By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
10alert.com10alert.com10alert.com
  • Threats
    • WordPress ThreatsDanger
    Threats
    A cyber or cybersecurity threat is a malicious act that seeks to damage data, steal data, or disrupt digital life in general. Cyber threats include…
    Show More
    Top News
    Malware Reigned Supreme In 2012
    1 year ago
    BEWARE THE THINGBOT!
    1 year ago
    Is your PC a part of botnet? Check it!
    1 year ago
    Latest News
    Patchstack Alliance Bounty Program Events for December
    1 day ago
    Your Smart Coffee Maker is Brewing Up Trouble
    2 days ago
    Earn up to $10,000 for Vulnerabilities in WordPress Software
    2 days ago
    Fake CVE-2023-45124 Phishing Scam Tricks Users Into Installing Backdoor Plugin
    2 days ago
  • Fix
    Fix
    Troubleshooting guide you need when errors, bugs or technical glitches might ruin your digital experience.
    Show More
    Top News
    The creator of malware has infected her own computer
    1 year ago
    Windows 11 build 25163 out with new Taskbar Overflow feature
    1 year ago
    How to fix Microsoft Store not working on Windows 11
    1 year ago
    Latest News
    How automatically delete unused files from my Downloads folder?
    10 months ago
    Now you can speed up any video in your browser
    10 months ago
    How to restore access to a file after EFS or view it on another computer?
    10 months ago
    18 Proven Tips to Speed Up Your WordPress Site and Improve SEO | 2023 Guide
    11 months ago
  • How To
    How ToShow More
    How to stop, disable, and remove any Android apps β€” even system ones
    16 hours ago
    Bigger, Better, Cooler in a 2U1N form factor
    Bigger, Better, Cooler in a 2U1N form factor
    2 days ago
    Vulnerability in crypto wallets created online in the early 2010s
    3 days ago
    Use Windows 11 features to inspire creativity, speed up everyday tasks
    4 days ago
    Windows brings nostalgia to the holidays with the return of Windows Ugly Sweaters, this year featuring the Bliss backdrop
    5 days ago
  • News
    News
    This category of resources includes the latest technology news and updates, covering a wide range of topics and innovations in the tech industry. From new…
    Show More
    Top News
    How to find your router IP address on Windows 11
    1 year ago
    How to restore Registry from secret backup on Windows 10
    1 year ago
    How to set default printer on Windows 11
    11 months ago
    Latest News
    Change screen brightness on Windows 11
    2 days ago
    How to share Microsoft 365 Family subscription with other people
    4 days ago
    How to enable random MAC address for Wi-Fi on Windows 10
    4 days ago
    How to join Office apps to Microsoft 365 Insider Program
    4 days ago
  • Glossary
  • My Bookmarks
Reading: Naikon APT steals geopolitical data from the South China Sea
Share
Notification Show More
Aa
Aa
10alert.com10alert.com
  • Threats
  • Fix
  • How To
  • News
  • Glossary
  • My Bookmarks
  • Threats
    • WordPress ThreatsDanger
  • Fix
  • How To
  • News
  • Glossary
  • My Bookmarks
Follow US
AppsThreatsWordpress Threats

Naikon APT steals geopolitical data from the South China Sea

Vitus White
Last updated: 13 October
Vitus White 1 year ago
Share
4 Min Read

The Chinese-language Naikon advanced persistent threat group is targeting military, government and civil organizations located in and around the South China Sea, which is an increasingly contentious hot-bed of territorial disputes between various Southeast Asian nations.

Naikon is also known as APT-30. Its targets, according to a new report from Kaspersky Lab’s global research and analysis team, are said to include the Philippines, Malaysia, Cambodia, Indonesia, Vietnam, Myanmar, Singapore, and Nepal.

Naikon APT expansion map

Like many APT campaigns, Naikon infects its victims with spear-phishing emails in which malicious executables masquerade as seemingly relevant document attachments. When a victim opens one of these malicious attachments, a decoy document appears as an executable file and quietly exploits an old Microsoft Office vulnerability, installing malware on the victim’s machine.

For five years, the APT group has employed cultural liasons for each of its target countries. In this way, Naikon is able to exploit cultural tendencies, such as the reliance on personal email addresses to conduct business. Attackers exploited this reality by creating email addresses that appeared similar to those in actual use, which the attackers were able to leverage to send more effective phishing messages.

Hellsing APT retaliates against Naikon attackers with own phishing ploy | http://t.co/fah3HZ81Aj pic.twitter.com/QUwv6hvzVK

— SCMagazine (@SCMagazine) April 15, 2015

The group has also installed portions of its command and control infrastructure in the target countries in order to provide daily support for real-time connections and data theft. They also have the capacity to intercept traffic across entire victim networks and issue some 48 distinct and remote commands, including taking a complete inventory of system files, downloading and uploading data, installing add-on modules, or working with the command line or prompt.

Taken together, these 48 commands allow the threat group to take complete control over any Naikon-infected machine. Naikon’s ultimate goal is to gather geopolitical information.

The criminals behind the Naikon attacks managed to devise a very flexible infrastructure that can be set up in any target country

“The criminals behind the Naikon attacks managed to devise a very flexible infrastructure that can be set up in any target country, with information tunneling from victim systems to the command center,” explained Kaspersky Lab principle security researcher, Kurt Baumgartner. “If the attackers then decide to hunt down another target in another country, they could simply set up a new connection. Having dedicated operators focused on their own particular set of targets also makes things easy for the Naikon espionage group.”

In one country that Kaspersky Lab declined to name, the Naikon hackers managed to compromise Office of the President, Military Forces, Office of the Cabinet Secretary, National Security Council, Office of the Solicitor General, National Intelligence Coordinating Agency, Civil Aviation Authority, Department of Justice, Federal Police and Executive/Presidential Administration and Management Staff.

The #Naikon #APT is designed to steal geopolitical information from nation’s located around the South China Sea

Tweet

Kaspersky Lab experts recommend that users never open attachments from people they don’t know, use an advanced anti-malware solution, and keep operating systems patched and up-to-date.


Source: kaspersky.com

Translate this article

TAGGED: Malware, Microsoft, Microsoft Office, Phishing, PoC, Security, Threat, Threats
Vitus White October 13, 2022 October 7, 2022
Share This Article
Facebook Twitter Reddit Telegram Email Copy Link Print

STAY CONECTED

24.8k Followers Like
253.9k Followers Follow
33.7k Subscribers Subscribe
124.8k Members Follow

LAST 10 ALERT

How to stop, disable, and remove any Android apps β€” even system ones
How To 16 hours ago
Patchstack Alliance Bounty Program Events for December
Patchstack Alliance Bounty Program Events for December
Wordpress Threats 2 days ago
Your Smart Coffee Maker is Brewing Up Trouble
Threats 2 days ago
Bigger, Better, Cooler in a 2U1N form factor
Bigger, Better, Cooler in a 2U1N form factor
Apps 2 days ago
Change screen brightness on Windows 11
News 2 days ago

You Might Also Like

How To

How to stop, disable, and remove any Android apps β€” even system ones

16 hours ago
Patchstack Alliance Bounty Program Events for December
Wordpress Threats

Patchstack Alliance Bounty Program Events for December

2 days ago
Threats

Your Smart Coffee Maker is Brewing Up Trouble

2 days ago
Bigger, Better, Cooler in a 2U1N form factor
Apps

Bigger, Better, Cooler in a 2U1N form factor

2 days ago
Show More

Related stories

Several Critical Vulnerabilities including Privilege Escalation, Authentication Bypass, and More Patched in UserPro WordPress Plugin
BridesMaid – neuron writes toasts For those very occasions when you need to give out a powerful
The other day Yandex pleased us with the announcement of a new Midi station – an excellent reason to listen
REMIX – remixes of pictures from neural networksCreate, share and correct works
How to download Diablo IV for free and absolutely legallyBlizzard has opened a free
Rostelecom employees were forced to abandon Android and iOS in favor of Aurora.
Previous Next

10 New Stories

Earn up to $10,000 for Vulnerabilities in WordPress Software
Fake CVE-2023-45124 Phishing Scam Tricks Users Into Installing Backdoor Plugin
Short-URL Services May Hide Threats
Vulnerability in crypto wallets created online in the early 2010s
Wordfence Intelligence Weekly WordPress Vulnerability Report (November 20, 2023 to November 26, 2023)
Thrive Theme: Dismiss Tooltip to Privilege Escalation
Previous Next
Hot News
How to stop, disable, and remove any Android apps β€” even system ones
Patchstack Alliance Bounty Program Events for December
Your Smart Coffee Maker is Brewing Up Trouble
Bigger, Better, Cooler in a 2U1N form factor
Change screen brightness on Windows 11
10alert.com10alert.com
Follow US
Β© 10 Alert Network. All Rights Reserved.
  • Privacy Policy
  • Contact
  • Customize Interests
  • My Bookmarks
  • Glossary
Go to mobile version
adbanner
AdBlock Detected
Our site is an advertising supported site. Please whitelist to support our site.
Okay, I'll Whitelist
Welcome Back!

Sign in to your account

Lost your password?