Subscribe free to our newsletters via your
. Military Space News .




CYBER WARS
Researchers warn of 'hit and run' cyber attackers
by Staff Writers
Washington (AFP) Sept 25, 2013


Security researchers said Wednesday they uncovered a "cyber mercenary" team which specializes in attacks on targets in Japan and South Korea, and warned of more operations of that nature.

Kaspersky Labs identified the group as "Icefog," and said evidence points to it being based in China.

Based on the targets, the attackers appear to have an interest in military, shipbuilding and maritime operations, computers and software, research companies, telecom operators, satellite operators, mass media and television.

Kaspersky said the operation was a "small yet energetic Advanced Persistent Threat (APT) group" which focuses on targets involved in the supply chain for Western companies.

The operation started in 2011 and has increased in size and scope over the last few years, according to the report presented at a Washington cybersecurity conference.

The attackers have been "hitting pretty much all types of victims and sectors. In most cases, attackers maintain a foothold in corporate and governmental networks for years, smuggling out terabytes of sensitive information," said Kaspersky researcher Costin Raiu.

"The 'hit and run' nature of the Icefog attacks demonstrate a new emerging trend: smaller hit-and-run gangs that go after information with surgical precision. The attack usually lasts for a few days or weeks and after obtaining what they were looking for, the attackers clean up and leave."

Raiu said these types of hackers-for-hire groups are growing, developing into a "kind of 'cyber mercenary' team for the modern world."

The researchers localized the attackers and "assume some of the players behind this threat operation are based in at least three countries: China, South Korea and Japan," with the largest number in China.

The report, presented at the Billington Cybersecurity Summit, said Icefog targeted attacks relied on spear-phishing e-mails that attempt to trick the victim into opening a malicious attachment or a website.

Some of these attachments include images of scantily clad women or "decoy" documents; when users click on the attachments, they unwittingly install malicious software which allows access to the attackers.

"The attackers are hijacking sensitive documents and company plans, e-mail account credentials, and passwords to access various resources inside and outside the victim's network," a Kaspersky statement said.

"In most cases, the Icefog operators appear to already know very well what they need from the victims. They look for specific file names, which are identified and transferred" to the attackers.

.


Related Links
Cyberwar - Internet Security News - Systems and Policy Issues






Comment on this article via your Facebook, Yahoo, AOL, Hotmail login.

Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle








CYBER WARS
US spy chief defends 'noble' mission, denounces leaks
Washington (AFP) Sept 25, 2013
The head of the National Security Agency Wednesday defended US surveillance programs as part of a "noble" mission to protect the nation and said reports on them were "sensationalized." "The future of this country depends on our ability to defend against cyber attacks and terrorist threats, and we need the tools to do it," said General Keith Alexander, chief of the NSA. The agency heads t ... read more


CYBER WARS
Raytheon completes critical component of ninth AN/TPY-2 ballistic missile defense radar

Boeing Completes Deliveries of Processing Units for Army's Air, Missile Defense Network

2nd Gen Aegis Hits Most Sophisticated Target Yet

US Navy launches two Raytheon-made SM-3 missiles against single ballistic missile target

CYBER WARS
Turkey picks Chinese firm for missile system

Iran parades 30 2,000 km range missiles

N. Korea tests long-range rocket engine: US think-tank

Lockheed Martin Launches First LRASM Boosted Test Vehicle From MK 41 Vertical Launch System

CYBER WARS
Boeing QF-16 Aerial Target Completes First Pilotless Flight

Northrop Grumman Readies MQ-8C Fire Scout for Flight Operations

US Navy Expands Surveillance Mission for Maritime Unmanned Aircraft

US relocates drones airfield after Djibouti crashes

CYBER WARS
Third Advanced EHF Satellite Will Enhance Resiliency of Military Communications

USAF Launches Third Advanced Extremely High Frequency Satellite

Atlas 5 Lofts 3rd AEHF Military Comms Satellites

Unified Military Intelligence Picture Helping to Dispel the Fog of War

CYBER WARS
LockMart Contracts To Transition Long Range Land Attack Projectile To Production

Chile moves to get rid of cluster munitions

US to sign global treaty on conventional arms trade

US Navy searches for 2 sailors after chopper crash

CYBER WARS
UN Security Council passes first resolution on small arms trade

US troops won't get paid during shutdown: Pentagon

US, biggest exporter, signs landmark UN arms treaty

Israel privatizes oldest defense firm, nets $5.7B

CYBER WARS
Japan PM open to talks - not concessions - with China

Kerry, Iranian FM in landmark brief encounter

Outside View: U.S. military power and 20/20 hindsight

Japan PM vows more active security role

CYBER WARS
Densest array of carbon nanotubes grown to date

Nanoscale neuronal activity measured for the first time

Container's material properties affect the viscosity of water at the nanoscale

Molecules pass through nanotubes at size-dependent speeds




The content herein, unless otherwise known to be public domain, are Copyright 1995-2014 - Space Media Network. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA Portal Reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement,agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. Privacy Statement