M-unition -

Netizen Research Bolsters APT1 Attribution

By on February 27, 2013

In the week since we released our report on APT1, we have observed an amazing response, not only in the media but also by individuals who have taken the data we provided and conducted their own research.  We are excited to see people using our data, both for online research and for their network defense.  In this post we want to highlight and summarize information that others have discovered.

1. The phone number used by the APT1 DOTA persona was also a contact phone number for an apartment rental advertisement in 2009.  This apartment is 600 meters away from the Unit 61398 headquarters building and further links the DOTA persona to that location.

Chinese-speaking netizens disclosed on Twitter that the phone number we associated with DOTA (159-2193-7229) was also the contact phone number listed at http://shanghai.favolist.com/05953558.shtml.  This page is a rental advertisement dated 2009-10-09 and shown in Figure 1 with the phone number underlined.  Figure 2 is an English translation of the advertisement title and body.

Figure 1: Rental advertisement at http://shanghai.favolist.com/05953558.shtml

Figure 1: Rental advertisement at http://shanghai.favolist.com/05953558.shtml

Figure 2: Translation of the rental advertisement at http://shanghai.favolist.com/05953558.shtml

Figure 2: Translation of the rental advertisement at http://shanghai.favolist.com/05953558.shtml

The apartment complex name, Yixinyuan (怡心苑), the location Waigaoqiao, and the description “about a 10-minute walk away from Gangcheng Road subway station” together pinpoint the apartment complex to be at Huashan Road 609 Long, Pudong, Shanghai, China, according to the Yixinyuan website at http://yixinyuan021.soufun.com.  This apartment complex is only a 600-meter walk away from the Unit 61398 headquarters building, as depicted in Figure 3.

Figure 3: Walking directions from Yixinyuan apartment complex to Unit 61398 headquarters

Figure 3: Walking directions from Yixinyuan apartment complex to Unit 61398 headquarters

We observed DOTA/APT1 using the phone number in June 2011 and again in September 2011, showing that the number was not a simple “throw-away” number registered for one-time use.  The date of the advertisement and the date we observed DOTA using the phone number are separated by over one and a half years.  It is plausible that DOTA (or someone in APT1) worked for Unit 61398, lived in the Yixinyuan apartment complex and wrote this advertisement.[1]  The remaining possibilities seem significantly less likely, including:

  • The phone number did not belong to APT1 in 2009, and it is a coincidence that the user of the phone at the time was associated with an apartment so close to Unit 61398.
  • A member of APT1 lived 600 meters from Unit 61398, but APT1 is not Unit 61398.
  • APT1 is not operating in Pudong but is intentionally trying to frame Unit 61398 or a Pudong-based organization.  In 2011, someone in APT1 saw the rental advertisement from 2009 and configured a phone to successfully accept text messages to the phone number in the advertisement on multiple occasions.

2. The APT1 SuperHard persona may have been a student at the PLA’s Information Engineering University, one of the Chinese military’s premier training grounds for computer network operations.

On his blog, Cyb3rsleuth disclosed a person using the username “Superhard_M” and the email address mei_qiang_82@hotmail.com.   In a job profile, this person “mentions that his interests are network security and developing hacking tools.”  This person’s address in 2005 was listed as “Henan Zhengzhou 1001 mailbox 774”.  Cyb3rsleuth noted this address “belongs to the famous PLA Information Engineering University [and] implies he was a student at PLAIEU.”[2]  Furthermore, a person named Mei Qiang (梅强) co-authored two papers in 2007 and 2008 that are associated with the PLAIEU.  The papers are titled “HTTP Session Hijacking on Switch LAN and Its Countermeasures” and “Stack Protection Mechanisms in Windows Vista”.  In a 2012 report prepared for the U.S.-China Economic and Security Review Commission, Northrop Grumman analysts noted, “The PLA Information Engineering University (PLAIEU), located in Zhengzhou, Henan Province, is perhaps the military university with the most comprehensive involvement in information warfare and computer network operations training, planning, and possibly also execution.”  This information is consistent with the APT1 SuperHard persona, and given SuperHard’s development skills, it would not be surprising if SuperHard was trained at the PLAIEU.

3. The APT1 UglyGorilla persona may have been a student at Shanghai Jiaotong University in 2004.

Cyb3rsleuth also disclosed that a person with the username “uglygorilla” was logged as “on station 2 times” by the Shanghai Jiaotong University (SJTU) bulletin board system in August 2004.  This person logged in from the Shanghai IP address 210.22.114.46.  Other people may use the name “uglygorilla” and this may not be the APT1 UglyGorilla persona.  However, if it is, it would indicate that he was probably a student at SJTU when he posed his question about Chinese cyber troops to Zhang Zhaozhong.

4. In 2004, Unit 61398 was located in Pudong, Shanghai and was recruiting computer science students from Zhejiang University.

An article published in the China Digital Times disclosed a 2004 recruitment notice on the Zhejiang University website advertising, “Unit 61398 of China’s People’s Liberation Army (located in Pudong District, Shanghai) seeks to recruit 2003-class computer science graduate students.” This corroborates our assertions concerning the kinds of personnel that Unit 61398 recruits.  This also indicates Unit 61398 has been operating in Pudong since 2004, even though the current headquarters facility was not built and operational until years later.

Finally, our thanks to Wendy Nather, who expanded on our Occam’s Razor arguments in her Idoneous Security blog.  We appreciated the entire blog post, but especially these closing words:

From what Mandiant has presented, the simplest explanation is the one it’s offering. It’s politically explosive, of course, and that’s why belief comes into play. But if you have to do more work to deny something than to accept it, you might want to reconsider your chain of logic.

 

 


[1] We are aware Marketplace reported that they called the phone number and reached someone unaffiliated with Unit 61398 or hacking activities. Marketplace said in the podcast that they called the number that the narrator said. This is when we discovered an unfortunate typo in the video narration script, which read “7729” instead of “7229” that was on the screen. The number was correctly published as “7229” in our main report.

[2] The link between the PLAIEU and this address seems to be corroborated in this paper: http://file.lw23.com/6/60/607/6071f3f4-40e6-4c7b-8868-3b0b21a9f601.pdf

 

Category: The Suite Spot

Comments

    1. By Damien Dodge on February 28 at 9:57 pm

      Awesome report (APT1) – you guys did a great service to our country. Thanks, from a U.S. Navy sailor.

    Leave a Comment

Get M-Unition in Your Inbox:

Follow @mandiant

  • Congrats to @droecher for winning the #MIRcon 2014 Twitter Contest! Please direct message us to retrieve your $500 Apple gift card

Follow @mandiant on twitter.

MIRcon 2014


Oct. 7-8, 2014
Washington, DC

The Mandiant Incident Response Conference (MIRcon) offers participants the opportunity to hear from some of the most influential voices in cybersecurity while networking with peers.

Sessions at MIRcon will cover best practices, case studies and instruction on important aspects of the information security terrain, including incident response, malware analysis, reverse engineering and computer forensics.

Register Today!

Career Opps @ Mandiant

We’re growing fast, but we’re as demanding as ever. Our clients come to us in their hours of need, so we need the best. That means more than just the right education and the right experience in information security.

As Mandiant continues to grow, we are able to offer certain positions in multiple locations. For details on the location(s) of each opening, please refer to the position descriptions.

Click here to view available positions.