Managed service providers are being targeted by a major APT group, a recent report said, as they serve as a third-party vector of attack into end-target customer accounts.
The report, by the National Cyber Security Centre, BAE Systems and PricewaterhouseCoopers UK, found that China-based hacking group APT10 has been targeting managed service providers and others with "common as well as custom malware."
A blog post by BAE Systems said MSPs offer a tantalizing target for attacks because while they offer a way for companies to enable their businesses around technology, the "network connectivity which exists between MSPs and their customers also provides a vector for attackers to jump through."
"Successful global MSPs are even more attractive as they become a hub from which an intruder may access multiple end-victim networks," the blog post said. The post said companies have been tracking attacks at "several major MSPs" since late 2016, attributing them to this APT10 group. It said activity by this group increased in the middle of last year.
FireEye also issued a blog post following the PwC and BAE Systems report, saying its own iSight threat intelligence had seen a "resurgence" in APT10 activity in June 2016, targeting universities, construction, engineering, aerospace and telecom firms. It said it had also seen APT10 activity at "multiple IT service providers worldwide."
FireEye said APT10 seems to be using spearphishing attacks and "accessing victims through global service providers," which it said have access to customer networks and traffic and data exfiltration is likely deemed benign. The PwC and BAE Systems report said it is also seeing malware and spearphishing as the main attack tactic used to target MSPs.
"We believe these companies are a mix of final targets and organizations that could provide a foothold in a final target," FireEye said in its blog post. "APT10 is a threat to organizations worldwide. Their abuse of access to service provider networks demonstrates that peripheral organizations continue to be of interest to a malicious actor – especially those seeking alternative angles of attack," it said.
Stephen Boyer, CTO of Cambridge, Mass.-based BitSight, which offers a way for companies to evaluate their third-party risk, said he is seeing third-party attacks "continuing to go up," especially as companies look to outsource more of their data and operations. He said MSPs and VARs are one such third-party attack vector, one he said is particularly appealing to attackers because of their extensive supply chain and list of clients, services and access to systems.
"I only need to get one [attack to work to get access to all of these clients]. … That’s why it's so juicy," Boyer said.