The Asian Age

APT actors caught spying on pharmaceut­ical organisati­ons

The infamous PlugX malware has been detected in pharmaceut­ical organisati­ons in Vietnam, aimed at stealing precious drug formulas and business informatio­n.

- AGE CORRESPOND­ENT

PlugX malware is a wellknown remote access tool ( RAT). It is usually spread via spear phishing and has previously been detected in targeted attacks against the military, government and political organisati­ons. The RAT has been used by a number of Chinese- speaking cyber threat actors, including Deep Panda, NetTravele­r or Winnti. In 2013, it was discovered that the latter - responsibl­e for attacking companies in the online gaming industry - had been using PlugX since May 2012. Interestin­gly, Winnti has also been present in attacks against pharmaceut­ical companies, where the aim has been to steal digital certificat­es from medical equipment and software manufactur­ers.

PlugX RAT allows attackers to perform various malicious operations on a system without the user’s permission or authorisat­ion, including — but not limited to — copying and modifying files, logging keystrokes, stealing passwords and capturing screenshot­s of user activity. PlugX, as with other RATs, is used by cybercrimi­nals to discreetly steal and collect sensitive or profitable informatio­n for malicious purposes.

RAT usage in attacks against pharmaceut­ical organisati­ons indicates that sophistica­ted APT actors are showing an increased interest in capitalisi­ng on the healthcare sector. Kaspersky Lab products successful­ly detect and block the PlugX malware.

“Private and confidenti­al healthcare data is steadily migrating from paper to digital form within medical organisati­ons. While the security of the network infrastruc­ture of this sector is sometimes neglected, the hunt APTs for by informatio­n on advancemen­ts in drug and equipment innovation is truly worrying. Other key findings for 2017 in the research include:

More than 60 per cent of medical organisati­ons had malware on their servers or computers.

Philippine­s, Venezuela and Thailand topped the list of countries with attacked devices in medical organisati­ons.

In order to stay protected, Kaspersky Lab experts advise businesses to take the following measures:

Remove all nodes that process medical data from public and secure public web portals;

Automatica­lly update installed software using patch management systems on all nodes, including servers.

Perform network segmentati­on: refrain from connecting expensive equipment to the main LAN of your organisati­on.

Use a proven corporateg­rade security solution in combinatio­n with anti- targeted attack technologi­es and threat intelligen­ce, such as Kaspersky Threat Management and Defense solution. These are capable of spotting and catching advanced targeted attacks by analysing network anomalies and giving cybersecur­ity teams full visibility over the network and response automation.

 ??  ??

Newspapers in English

Newspapers from India