Symantec has identified a group of cybercriminals targeting corporate IP, with Twitter, Facebook, Apple and Microsoft among those hit Credit: Thinkstock Symantec has identified a group of cybercriminals, whom they’ve named “Butterfly,” as targeting corporate intellectual property for financial gains, with Twitter, Facebook, Apple and Microsoft among those hit.“Attackers going after intellectual property is not that usual,” said Vikram Thakur, senior manager at Symantec.“Butterfly” was originally named “Morpho,” but the latter name was taken.Unfortunately, a name like “Butterfly” doesn’t do much to convey the level of threat the group poses. “Butterfly” by itself doesn’t sounds too ominous, but “Istanbul Butterfly” or “Seaweed Butterfly” instantly sound better. However, those attackers tend to be state-sponsored and target information or military or other strategic importance.“That kind of intellectual property is of high value to nations across the board,” he said. But Butterfly goes after research documents produced by civilian firms across a wide variety of industries.In 2013, the companies hit tended to be technology companies, then Butterfly began going after legal and pharmaceutical firms.“In the last month, we started seeing commodity companies hit — oil, natural gas, and mining,” said Thakur.What all these companies have in common is that they’re publicly listed, and most are in the Fortune 200.Another common thread is that attacks often occur after the corporation has been in the news as a result of possible merger and acquisition activity, he added.“We do not believe that this is the work of any nation state,” he said. “We don’t even think that this is work done on behest of any nation state.” Thakur said that there has also been no signs on the Dark Web of criminals trying to sell this information on the black market.“It’s difficult for one entity to be selling this intellectual property and not being exposed over the past three years,” he said.That leaves just one explanation, he added.“We think a group of people is deliberately stealing this information for some sort of insider trading in the financial markets,” he said. However, Symantec hasn’t been able to link the thefts with any stock market activity around the time of the theft, either because the criminals are using the information for longer-term activity, or because they are very good at covering their tracks.Thakur said that, so far, they’ve left little evidence behind, deleting their malware and cleaning up other traces after themselves.For example, on occasion particular external servers were used to conduct the attacks. When Symantec investigated, it discovered that the servers were fully paid for, not hacked — but the criminals had paid for them in Bitcoin. And not just in a single Bitcoin payment, but in small batches of Bitcoin from different accounts.“It made it virtually impossible to figure out where all those different Bitcoin had come from,” he said.To attack the companies, Morpho uses watering holes — compromised websites known to be visited by people working in the target companies.“They also used a couple of zero days, so we know they are funded pretty well,” said Thakur. “In the underground, you have to spend a lot of money to get access to the zero days — or have a lot of technical know-how to do it yourself.”There is another possible explanation for how this group works, according to Ron Arden, vice president at security firm Fasoo.They could be hackers for hire, ready to go to work for anyone motivated enough to hire them, he said.These kinds of deals are often arranged through intermediaries, he said.“About a year ago, there was a Korean company that bribed Dupont employees to steal information so they could recreate chemical products,” he said.Criminals looking for stock market tips are more likely to be going after financial documents or five-year plans, he said.“If they’re stealing formulas for pharmaceuticals or manufacturing designs, it’s more likely that they’re trying to sell it to someone who, say, might want to make knock-offs.” Related content news Chinese state actors behind espionage attacks on Southeast Asian government The distinct groups of activities formed three different clusters, each attributed to a specific APT group. By Shweta Sharma Sep 25, 2023 4 mins Advanced Persistent Threats Advanced Persistent Threats Cyberattacks feature How to pick the best endpoint detection and response solution EDR software has emerged as one of the preeminent tools in the CISO’s arsenal. Here’s what to look for and what to avoid when choosing EDR software. By Linda Rosencrance Sep 25, 2023 10 mins Intrusion Detection Software Security Monitoring Software Data and Information Security feature Top cybersecurity M&A deals for 2023 Fears of recession, rising interest rates, mass tech layoffs, and conservative spending trends are likely to make dealmakers cautious, but an ever-increasing need to defend against bigger and faster attacks will likely keep M&A activity steady in By CSO Staff Sep 22, 2023 24 mins Mergers and Acquisitions Data and Information Security IT Leadership brandpost Unmasking ransomware threat clusters: Why it matters to defenders Similar patterns of behavior among ransomware treat groups can help security teams better understand and prepare for attacks By Joan Goodchild Sep 21, 2023 3 mins Cybercrime Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe