By Eduard Kovacs on August 04, 2015 Researchers at RSA have conducted an in-depth analysis of a Chinese virtual private network (VPN) service that has been used by advanced persistent threat (APT) groups to anonymize and obscure their activities.
Dubbed “Terracotta” by RSA, the commercial VPN service is marketed in China under various brands. The network is often used for anonymity, peer-to-peer (P2P) file sharing and gaming acceleration, and to bypass China’s Great Firewall’s censorship system.
One of the things that caught the attention of researchers is that Terracotta is a malware-supported VPN network. Many of the service’s more than 1,500 VPN nodes are on compromised servers belonging to various organizations from all over the world.
According to researchers, at least 31 of the host systems are hacked Windows servers belonging to a major hotel chain, U.S. government organizations, universities, tech services providers (including government contractors), and various private firms.
RSA believes the operators of Terracotta are targeting Windows servers because they include VPN services that can be easily configured. In all cases, the hijacked servers were Internet-exposed devices that were not protected by hardware firewalls.
full article
Chinese VPN Used by APT Actors Relies on Hacked Servers
Login to the community
No account yet? Create an account
Enter your E-mail address. We'll send you an e-mail with instructions to reset your password.