Security

Cyber-crime

US names Chinese national it alleges was behind 2020 attack on Sophos firewalls

Also sanctions his employer – an outfit called Sichuan Silence linked to Ragnarok ransomware


The US Departments of Treasury and Justice have named a Chinese business and one of its employees as the actors behind the 2020 exploit of a zero-day flaw in Sophos firewalls

The attack was made possible by a critical-rated SQL injection flaw known as CVE-2020-12271 that was exploited in the wild in April 2020. Sophos quickly published a hotfix to harden its XG firewalls and quash the zero-day attack.

But the DoJ on Tuesday asserted that 81,000 firewalls were nonetheless compromised – including at least one used by an agency of the United States government.

The DoJ also named Guan Tianfeng as a co-conspirator in the attack, along with fellow employees at an outfit awesomely named Sichuan Silence Information Technology Co. Ltd.

Treasury identified Guan as a security researcher at Sichuan Silence at the time of the compromise. "Guan competed on behalf of Sichuan Silence in cyber security tournaments and posted recently discovered zero-day exploits on vulnerability and exploit forums, including under his moniker GbigMao," Treasury claimed, adding that it considers him "responsible for the April 2020 firewall compromise."

The Department also alleged that Sichuan Silence is a "cyber security government contractor whose core clients are PRC intelligence services." The biz apparently offers those clients services including "computer network exploitation, email monitoring, brute-force password cracking, and public sentiment suppression products and services."

An indictment [PDF] claims that Guan and his employer acquired Sophos firewalls to test them for vulns and later registered the domain sophosfirewallupdate.com.

That domain name was chosen as it appears legitimate – but it was allegedly used to deliver malware to Sophos firewalls after a successful SQL injection attack. That payload stole info from the Sophos firewalls and sent it to a Chinese IP address.

The document also claims that Sichuan Silence tried to modify its malware to deliver the Ragnarok ransomware when it detected installation of Sophos's patch. That modification failed.

Guan is thought to reside in China, and now that he's been indicted is unlikely to leave or travel to Thailand – a country the FBI believes he occasionally visits.

The Department of State announced rewards today of up to $10 million for information leading to the identification or location of Guan or any person who, while acting at the direction or under the control of a foreign government, engages in certain malicious cyber activities against US critical infrastructure in violation of the Computer Fraud and Abuse Act.

Even if that offer doesn't yield results, Treasury has sanctioned Guan and Sichuan Silence – meaning it's illegal for any US business to work with them, and any assets they own in the US are blocked and must be reported to the Office of Foreign Assets Control (OFAC).

All the agencies mentioned above assert that the work to identify Guan and Sichuan Silence shows the US will not tolerate those who mess with critical infrastructure – and let that be a lesson to China.

Sophos CISO Ross McKerchar welcomed the agencies' actions, but noted China isn't backing off.

In a canned statement, he argued "We can't expect these groups to slow down, if we don't put the time and effort into out-innovating them, and this includes early transparency about vulnerabilities and a commitment to develop stronger software." ®

Send us news
4 Comments

Wallbleed vulnerability unearths secrets of China's Great Firewall 125 bytes at a time

Boffins poked around inside censorship engines – here's what they found

Xi know what you did last summer: China was all up in Republicans' email, says book

Of course, Microsoft is in the mix, isn't it

China's Silver Fox spoofs medical imaging apps to hijack patients' computers

Sly like a PRC cyberattack

Chinese spies suspected of 'moonlighting' as tawdry ransomware crooks

Some employees steal sticky notes, others 'borrow' malicious code

Drug-screening biz DISA took a year to disclose security breach affecting millions

If there's something nasty on your employment record, extortion scum could come calling

More victims of China's Salt Typhoon crew emerge: Telcos just now hit via Cisco bugs

Networks in US and beyond compromised by Beijing's super-snoops pulling off priv-esc attacks

Malware variants that target operational tech systems are very rare – but 2 were found last year

Fuxnet and FrostyGoop were both used in the Russia-Ukraine war

Ghost ransomware crew continues to haunt IT depts with scarily bad infosec

FBI and CISA issue reminder - deep sigh - about the importance of patching and backups

US Cyber Command reportedly pauses cyberattacks on Russia

PLUS: Phishing suspects used fishing gear as alibi; Apple's 'Find My' can track PCs and Androids; and more

How nice that state-of-the-art LLMs reveal their reasoning ... for miscreants to exploit

Blueprints shared for jail-breaking models that expose their chain-of-thought process

Microsoft names alleged credential-snatching 'Azure Abuse Enterprise' operators

Crew helped lowlifes generate X-rated celeb deepfakes using Redmond's OpenAI-powered cloud – claim

Feds: Army soldier suspected of AT&T heist Googled ‘can hacking be treason,’ ‘defecting to Russia’

FYI: What NOT to search after committing a crime