Wide electronic attack targeted 40 countries since 2004




Wide electronic attack targeted 40 countries since 2004

Attack remained undiscovered for a long time, despite its reliance on known methods

A company “Kaspersky Lab” by specialized protection on the Internet for electronic piracy campaign wide hit more than 350 high-level goals in more than 40 different countries were active since 2004, has not been disclosed only recently. According to the company has been able to organizers of the campaign dubbed name Operation NetTraveler from getting more than 22 GB of data stolen from the targeted computers.

The company said that based on the pirate attack used malicious software invited NetTraveler is what they said they are not sophisticated instrument for the implementation of this kind of process of stealing sensitive data, but in spite of the hacker was able to utilize them to carry out their attacks in secret over the past years.

The Pirates relied on other tools along with this tool to steal documents related to space exploration and nanotechnology, energy production, and other information in the fields of medicine, communications and government bodies and research centers, embassies and military centers and energy companies. The researchers said that this is the same tool used by the former Chinese hackers to spy on Tibetan activists.

She said, “Kaspersky Lab” in its report that the evidence suggests parking Chinese hackers behind the attack, the group estimated based on them about 50 pirate. She is another security company “Rapid 7” in remarks to site “Mashabl” mail that the source of the attacks is China, “certainly,” according to the company.

He said “Claudio جواريني,” researcher “Rapid 7” that the malicious code that was used to take advantage of known gaps and sources are available and can be downloaded via the Internet easily. The methods described pirates Balosasah, and that it can be implemented by anyone, even for hackers who do not receive any government support.

And added, “جواريني” that spread malicious code in a traditional way, depending on the e-mail messages that contained files “Microsoft Office” infected, where these files included a variety of names, depending on the goal of the attack so that excite the curiosity of the target to be downloaded and do open it.

If the infected file is opened, malicious code installs itself on the victim’s PC and begin obtaining various types of data, such as documents and Aaxl files and strikes on the keyboard. The code also installs the rear gate on the victim’s machine in order to plant more of malicious software.

And most of the victims of the attack focused in Mnjulaa, Russia, India and Kazakhstan, according to the report, six of the victims who were targeted tried to exploit NetTraveler skills were victims as well as for Red October attack revealed by “Kaspersky Lab” in January. But this does not mean, according to the company that the attacks linked where there are big differences between them.

The researchers plan “Kaspersky Lab” to alert the victims of the attack and the relevant local authorities and provide them with more information about these attacks, which the company expects its continuation.
Related Topics:

Malicious software
Kaspersky Lab


Tags: ,

In: Technology & Gadgets Asked By: [15575 Red Star Level]

Answer this Question

You must be Logged In to post an Answer.

Not a member yet? Sign Up Now »