Live
- Chanchalguda Jail Officials Say They Haven't Received Bail Papers Yet, Allu Arjun May Stay in Jail Tonight
- BJP leaders present evidence of illegal voters in Delhi, urge EC for swift action
- Exams will not be cancelled: BPSC chairman
- Nagesh Trophy: Karnataka, T.N win in Group A; Bihar, Rajasthan triumph in Group B
- YS Jagan condemns the arrest of Allu Arjun
- Economic and digital corridors to maritime connectivity, India and Italy building vision for future, says Italian Ambassador
- SMAT 2024: Patidar's heroics guide Madhya Pradesh to final after 13 years
- CCPA issues notices to 17 entities for violating direct selling rules
- Mamata expresses satisfaction over speedy conviction in minor girl rape-murder case
- Transparent Survey Process for Indiramma Housing Scheme Directed by District Collector
Just In
Targeted Cyber-Attacks to Infiltrate Nations around the South China Sea
Targeted Cyber-Attacks To Infiltrate Nations Around The South China Sea. From setting up spyinginfrastructure within a country’s borders for real-time connections and data mining, to spying tools with 48 commands, a new report by Kaspersky Lab shows how the threat actor Naikon has spent the last five years successfully infiltrating national organisations around the South China Sea.
From setting up spyinginfrastructure within a country’s borders for real-time connections and data mining, to spying tools with 48 commands, a new report by Kaspersky Lab shows how the threat actor Naikon has spent the last five years successfully infiltrating national organisations around the South China Sea.
Experts have discovered that Naikon attackers appear to be Chinese-speaking andthat their primary targets aretop-level government agencies and civil and military organizations in countries such as the Philippines, Malaysia, Cambodia, Indonesia, Vietnam, Myanmar, Singapore, and Nepal.
Kaspersky Lab has identified the following hallmarks of Naikon operations:
- Each target country has a designatedhuman operator, whose job it is to take advantage of cultural aspects of the country, such as a tendency to use personal email accounts for work;
- The placing of infrastructure (a proxy server) within the country’s borders to provide daily support for real-time connections and data exfiltration;
- At least five years of high volume, high profile, geo-political attack activity;
- Platform-independent code, and the ability to intercept the entire network traffic;
- 48 commands in the repertoire of the remote administration utility,including commands for taking a complete inventory, downloading and uploading data, installing add-on modules, or working with the command line.
The Naikon cyberespionage threat actor was first mentioned by Kaspersky Lab in its recent report, “The Chronicles of the Hellsing APT: the Empire Strikes Back” where the actor played a pivotal role in what turned out to be a unique story about payback in the world of advanced persistent threats. Hellsing is another threat actor who decided to take revenge when hit by Naikon.
“The criminals behind the Naikon attacks managed to devise a very flexible infrastructure that can be set up in any target country, with informationtunneling from victim systems to the command center. If the attackers then decide to hunt down another target in another country, they could simply set up a newconnection. Having dedicated operators focused on their own particular set of targets also makes things easy for the Naikon espionage group,” – says Kurt Baumgartner, Principal Security Researcher, the GreAT team, Kaspersky Lab.
Naikon’s targets are hit using traditional spear-phishing techniques, with emails carrying attachments designed to be of interest to the potential victim. This attachment might look like a Word document, but is in fact an executable file with a double extension.
Kaspersky Lab advises organizations to protect themselves against Naikon as follows:
- Don’t open attachments and links from people you don’t know
- Use an advanced anti-malware solution
- If you are unsure about the attachment, try to open it in a sandbox
- Make sure you have an up-to-date version of your operating system with all patches installed
Kaspersky Lab protects users against the threat,usingAutomatic Exploit Prevention functionality to detect Naikon’s components as: Exploit.MSWord.CVE-2012-0158, Exploit.MSWord.Agent, Backdoor.Win32.MsnMM, Trojan.Win32.Agent and Backdoor.Win32.Agent.
To learn more about the “Naikon” threat actor, please read the blog post at Securelist.com.
© 2024 Hyderabad Media House Limited/The Hans India. All rights reserved. Powered by hocalwire.com