Starting point is 00:40:37 The fact that you can take over someone else's domain, if you can prove that you're the one who's the rightful owner of it or should be owning it, but they gave enough reasons to the courts, who then demanded that the domain registrar gave SOFO's control of the hackers' malicious domains. The server used by the threat actor actually sat in the Netherlands, and it was one of these bulletproof, like, hosting providers. So we were super lucky that, you know, through the NCSC in the Netherlands, they were kind of an intermediary with the kind of Dutch National High Tech Crime Unit.
Starting point is 00:41:16 And once we kind of realized how this was panning out, the Dutch National High Tech Crime Unit just jumped on this. And they managed to get hold of this C2 server. So the actual physical Linux box. I guess it wasn't bulletproof then, huh? Well, yeah, this is. the thing, you know. So they managed to drag hold of it. And I mean, we were super keen to How do you even, so how does that happen? You convinced the Dutch authorities. So you're just a
Starting point is 00:41:43 company in the UK. You're just like, hey, we make this product. You can't just call up the Dutch police and say, go get that server. We need it. And then they're like, we're on it. Well, yeah, I mean, you'd think. But then, you know, luckily or unluckily for us, there were a couple of Dutch customers affected, you know, by this attack. So that allowed us to be able to register a crime and then get assistance. And we did this globally, you know. We really used all of the resources available to us. So, you know, this obviously took time.
Starting point is 00:42:18 You know, I think right now this is like three or four days after the attack. But the NCSC in the Netherlands were incredible. and the Dutch guys there were just super helpful. I mean, we wanted a copy of that threat actor device. Like, I wanted to see that Linux box and understand what they've done. I mean, obviously, it was evidence now. It wasn't owned by us. So we couldn't get a snapshot of it, for example.
Starting point is 00:42:46 But they allowed us to basically, you know, work with them and analyze the box live on a screen share. so we could actually understand the scale of what had happened, you know. And we'd seen the threat actor scripts for scanning the devices, the outputs that they'd taken from the firewall, you know, how they'd set this thing up, you know, kind of Chinese characters and notes and things throughout the device. What was actually surprising was that everything was kind of set up manually on the C2 server. I kind of expected them to deliver the C2 server with some sort of kind of, kind of, dev ops, pizzars.
Starting point is 00:43:27 But it was just basic. It was like a Linux box and someone who copied subscripts to it, you know. But they were amazing. I mean, the NCSC in the Netherlands just gave us so much help and really helped us focus where we needed to look and the kind of scope and scale of all of this. At the same time, they got control of the domains used by the hackers and sent all the traffic they were getting to a sinkhole
Starting point is 00:43:51 and logged it all. It's just fascinating to think that, like, I don't know, a netgear, a lynxys, some other commercial product was checking in to sophosfirewallupdate.com. It kind of, it's almost screams of like, well, you know, we could be bothered to register this domain for Sophos. We're not going to bother to register it for these other companies. Like, we already got the domain.
Starting point is 00:44:16 We're just going to keep using it for these other things. I couldn't find a single article by Linksys mentioning any of this. nothing at all. Netgear put out an advisory saying a Chinese threat actor is attacking their products. However, they say they are not aware of any netgear devices being exploited out in the wild, which if they don't have any telemetry from their customers' products, then yeah, of course they're not going to know if any devices are being exploited. And that's what's challenging me here. Should the firewall vendor be collecting logs off its customers' devices
Starting point is 00:44:51 in order to better understand what devices are actively being exploited? Or should that be the responsibility of the customer? In many organizations, they have their own security logs and even a team to monitor those logs to look for threats. But things like Netgear and Linksys are typically home devices, and it's very rare for people in their own homes to be monitoring their logs looking for threats. I looked it up.
Starting point is 00:45:17 Netgear actually does quite a lot of analytic collection from their customers' devices. They collect IP addresses, geolocation, how often you use the firewall, what you use the hardware for, what channels your Wi-Fi set to, and what devices are connected to it. It's surprising with all that analytics collected that they didn't spot a single device being exploited by these threat actors. And this is what frustrates me. When my home router is sending all kinds of logs to another company, like what devices are connected to my router? Really? I hate that.
Starting point is 00:45:49 I want the devices in my home to be. be private and not sending tons of data to somewhere without me even knowing. Because if Netgear has that data, then it's likely a lot of other people have it too. But then they also registered for the Kill Switch. They registered Ragnarok from Asgard, right? And Ragnarok, of course, is the Norse mythology, end of world myth. And it was fascinating that that was how they used that nomenclature and that language behind it. because by this point, we already had some folks who were using
Starting point is 00:46:23 Marvel characters, superhero names in their user accounts that they were, you know, that they were using for downloading these firewalls. We had a guy who used the handle of T. Stark, who was involved in some of the exploit development and had registered a bunch of these virtual firewalls. And now we're seeing, you know, this is the time frame when the TV series Loki came out and when the Thor Ragnarok movie had come out as well. And it's just fascinating to imagine
Starting point is 00:46:55 that these guys who were doing this stuff saw themselves as some kind of, you know, superheroes or maybe they just like put themselves in the shoes of like that maybe they're just, you know, maybe they're like up there with gods and that they can, you know, engage in, you know, a hammer that can throw lightning from a distance at an enemy. It's just fascinating to think about.
Starting point is 00:47:17 So this is why Sofos called this particular exploit Asnarok, a combination of the words Asgard and Ragnarok. And all these efforts on their side paid off. The implant gave them incredible insight into how these attackers were developing their exploits. And were able to write fixes for the next exploits before the attackers could even launch them, which is incredible to be in the hackers' machine watching them in order to be one step ahead of them. Good job, Sophos. This looks to be a pretty hairy threat actor that you're dealing with. But little did everyone know.
Starting point is 00:47:49 That was just round one. We're going to take a quick ad break, but stay with us because round two gets even hairier. This episode is sponsored by Drada. Let's face it, if you're leading GRC at your organization, chances are you're drowning in a sea of spreadsheets every day. Balancing security, risk, and compliance in an ever-changing landscape of threats and regulatory frameworks can feel like running a never-ending marathon. enter drada's agentic trust management platform designed for leaders like you drada automates the tedious tasks security questionnaires responses continuous evidence collection and much more saving you hundreds of hours each year with drada you can spend less time chasing documents and more time solving real security problems with drada you also get access to a powerful trust center a live customizable product that supports you in expediting your never-ending security review requests in the deal process it's perfect for sharing sharing your security posture with stakeholders or potential customers, cutting down on the back and forth questions and building trust at every interaction.
Starting point is 00:48:54 Ready to modernize your GRC program and take back your time. Visit drada.com slash darknet diaries to learn more. That's drada, spelled DRATA, drata.com slash darknet diaries. Yeah, so that kind of wraps out round one. You identified, you fixed, you cleared, you found all the ones that didn't get fixed, You found it fixed those and took down the whole infrastructure that was doing it. Done. That's patched like permanently 100%.
Starting point is 00:49:25 There's nothing that no customer has that's not patched. We're good. Yeah. So everything I've just described to you happened over four days, you know, which is just, yeah, when you think about it, I mean, it's insane. It's basically one of the largest, widest instant response operations on Earth. And we did it in four days. Wow.
Starting point is 00:49:46 And I still think about it now. I mean, it's a crazy situation. But we were lucky with amazing team. It was, you know, things aligned, you know. Amazing. That's got to be one of those four days that is permanently in your head, like a light bulb experience of work. A lot of people are being on the show and I say,
Starting point is 00:50:06 tell me about the worst day of your life. And would you say that that's probably it? I wouldn't say it was the worst day. I would probably say it was, it was an experience, right? I mean, I remember thinking at the time, oh, this just can't get any worse, you know, and every time we'd kind of look at this,
Starting point is 00:50:26 there'd be something else, or, you know, I remember as these devices were checking into telemetry, we'd just see the number of affected devices grown. I remember feeling like just this gut-wrenching feeling of like, oh, within about, I don't know, six to eight weeks after the hot fixes were rolled out, the threat actors had figured out what the hot fix did to make it impossible for the Ragnarok attack to work
Starting point is 00:50:55 and they had done a workaround. They had just, you know, bounced their attack around the thing that the hot fix was able to, you know, in a very rapid way, cluge together to make it not work. They cloutes together something that got around that hot fix. And wham, round two officially begins. More Sophos firewalls are getting hit with a brand new vulnerability, one that Sophos had no idea was even possible,
Starting point is 00:51:19 but Sophos was ready. They even developed a specialized team just to handle this, X-OPS. So X-Ops jumped on it. They saw what the vulnerability was, they wrote a fix for it, and started immediately trying to patch the firewalls. The team starts to realize, oh, we need to give these things names
Starting point is 00:51:36 because if we're going to be having these attacks happen in sequence in short order, to just keep straight, we need to come up with names. So they decide to use the names of locations around the Pacific Rim as the code names for these internal attacks. So they give this attack a nickname Baja. It doesn't have anything to do with Mexico. It's just they just decided that they want to talk about it in the sense of, you know, it's on the Pacific Rim, which is a region of the world where volcanoes and earthquakes happen, right? So it's a place of turmoil.
Starting point is 00:52:12 So internally, Sopholos realized this attack, is bigger than a single attack. This attack is linked to multiple attack campaigns against their product. So they called this whole series of incidents the Pacific Rim campaign. So what the threat actors figured out when they were doing this,
Starting point is 00:52:31 the development of this Baja attack, as they watched Sophos and they watched how the hot fix mechanism worked. And they learned how to develop a new exploit, also, they started to develop technology and technique to get around hot fixes. So they figured out how hot fixes were being deployed on firewalls, and they were slowly starting to turn off features inside the firewall that allow the hot fixes to launch and run
Starting point is 00:53:05 and do their fixing. Now, this time, they're putting just regular old web shells on the firewalls. A shell is like CLI access to a computer. A web shell, is having remote CLI access to a computer over the internet. And what the threat actors did this round was simply give themselves remote access to as many SOFOS firewalls as they could. And this also removed the need for the attackers to use command and control service
Starting point is 00:53:27 because they could just log in directly to the firewall whenever they wanted and do whatever they wanted to it, which again is a huge problem. You should not allow attackers to enter your firewall on the internet. This is like the security guard of the building suddenly being remote controlled by the bad guys. In June, I mean, we've seen this attack cap and obviously, you know, it was an Apache module issue. And it was changed as like a local privilege escalation.
Starting point is 00:53:57 So it's basically, again, any device that had a WAN facing web portal could be affected, which was a lot of devices. The threat actors set up these web shells where they just needed a username and a password to log in. And so the Sophos team tried to crack that password, but they couldn't for some reason. Actually, I think we unsuccessfully tried to crack the hash of the password, but I think eventually we found out that the actual password was Gucci. Now, which was, we come across this a while later, because it seemed to be a common password for Chinese three actors to use the word Gucci. Now, I have no idea why.
Starting point is 00:54:39 you know, we find, I think at the time there was about 175, 200 devices that were affected. Okay, so one thing you want to do in your investigation is just try to see if there's a commonality of what firewalls are being exploited like this. And that might give you a clue as to what might be next
Starting point is 00:54:56 or who's behind this. So they start looking to see where these firewalls exists in the world and for which customers. Yeah, so this one was very much targeted. You know, the first attack was very much a sprain prey type attack. This was specific devices around the kind of
Starting point is 00:55:14 Asia Pacific area. I think, you know, like Taiwan, Pakistan, places like Philippines, you know, very much targeted, completely different to the first attack. And, you know, we kind of found that, you know, this one had delivered
Starting point is 00:55:30 payloads that have been used in kind of earlier attacks as well. So again, you know, to Linux shell scripts. So we were able to kind of connect it back to a specific actor. You know, we obviously seen these specific files and hashes on the device that we've been tracking and then eventually we see it being used. Now, what was kind of interesting about the way that they would develop these is that we kind of see them starting to work. Now, obviously they'd be working through Chinese hours, they work 9 to 5 and, you know, we'd see them
Starting point is 00:56:05 with amazing OPSEC externally, but the OPSEC they had on the box was atrocious. So they would be, for example, working with crash dumps. And you could set up the soft as firewall that if you ever had a kernel crash or a crash of any sort, it would email you the crash logs to your email address. Well, these guys would use their personal email addresses. So imagine the actual firewalls registered to a completely anonymous person. And then we have linked email addresses and Gmail addresses inside the firewall telemetry because I guess it was probably quickest and easiest for them to grab that stuff from their personal mail you know and it was super easy for us to like OSN exactly who these people were they they start looking
Starting point is 00:56:52 back in time at the telemetry that they collected and they discover that this was another bug that someone had submitted a bud bounty for and gotten payout on. And here it is being used in the wild, like just days after the payout happens. So this is starting to get to be a pattern. And the attacks are widespread. People are getting noticed about it. So I get called in and have to decode how the whole attack works and do another flowchart, similar to what we did with Astorak to do the Baja attack.
Starting point is 00:57:33 These two names keep showing up again in their analysis of these attacks, which are G. Big Mau and T. Stark. These are the people who registered for trial licenses of Sophos firewalls. They were in China, and the malware would show up on their device first, which would indicate this is where all this is originating from. Well, you know, one of the things that we can do. So you've got this telemetry tool that you can do basically wide, scale threat hunting within the firewalls themselves.
Starting point is 00:58:02 And so you can do things like, okay, well, we recovered a piece of malware off of the very first machine that belonged to a customer. Let's see where else this malware exists on the universe of firewalls that are out there. And that was how they found T. Stark. So T. Stark's firewall was the first one where they found a copy of not just the same malware, but like the binary identical, like the actual same. file on this guy's firewall. And he had been there for two months.
Starting point is 00:58:33 So he'd been experimenting with this piece of malware. While the Astrodrock attack was happening, he was basically planning the next one. Like in the middle of us dealing with the aftermath, they were already developing the exploit and building out the payload for that attack. And then the other thing that was really interesting was that we found a bunch of other stuff
Starting point is 00:58:56 on this T-Star guy's firewall his firewall had a bunch of malware on it that was designed to run on the Mac and on iOS on iPads and iPhones and there is no conceivable reason why there would be like a Mac executable on a inside of a Sophos firewall there's no reason for that
Starting point is 00:59:21 so that was an interesting find and we didn't really understand what that was being used for why that was there until much later. Yeah, what was that? So this all happened in June. Starting around August, September, Sophos had started to communicate with other companies in the field,
Starting point is 00:59:42 some of whom did forensic analysis, you know, post-attack analysis for their customers. And one of these companies is called Vlexity. And Vlexity reached out to Sophos because they had a customer with Sophos firewalls, and they were called in to do the investigation on the Baja attack, and they had also discovered MacOS and iOS software in their firewall, and Vlexity came to Sophos and said, hey, guys, why is this here?
Starting point is 01:00:12 We had no idea. But it turned out, so Vlexity had figured out that the threat actors who were dropping these pieces of software on the sofos firewalls that they were investigating, that the owner, of those firewalls, we're operating a charity that supports the Uyghur
Starting point is 01:00:35 diaspora. And the Uyghurs are an oppressed minority in China. They believe in Islam and they practice their faith, but they are strongly discouraged from doing so,
Starting point is 01:00:51 and they've been put in prison camps, and you know, it's the story of the Uyghur is outside of the scope of this podcast, but the point is that there's really only one organization that actually cares about these two groups of people, you know, about surveillance of these two groups of people, and that is the government of China.
Starting point is 01:01:13 During that time, they kept a close eye on the activity of G. Big Mao's firewall, and they would see it would just get infected with a new vulnerability, which was like the fourth zero-day vulnerability on the Sophos firewalls. Zero-day vulnerabilities are ones that Sophos doesn't even know exist. They've had zero days to fix this, basically. And for me, this is the point where I suddenly see the scale of all this. The first attack was scary already, but four zero days on a security
Starting point is 01:01:38 device discovered and leveraged by the same threat actor? That is a lot of time and resources put into finding ways to attack SOFOS products. This isn't just a group of kids or even some kind of cybercriminal, which is focused on making money, when someone can spend this much resources and time focusing on getting into a very specific thing and spend years doing it, that's typically a nation state behind it. The skills and patience were so impressive here, which meant Sophos had a lot of work ahead of them to fix this.
Starting point is 01:02:12 Absolutely. You can imagine, like, the amount of work that this spins up and the way that it kind of balloons out of control, as you discover that more and more pieces of the open source code base, base that you're using or being exploited in different ways. Yeah, who has time for all of that? Like, if all
Starting point is 01:02:34 you're doing is just fixing these patches, that could be a full-time job. But you're also supposed to be building out a product that has new features and response to customer requests and all other things. So, yeah, at a certain point,
Starting point is 01:02:50 it just becomes oppressive. Like, the amount of patching that you have to do in the analysis involved in that. And, you know, fixing the firewall takes just as much QA. You know, it takes time to build things that don't break. And these are critical, I don't want to say they're critical infrastructure, but they're protecting critical infrastructure. Yeah, I mean, in reality, you know, we're at that point that, you know, the, this office firewall itself needed some hardening. I mean, that part is fairly clear. There was an internal mission going on. where data resources may pivot to trying harden certain elements of the operating system
Starting point is 01:03:31 and web portal to really help us. That web portal, I'll tell you, man, the more ports you have open, the more vulnerable you are. And if you have a web portal, you're going to have a million different ways to mess with that thing. You are. When I was a firewall admin, I was very adamant about zero exposure to the Internet. No SSH port, no web portal, nothing is allowed. that the internet should be able to access this firewall. If you want to get to this firewall,
Starting point is 01:03:59 you have to come at it from the inside. Exactly. And I wish every firewall admin acted like you, Jack. But anyway, we had people who just put the firewall on the internet and they put the web portal out there. There was some legitimacy around putting your web portal out there because you had the admin portal, which is separate to the web portal.
Starting point is 01:04:18 The web portal was where users picked up SSL profiles and, you know, things like that. I mean, it is wild to think that someone or some team out there is working feverishly to find vulnerabilities in your product and then to have an implants on their firewall so you could watch them develop their exploits and the threat actor had no idea there was an implants on there watching what they were doing. The Sophos team did a really good job at hiding it, so it'd be really hard for them to notice.
Starting point is 01:04:48 It was really well hidden, you know, so, you know, we did start to get some really good telemetry and start to know these guys. And honestly, we were really obsessed with it. It was almost like obsession ops. We would just wait for this telemetry to come in and then we would be all over it. You know, we'd start to dissect what they were doing, how they were working.
Starting point is 01:05:12 You know, if they'd add any new IP addresses, we'd start to OSN to it. And we'd start to build a picture of who these people were. There were multiple threat actors that we were watching at any one time. And, you know, it's kind of funny because, like, You know, I often think that, you know, external threat intelligence is very much like, almost like, astrology, infosec astrology, you know, where people are kind of connecting a technique to a specific threat actor group.
Starting point is 01:05:40 Dude, we had names. We could tie them to companies, you know. And then we could tie it to threat actor group attribution. You know, it was a really weird situation we were in. We had visibility. was just unreal. I remember, like, at one point we seen one of the actors searching for a flat. So we started to work out that, you know, he was looking for a flat. Like, he was a normal dude. You know, he's going about his everyday life, probably sitting there bored in the lab, you know, having run the same test 10 times and thinking, like, you know, I'd really need to sort my housing situation, you know? And we're there, like, building this picture of his life. And honestly, we were obsessed by it. It really became like obsession ops.
Starting point is 01:06:19 Yeah, because since Craig had control of the firewall, and that guy's lab, he could essentially see all the traffic going through it, which gave him a unique look into this person's life. And with these new insights and closely watching everything that was going on, the Sophos team were able to quickly create fixes for the vulnerabilities to minimize the impact as best as they could. So with all these vulnerabilities fixed, round two of this battle came to a close. Sophos had a lot of bruises, but I think they won the battle. Yeah, I must say for round two, but there's several part. that is kind of useful.
Starting point is 01:06:55 Number one, round two really validated our use of telemetry. It was the first time that we'd really used our implant. The other aspect to this as well is we'd become really adept at finding these three actor devices. So we started to work out that obviously we'd identified this actor called G Big Mow. But all in all, we were dealing with about seven different actors that we could see. You know, some of them were doing the same thing, but in different, locations. So we kind of worked out quite quickly that they're working for individual Chinese
Starting point is 01:07:28 defense contractors because when you think about like a government department, they're not going to duplicate the same work because effectively it's all the same people working where a defense contractor, everything is valuable to them. If they're the first to an exploit, that's super valuable. So what we found then is we found these multiple companies. And one of the simplest ways we actually found it, funnily enough, and this sounds so basic. is that we would look at devices that would be continually going up and down firmware versions.
Starting point is 01:08:01 And these direct-actor devices would constantly like putting the new lace firmware on, roll it back, new firmware, roll it back. And they'd do this like, I know, maybe five or six times a day. Whereas like normal firewall operation, it's like, it's a new firmware and it's left. And then in a month it gets new firmware and then it's left.
Starting point is 01:08:21 So these things just, stood out like a sore thumb. So it suddenly became really easy to find these threat actors, you know. The more telemetry we had, the easier it got, you know. And we started to really build a wide assortment of threat actors in China, the locations they had, and of course, you know, they're honestly piss-poor obsec that they had on the device itself just allowed us to start building up really quite wide profiles on them. And over this period, we would start to like really get an idea of how they were targeting things. And it was very much like seeing them do something, build an attack, know that this was coming and having to wait for it to be deployed, you know.
Starting point is 01:09:05 I mean, if we went and pre-patch the devices continually, they would have noticed, they would know that the game was up, you know? So we kind of waited to understand what was happening, would wait for the first indication of deployment of whatever they were doing. I kind of run the first indication of deployment of whatever they were doing. I kind of run and patch it almost immediately, you know? So we had probably one of the craziest, like, forward-going threat intelligence. Oh, that's crazy. Threat intelligence is simply the understanding of what threats you will face or have faced. This is why I think it's really great having records of all attacks that your company has ever seen,
Starting point is 01:09:41 because it's incredibly valuable at helping you defend against future attacks. But in Sophos' case, they knew exactly what threat was coming next, and were 100% prepared for it the moment it would be seen. That's really slick. That's threat intelligence that's on a whole new level. But even after two huge rounds of attacks against Sophos firewalls and discovering four zero-day exploits on them, the war wasn't over. The threat actors continued to develop more and more exploits for Sophos firewalls.
Starting point is 01:10:10 Yeah, over time, the threat actors were increasingly, they were targeting specific organizations or specific groups. They identified who all of the customers were in those early attacks because they smacked all of the firewalls at once and grabbed some data. Oh my gosh, I didn't even think of that. So if we back up and look at the way all this has progressed. First, they hacked into CyberRome only to get the source code for Sophos firewalls, which gave them inside information to basically bug hunt.
Starting point is 01:10:41 Then they infected 80,000 Sophos firewalls with malware, taking all their configurations and information. about the firewall itself, and then combed through that, looking to see what targets are interesting to them, and now they're being super precise about who they're hitting. This campaign keeps evolving. From 2021 onwards, it really pivoted towards a very short focus to discriminate attacks, you know, really highly targeted hands-on keyboard attacks against specific entities. So, for example, government agencies, critical infrastructure.
Starting point is 01:11:16 research and development organizations, healthcare providers, everything from kind of retail through to military, even finance, you know? And again, all focused in the APAC region. Jeez, what a nightmare. I cannot imagine all these places getting hacked into through my security device.
Starting point is 01:11:35 All these companies bought SOFELS firewalls to protect themselves. And it was that very firewall which allowed Chinese hackers in. At some point, did you reach out to some of victims to say, hey, I think Chinese government is attacking you. So that's one thing we did really extensively. Well, two things. One is we'd reach out to the customer. And again, this was part of our philosophy of making sure that, you know, there's no further damage or no hurt. And as well, we would reach out to either the localized law enforcement
Starting point is 01:12:12 or if we had great ties to the local, you know, cert or NCSE or whoever the local cyber authority was. Now, in the UK, we had some amazing connections in the NCSE, and they would help us facilitate these connections out to all sorts of certs and bodies. And, you know, they were incredibly supportive of us. Yeah, I mean, what's that call like to call up a government, a foreign government? I know you're just talking to the cis admin there, but still like, hey, you guys are getting hacked. It's pretty strange, you know, and not only that when we sit there, you know, obviously through translation very often, explaining what we've seen and what happened and who we attribute it to, it's a very strange experience, you know.
Starting point is 01:13:03 Also, not as strange as calling up another firewall provider telling them that their box is being tooled over by a Chinese threat actor and them ask us, well, How do you know? And not really being able to tell them how we know and why we know, but we definitively know. That's a bit of a weird experience also. At some point, CyberOme gets hacked into again. Well, it turns out that the CyberRome code is the predecessor to the XG firewall code. So CyberRome was the company that Surface bought and their product became the XG firewall. So back in 2018, we're talking about how the threat actors had stolen the source code.
Starting point is 01:13:47 They were using some of that still to find additional vulnerabilities. And they found a vulnerability. At this point, CyberRome and the XG Firewall were in parallel operating, but CyberRome was about to be phased out. It was about to be end of life. And the threat actors found a vulnerability that allowed them to create an admin-level account on the box with just a sequel injection. query that was pre-authentication.
Starting point is 01:14:11 So they could just hit the SQL server that was running on the firewall from the outside and run a command that was able to get it to add a user with admin access. And then they could log in on any cyber room firewall that they wanted to with that credential. And there was no easy fix for it. And because the product was close to end of life, so if it just decided to rush it to end of life and get everybody who was running, a CyberRome firewall to upgrade to the latest XG and put that one to bed because it was it was the point where if we had to start you know tracking attack against CyberRome and XG firewalls that would have taken the
Starting point is 01:14:54 entire like all of the entire team's resources all the time at a certain point it just made better sense to end of life the product early it does make me think though if they were trying to get into Cyber Room to get source code, they were probably trying to get into Sophos' network as well, trying to get source code. I mean, yeah, that's an interesting thing to hypothesize about, but I
Starting point is 01:15:18 have no idea about that. You should say, no, the Sophos firewalls are so good that they're blocked those guys. Don't worry. Well, I don't work there anymore, so I don't have to defend them, but, like, I do think that, you know, Sophos did have, it did seem to have,
Starting point is 01:15:36 better security practices than cyber room did. So after the threat actors found an exploit in the cyberrome product, and we're actively exploiting that, Sophos just decided to kill that product altogether. Now, Andrew tells us it's because it was already on its way of being killed, but I don't want to diminish the idea that a cyber attack can have the effect of killing an entire product line. That's a pretty big deal, if you ask me. Anyway, somehow the French authorities investigated the cyber Rome intrusion
Starting point is 01:16:06 and publicly announced that the attack was carried out by APT 31, which is a Chinese state-sponsored hacker group. So yeah, if it wasn't clear by now, it should be. The Chinese government and military are the ones who are behind this attack campaign known as Pacific Rim, which has been going on for years at this point. We started to see these actors working on more and more attack types, especially T. Stark, you know, we found him working on like a, rootkit at the time. It was called Libxseleinix.s.o. And we managed to capture it from his device.
Starting point is 01:16:44 And it was like a customized user land route kit. So that was actually a real win for us. I remember feeling like, okay, yeah, we've really got a great view of what's happening on these devices here now. Now, we managed to grab these devices from the T-start device. But like a week later then he's got a completely new like injection there like a new vulnerability in web assembly and it's kind of unknown to us and effectively what he was doing was
Starting point is 01:17:16 he was in this web assembly vulnerability he was injecting like an eye frame into the proxy as things move through there and we found that this thing like I think about two weeks or so after we found it had actually been deployed in Tibet. Now,
Starting point is 01:17:39 this was, we found this on this device in Tibet for an organization that was basically providing support to Tibetan exiles. So, you know, he basically moved from 10 days to deployment. Yeah, and I can't remember which,
Starting point is 01:17:56 I don't know who said it. I feel like a president said something like, you know, a business isn't going to be able to take fire. from like a Scud missile or rocket launch. And so we can't expect them to be able to take on attacks, cyber attacks from nation-state actors as well. And at this point, you're starting to feel confident
Starting point is 01:18:17 that this is a nation-state attack on your company. And at this point, there's five or six different zero days that they've discovered on you. I mean, that's got to be some of the most heart-wrenching, gut-sinking feelings to say, okay, I don't know how we're going to ever stop this attack. This might go on forever. Like, what is your response to this mentally?
Starting point is 01:18:40 Honestly, I remember at that point just feeling exhausted, you know. Like, this has been months and months and months of us fighting these, you know, what is effectively the PLA, you know, for all intents and purposes. And the truth is, like, who else helps these organizations? That organization, Tibet, had nowhere near enough resource to be able to deal with this. They were lucky that Vlexity had been doing some pro bono work there.
Starting point is 01:19:07 We'd reached out and helped them as well. But in reality, like, if it hadn't been for our graces, they would have been stuck. And it really comes down to this weird intersection on the internet of lawlessness. Like, there's just so many areas that just are not covered with anyone. I mean, the UK, you know, we have the serious organised crimes unit. and we have the NCSE who protects us in the US, have the FBI and the NSA.
Starting point is 01:19:35 And, you know, many countries just don't have anything. And this is the part that actually surprised me the most. Like, who do these people call to? You know, we felt like heroes, but in reality, like, who are we to deal with this? You know, we're kind of woefully underqualified to deal with a threat actor at that level. You know, I mean, this felt like almost a military operation. Yeah. Suddenly your war room doesn't feel so up to snuff, right?
Starting point is 01:20:01 You're like, man, we're nowhere compared to their war room. Exactly, like, you know? And I think that's what surprised me is like we were really on the age of like what is effectively cyber warfare. And it started to really tip into that feeling with this. But it was certainly interesting. And, you know, as a whole, you know, seeing that payload being delirreuxing. delivered there in understanding the purpose why they delivered the payload, having seen it being
Starting point is 01:20:32 built on a device in Shandu like 10 days, two weeks previously, it was just one of those crazy moments of like, oh my God, like we really see this soup to nuts. Now when Sophos would issue a hot fix or patch their firewalls, they would tell their customer what the update was for, like bug fixes for several security vulnerabilities to learn more visit our knowledge base. But Sophos discovered that the threat actors, T. Stark and G. Big Mal, were also accessing Sophos's site, logging in and reading the knowledge-based articles too to see what got patched. And they were reading exactly what Sophos had fixed and then developed exploits to get around those patches.
Starting point is 01:21:11 So the Sophos team had to get increasingly vague with what got fixed to avoid giving the enemy information. And I suppose that's a form of counterintelligence, being very careful what information you give your enemy. but it kind of contradicts what I said earlier about don't be evil, right? If you're not being transparent and you're hiding what it is you're doing, then you might be evil. But in this case, they had to hide it because they didn't want their enemies to know this. This is so difficult to navigate. And at that point, the threat actors understood how the hot fixes were working
Starting point is 01:21:44 and what telemetry Sophos was collecting off these firewalls, and so they developed an exploit to disable the hot fixes and to stop the telemetry from going back to Sophos to detect which devices were infected. And they took extra steps to hide their presence. The threat actors are developing exploits and they're developing malware and they're coming up with new techniques
Starting point is 01:22:05 for breaking into firewalls. And the implant is revealing all of that stuff to the security team. So behind the scenes, the security team is rushing into production hot fixes and patches for the operating system that fix these. vulnerabilities before the threat actor even knows.
Starting point is 01:22:23 And because they have this ability to send the hot fixes, you know, not necessarily to every machine, but maybe to every firewall, except the ones that the threat actors are using, they can fix the whole universe of firewalls except for the ones that the threat actor is using. And I think after you've tried to deploy your second or third or fourth attack and it just doesn't work and you're scratching your head because it works in the lab, look, I can show you it. I demonstrated it to these guys in the higher-ups at the company or whoever is telling me to do this
Starting point is 01:23:00 attack that it works. But in the wild, it suddenly doesn't work. I think after two or three times of shooting blanks, you're going to start to wonder like, hey, is there something else going on? And they started to look at, well, what is this information, what's a firewall collecting about us? And are we inadvertently revealing as bad guys to the good guys what we were about to do? So, yeah, so they start looking at telemetry. They start looking at log collection and process lists. And they're trying to build out the capabilities to be stealthy. It's maybe distracting them from building custom malware or development.
Starting point is 01:23:44 developing new exploits, but they have to spend a little bit of energy on, you know, it puts them on the back foot. And for the first time, I think this is like one of the cases where you can say, yeah, there was some challenges and we had some bad days early on. But we're forcing the threat actors to have to make moves to counter us. And actually, that feels pretty good. This story just goes on and on. There was another root kit found. There's a root kit number four. Libsofos.S.O. Yeah. So Libsofos was the very custom root kit. It was able to, and again, yeah, deleting logs, hiding its presence on the machine,
Starting point is 01:24:28 trying to do everything as stealthy as possible, low volume of outbound communication and persistence. They're experimenting with everything. And it seems to me that the threat actors have been given carte blanche to just try an experiment with all sorts of different things. So during this period from late 2020 to the end of 2022, we're seeing a huge variety of different payloads, of exploits. It's bad. It's bad out there. It's kind of like the Wild West, and you never know where something's going to. come from. At some point, they saw the threat actor was trying to develop a Ufi boot kit.
Starting point is 01:25:19 This is malware, which infects the firewall at the BIOS before the operating system, even has a chance to boot up. You know, if you can get a boot kit into the UFE BIOS of a device, there's nothing that you can do in the, you know, user land of the operating system to remove it. because it's running at a level beyond which the operating system cannot reach. Yeah, a boot kit like this would remain on the system, even if you deleted everything and reinstalled the entire operating system again, since it lives in the part of the computer which loads before the operating system loads. This was actually kind of scary to find this experimentation happening on one of the threat actor devices. They were really trying to figure out if they could get this boot kit to run on a firewall.
Starting point is 01:26:10 and they ended up bricking the firewall. It didn't work. And after we discovered what they were trying to do, the Sophos engineers figured out how to, you know, change the firmware on the firewall at that low level so that it wasn't able to run. And they implemented that in an update. But that's the scariest thing on all of this.
Starting point is 01:26:37 I think the UFE boot kit malware on a firewall, is the Holy Grail. It's where you've got malware on a firewall. It can't be removed. The firewall has to be thrown in the trash. It's scary. And we've already seen that there's been other firewall vendors where their recommendation was
Starting point is 01:26:56 unplug this box and put it in the trash because it is not safe to use anymore. So it makes me wonder, because we never get the details from other reports. about what happened, whether this was successful with other vendors, and whether they were testing this with us and it just failed because we were watching them and stuck a wrench in the works just at the right moment and made it too much of a pain in the butt for them to keep trying, and they just moved on to the next guy.
Starting point is 01:27:33 This was very much the kind of end of my involvement in this, because I actually left Sophos at this time and went to work for. for the company I'm currently working for now, you know. But I mean, from that point, I kept in really close contact with my colleagues who were there. And we were sharing intel as things progressed, you know. But I mean, there were kind of two further published engagements, basically one in May of 2023 and then one in March of 2024.
Starting point is 01:28:06 And then it kind of came to head, you know. which actually was kind of disappointing a sense for me because I think very often that this stuff hasn't stopped I mean the devices are significantly more secure now software's putting an
Starting point is 01:28:24 an ordinary amount of time effort and money into hardening the devices I would actually hazard to say that they're probably the one for a global company that actually is secure now you know in all seriousness though, it's, you know, I think it's one of those aspects of, you know, you learn from your mistakes.
Starting point is 01:28:44 I mean, soft as being incredibly open and clear about this. I mean, kudos to them. I mean, you know, being open about it and, you know, publishing your mistakes and also, you know, publishing what we did and how we work through this is super unique, you know, and you don't see any other Ferwell company talking about this. And we know for sure that this stuff was happening across a multitude of other devices. The tree says it's probably happening right now to some other firewall providers. We just, they just don't know. They don't collect telemetry. They don't have the hot fix mechanism that allows them to forward-defend you. And yeah, it's an issue. It's still an issue. One of the actors involved in all of this, we talked about him earlier, his name is, you know,
Starting point is 01:29:29 use the handle G-BigNow, that we eventually figured out his real name. You have the pictures of him. and the guy appears on the FBI's Ten Most Wanted list today. His name is Guan Tian Feng, and he was the researcher at this company called Sichuan Secret... Silence Technology Company. Yeah, Sisuan Silence Technology Company Limited, right? So this guy made it his career to break into firewalls and firewals and find vulnerabilities
Starting point is 01:30:08 and then pass them off to people who would take advantage of them. And for all of his efforts, he's in his early 30s, he has a $10 million rewards for justice bounty on his head, and he can never travel outside of a non-extradition
Starting point is 01:30:27 country in the world ever again without fearing for arrest and extradition to the United States. And it just makes me wonder if it really was worth it to him. Because in many respects, it seems like a nice guy.
Starting point is 01:30:47 At one point, he had his heart in the right place. So, G. Big Mau, in his early days of working in this field, used to post on message boards trying to get firewall companies to fix their stuff. I can't imagine what happened to turn him, to make him break back. in this way. It actually says in the FBI's Cyber's Most Wanted poster that this guy hacked into 80,000 Sophos firewalls. And just because I'm curious, I took a look at a few dozen other FBI
Starting point is 01:31:18 Cyber's Most Wanted posters, and strangely, I don't see any other person listed for hacking into other security vendors. So again, hats off for Sophos for taking the Strat Actors so seriously and getting them on FBI's Cyber's Most Wanted list. The story, as we published it, finishes in 2024, not because the attacks stopped, but because at a certain point you just got to put a pin in it and say, we're going to stop here because if we keep talking about this, it never ends because the attacks have continued ever since. Nothing has stopped.
Starting point is 01:31:57 And if there's anything to be said about this is that the cadence has picked up, it has broadened its scope. We're seeing every security company in the industry in various ways targeted in very similar ways. A big thank you to Andrew Brandt and Craig Jones for coming on the show and telling us this incredible story of how Sophos got targeted by a Chinese state-sponsored threat actor. This story is dang scary to be,
Starting point is 01:32:36 since the plankfield is so unfair. A single company versus a superpower like China. And not only that, a superpower that's lawless and feels absolutely no shame from breaking the law. You'd think that after their main guy was arrested by the FBI, they'd pull back and maybe apologize. But no, they increase their efforts and are hitting harder than ever against so many security vendors too. Hey, I really want you to become a premium subscriber to Dark Night Diaries. All I'm asking is for you to buy me a cup of coffee once a month. This is my full-time job.
Starting point is 01:33:08 This is how I make a living. If I suddenly stop making this show, would you be sad? If so, then you probably find it valuable. And I hope you support things that you find valuable. If you become a premium subscriber, you get ad-free episodes, bonus episodes. And coming up later this year is a new podcast I'll be releasing, and you'll be the first to listen to it, because it'll only be available to premium subscribers for a while.
Starting point is 01:33:31 So please visit plus. Darknet Diaries.com to support the show. Thanks. This episode is created by me, the lead firewall offender, Jack Recyter. Our editor is the port knocker, Tristan Ledger. Mixing done by proximity sound, and our intro music is by the mysterious breakmaster cylinder. I named my firewall linebacker because it's great at blocking and tackling. This is Darknet Diaries.

There aren't comments yet for this episode. Click on any sentence in the transcript to leave a comment.