You are here
Vietnam-linked hacking group targets Toyota, other companies
A VIETNAM-BASED hacking group is learning from China's playbook, using increasingly sophisticated cyber-attacks to spy on competitors and help Vietnam catch up with global competitors, according to cybersecurity experts.
In the last two years, the group, which is believed to be tied to the Vietnamese government and known as APT32, has ramped up its cyber-espionage, particularly in South-east Asia, according to the cybersecurity firm CrowdStrike.
The hacking group's exploits have included intellectual property theft, the firm said, the same activity for which Chinese hackers are infamous.
The automotive industry has been a key target for APT32, according to multiple experts.
For example, APT32 created fake domains for Toyota Motor and Hyundai Motor in an attempt to infiltrate the automakers' networks, according to a researcher familiar with the matter who requested anonymity discussing companies.
In March, Toyota discovered that it was targeted in Vietnam and Thailand and through a subsidiary - Toyota Tokyo Sales Holdings - in Japan, according to spokesman Brian Lyons.
A Toyota official, who requested anonymity discussing the hacking group, confirmed that APT32 was responsible.
Vietnam has also targeted American businesses relevant to Vietnam's economy, including the consumer products industry, for years, according to experts.
"What's changed more recently, and this is consistent with broader trends in the cyberthreat actor landscape, is that they are getting better and better at it," said Andrew Grotto, a fellow at Stanford University who served as the senior director for cybersecurity policy on the National Security Council from late-2015 to mid-2017.
"They are becoming more adept at developing their own tools, while at the same time tapping the global malware market for commercial tools."
The uptick in Vietnam's economic espionage activity, which began in 2012 and has spiked since 2018 according to CrowdStrike, comes as the Trump administration seeks to curb what many believe has been rampant intellectual property theft by China.
Former US National Security Agency director Keith Alexander, who served under US presidents Barack Obama and George W Bush, has called it the "greatest transfer of wealth in history".
The Vietnamese hackers have emulated some of China's cyber methods, albeit on a significantly smaller scale, the experts said.
Vietnamese government hackers have likely "seen how successful the Chinese have been at building cyber-espionage capabilities and cybersurveillance capabilities" according to Eric Rosenbach, co-director of the Belfer Centre for Science and International Affairs at the Harvard Kennedy School and a former assistant secretary of defence for global security during the Obama administration.
As a result, they may be building out or purchasing their own capabilities "either for economic interests or outright theft of intellectual property", he said.
A Vietnamese government spokesman previously said allegations that state-aligned hackers targeted foreign carmakers were "unfounded". A representative for the US State Department declined to comment on allegations about economic espionage by Vietnam.
A Hyundai representative did not comment on whether it had been targeted by the Vietnamese hacking group, but said that the company "promptly detects and responds to the events of its IT securities".
Vietnam is part of a growing group of countries - outside of major cyberplayers such as Russia and China - that are developing and buying cyber capabilities, according former government officials.
"One of the trends that we tracked when I was in the White House was both the broadening of the number of countries that had active cyber programs," said Michael Daniel, who served as the cybersecurity coordinator on the National Security Council under Mr Barack Obama and is now president and chief executive officer of the non-profit group Cyber Threat Alliance. "The ones that have been investing in cyber like Vietnam are continuing to grow in capability."
Cybersecurity experts offered different, and sometimes conflicting, reasons to explain the hacking group's activities, from stealing intellectual property to improve Vietnamese products to gaining a competitive edge in negotiations to ensuring foreign corporations are complying with national regulations.
Ocean Lotus Cybersecurity firm FireEye has been tracking APT32 - which is also known as Ocean Lotus and Ocean Buffalo - since 2012, according to Nick Carr, a director at the firm.
In 2017, his team investigated a series of hacks in the US, Germany and multiple countries in Asia and found that the group had spent at least three years targeting foreign governments, journalists, dissidents and "foreign corporations with a vested interest in Vietnam's manufacturing, consumer products and hospitality sectors".
Ongoing tactics by APT32 appear to include registering domains that resemble car companies - a move which can precede phishing attacks, in which credentials are stolen by hackers in order to access internal networks, said John Hultquist, FireEye's director of intelligence analysis.
"Most recently, we have seen suspected APT32 domain registration activity designed to resemble automotive firms," Mr Hultquist said. "This ongoing registration activity affirms APT32's continuing interest in foreign automakers doing business in Vietnam."
APT32 recently used Facebook to target individuals who are active in Vietnamese politics, according to the Slovakia-based cybersecurity firm Eset.
In this attack, APT32 hackers sent Facebook messages, or Facebook pages, containing what appeared to be a photo album.
When victims scrolled through the album, one of the many photos was in fact a malicious document that installed malware on the computer, said Marc-Etienne M Leveille, a researcher at the firm.
Targeting dissidents has been part of a broad surveillance campaign that has included hacking into websites popular with politically active citizens and then using those sites to track them and collect information, said Steven Adair, founder of the cybersecurity firm Volexity.
APT32 conducted "a very sophisticated and extremely widespread mass digital surveillance and attack campaign" targeting Asian countries, the media, groups associated with human rights and civil society as well as the Association of Southeast Asian Nations, Volexity reported.
While Vietnamese hacking of corporations appears to be on the rise, FireEye has seen a major decline in China's IP theft against corporations - even as the US trade talks with China have emphasised negotiating an end to it.
"From China's perspective, we've definitely seen a massive drop off of that," said Mr Hultquist of FireEye.
But Vietnam is at a significantly earlier stage in development and, like China did years ago, has turned to cyber-espionage as a means of becoming more competitive, said Mr Adam Meyers, CrowdStrike's vice president of intelligence. "This is like a mini-China story," he said. BLOOMBERG