<td id="kg486"><optgroup id="kg486"></optgroup></td>
<button id="kg486"><tbody id="kg486"></tbody></button>
<li id="kg486"><dl id="kg486"></dl></li>
  • <dl id="kg486"></dl>
  • <code id="kg486"><tr id="kg486"></tr></code>
  • Kaspersky: Cyber criminals target travelling executives

    Nov 11, 2014

    Cyber criminals target corporate executives while they are travelling to steal sensitive data, researchers at security firm Kaspersky Lab have revealed.

    The researchers uncovered a cyber espionage campaign, which they believe has been active for the past four years, focusing on C-level executives connecting to corporate data using hotel Wi-Fi networks.

    Dubbed “Darkhotel”, the espionage campaign infects hotel networks with spying software that in turn infect the computers of targeted executives as soon as they connect to the hotel Wi-Fi network.

    The executives are tricked into installing information-stealing malware by disguising it as an update for legitimate software such as Adobe Flash or Windows Messenger.

    The Darkhotel malware is designed to search the targeted executives’ computers for sensitive corporate data as well as cached passwords and login credentials.

    The malware can record keystrokes to steal passwords as they are entered by executives accessing corporate IT systems.

    The cyber criminals behind Darkhotel do not go after the same target twice and perform operations with “surgical precision” to get valuable data from the first contact, the researchers have found.

    After the operation, the attackers carefully delete their tools from the hotel network and go back into hiding, the researchers have found.

    The most recent targets of Darkhotel include top executives from the US and Asia conducting business and investing in the Asia-Pacific region.

    Research and development staff have also been targeted by the still-active cyber espionage campaign, warned Kaspersky Lab.

    “For the past few years, a strong actor named Darkhotel has performed a number of successful attacks against high-profile individuals, employing methods and techniques that go well beyond typical cybercriminal behaviour,” said Kurt Baumgartner, principal security researcher at Kaspersky Lab.

    “This threat actor has operational competence, mathematical and crypto-analytical offensive capabilities, and other resources that are sufficient to abuse trusted commercial networks and target specific victim categories with strategic precision,” he said.

    However, Baumgartner said Darkhotel malicious activity can be inconsistent, spreading the malware indiscriminately alongside highly targeted attacks.

    “The mix of targeted and indiscriminate attacks is becoming more and more common in the advanced persistent threat APT scene, where targeted attacks are used to compromise high profile victims, and botnet-style operations are used for mass surveillance or performing other tasks such as carrying out distributed denial of service (DDoS) attacks against hostile parties or simply upgrading interesting victims to more sophisticated espionage tools,” he said.

    According to Kaspersky Lab, any network, even semi-private ones in hotels, should be viewed as potentially dangerous.

    The security firm said it is working with hotel chains to mitigate the threat and has updated its products to detect and neutralise the malicious software used by the Darkhotel operation.

    Source: ComputerWeekly.com


    Copyright ? 2017, G.T. Internet Information Co.,Ltd. All Rights Reserved.
    主站蜘蛛池模板: 人人爽天天碰天天躁夜夜躁| 在线日韩日本国产亚洲| 欧美黄色一级片免费看| 国产真实乱偷人视频| 中国speakingathome宾馆学生| 亚洲欧美中文字幕5发布| 国产乱女乱子视频在线播放| 在线视频一区二区三区四区| 日本污全彩肉肉无遮挡彩色| 污视频免费在线观看网站| 黄色片子在线观看| jizz在线播放| 久久精品7亚洲午夜a| 亚洲综合色在线| 国产偷v国产偷v亚洲高清| 天天综合天天综合色在线| 欧美一区二区三区激情视频| 绿帽子巨物夺娇妻09| 老司机免费在线| av无码免费永久在线观看| 中文字幕免费播放| 亚洲av中文无码乱人伦| 免费a级毛视频| 国产乱xxxxx97国语对白| 国产热の有码热の无码视频| 在线你懂的网站| 天堂在线www| 欧美在线视频网站| 麻豆国产高清在线播放| 久久精品中文闷骚内射| 亚洲欧美日韩成人一区在线| 啦啦啦手机完整免费高清观看| 妖神记1000多章哪里看| 日本一道综合久久aⅴ免费| 欧美一区二区三区久久综合| 爱情岛论坛亚洲品质自拍视频网站 | 在线果冻传媒星空无限传媒| 婷婷开心中文字幕| 快穿之肉玩具系统| 成人羞羞视频网站| 水蜜桃免费视频|