They also used social engineering techniques that involved calling utilities in Kazakhstan, Taiwan, Greece, and the U.S. and just asking them for sensitive information, which they sometimes got.
"These methods and tools are relatively unsophisticated," the report concluded."The tools simply appear to be standard host administration techniques that utilize administrative credentials. This is largely why they are able to evade detection by standard security software and network policies."
McAfee also put out a whitepaper on how to recognize Night Dragon attacks from this group and others (PDF) using similar techniques.