Report blows lid on Asia cyber espionage
FRANKFURT - Security researchers have uncovered a sophisticated industrial espionage campaign that targets business executives in luxury hotels across Asia.
The hackers track business executives who sign on to computers using in-room wireless connections they consider private and secure, according to a Kaspersky Lab report, published on Monday.
The attacks, which go well beyond typical cybercriminal operations, have claimed thousands of victims dating back to 2009 and continue to do so, Kaspersky Lab, the world's largest private security firm, shows in the report. Executives from the vehicle, outsourced manufacturing, cosmetic and chemical industries had been hit, the security company said. Others targeted included military services and contractors.
In 2012, the FBI issued a general warning to US government officials, businessmen and academics, advising them to use caution when updating computer software via hotel internet connections when travelling abroad.
Kaspersky's report goes further in detailing the scale, methods and precise targeting of these attacks on top business travellers. The movements of executives appear to be tracked as they travel, allowing attackers to pounce once a victim logs on to a hotel Wi-Fi network. Hackers cover their tracks by deleting these tools off hotel networks afterwards.
'These attackers are going after a very specific set of individuals who should be very aware of the value of their information and be taking strong measures to protect it,' said Kurt Baumgartner, principal security researcher for Kaspersky.
Unsuspecting executives who submitted their room number and surname while logging on to their hotel room's wireless network were tricked into downloading an update to legitimate software such as Adobe Flash, Google Toolbar or Microsoft Messenger, Kaspersky said. Because attacks happen at sign-on, encrypted communications set up later offer no defence against attack.
The same elite spying crew had used advanced keystroke-logging software and encryption-breaking at multiple hotel chains across Asia, it said.
Kaspersky declined to name the executives involved or the luxury destinations targeted but said it had informed the hotels as well as law enforcement officials in affected locations.
Ninety percent of the victims came from five countries - Japan, Taiwan, China, Russia and South Korea. Business travellers to Asia from Germany, Hong Kong, Ireland and the US had also been duped, Mr Baumgartner said.
The Kaspersky report said a key mystery remained how attackers appeared to know the precise travel itinerary of each victim, which pointed to a larger compromise of hotel business networks that researchers said they were continuing to probe.
Post a Comment for "Report blows lid on Asia cyber espionage"