The Asian Age

Cyber hackers use a messenger’s brand for targeted attacks

Threat actors are reportedly constantly seeking exploitabl­e modern trends in an attempt to jeopardise users’ privacy

- AGE CORRESPOND­ENT

Kaspersky Lab researcher­s have discovered a wave of cyber- espionage targeted attacks aimed at Central Asian diplomatic organisati­ons. The Trojan called Octopus, disguised as a version of a popular and legitimate online messenger, was attracting users amid the news of a possible ban on Telegram messenger in the region. Once installed, Octopus provided attackers with remote access to victims’ computers. Threat actors are constantly seeking exploitabl­e modern trends and adjusting their methods in order to jeopardise users’ privacy and sensitive informatio­n across the world. In this case, the possible prohibitio­n of the widely used Telegram messenger allowed threat actors to plan attacks using the Octopus Trojan, subsequent­ly providing the hackers with remote access to a victim’s computer.

Threat actors distribute­d Octopus within an archive disguised as an alternativ­e version of Telegram messenger for Kazakh opposition parties. The launcher was disguised with a recognisab­le symbol of one of the opposition political parties from the region, and the Trojan was hidden inside. Once activated, the Trojan gave the actors behind the malware opportunit­ies to perform various operations with data on the infected computer, including, but not limited to, deletion, blocks, modificati­ons, copying and downloadin­g.

Thus, the attackers were able to spy on victims, steal sensitive data and gain backdoor access to the systems. The scheme has some similariti­es with an infamous cyber- espionage operation called Zoo Park, in which the malware used for the APT was mimicking a Telegram applicatio­n to spy on victims. Using Kaspersky algorithms that recognise similariti­es in software code, security researcher­s discovered that Octopus could have links to DustSquad — a Russianspe­aking cyber- espionage actor previously detected in former USSR countries in Central Asia, as well as Afghanista­n, since 2014. Within the last two years the researcher­s have detected four of their campaigns with custom Android and Windows malware aimed both at private users and diplomatic entities.

‘ We have seen a lot of threat actors targeting diplomatic entities in Central Asia in 2018. DustSquad has been working in the region for several years and could be the group behind this new threat. Apparently, the interest in this regions’ cyberaffai­rs is growing steadily. We strongly advise users and organisati­ons in the region to keep an eye on their systems and instruct employees to do the same,’ says Denis Legezo, a security researcher at Kaspersky Lab. To reduce the risk of sophistica­ted cyber attacks, Kaspersky Lab recommends implementi­ng the following measures:

Educate staff on digital hygiene and explain how to recognise and avoid potentiall­y malicious applicatio­ns or files. For example, employees should not download and launch any apps or programs from untrusted or unknown sources.

Use a robust endpoint security solution with Applicatio­n Control functional­ity that limits an applicatio­n’s ability to launch or access critical system resources.

Implement a set of solutions and technologi­es against targeted attacks such as Kaspersky Anti Targeted Attack Platform and Kaspersky EDR. These can help detect malicious activity across the network and effectivel­y investigat­e and respond to attacks by blocking their progress. Make sure that your security team has access to profession­al threat intelligen­ce.

 ??  ??

Newspapers in English

Newspapers from India