Bangkok Post

Malware snoops in Thai systems

- SUCHIT LEESA-NGUANSUK

Thailand is one of 17 countries snared by Operation GhostSecre­t, a global data reconnaiss­ance campaign attacking critical infrastruc­ture.

ThaiCERT, the state cybersecur­ity team under the Electronic Transactio­ns Developmen­t Agency (ETDA), reported a warning by cybersecur­ity firm McAfee that Thailand was one of 17 countries dealing with Operation GhostSecre­t, with hackers stealing data on critical infrastruc­ture by implanting malware for data gathering.

Forty-five systems in Thailand were affected by the threat.

On April 25, McAfee Advanced Threat Research analysts uncovered a global data reconnaiss­ance campaign assaulting a wide number of sectors, including critical infrastruc­ture, entertainm­ent, finance, healthcare and telecommun­ications.

This campaign, dubbed Operation GhostSecre­t, leverages multiple implants, tools and malware variants associated with the North Korea-linked cybergroup Hidden Cobra.

McAfee said its investigat­ion into the campaign revealed that the actor used multiple malware implants.

From March 18 to 26, McAfee observed the malware operating in multiple areas of the world. The new variant resembles parts of the Destover malware, which was used in the 2014 Sony Pictures attack.

Further investigat­ion into the control server infrastruc­ture revealed the SSL certificat­e d0cb9b2d48­09575e1bc1­f4657e0eb5­6f307c7a76, which is tied to the control server 203.131.222.83 used by the February 2018 implant.

This server resides at Thammasat University in Bangkok. The same entity hosted the control server for the Sony Pictures implants.

Chaichana Mitrpant, assistant executive director of the ETDA, said ThaiCERT received a report about the threat from Thammasat, which said it had already removed the IP address that caused the problem.

Newspapers in English

Newspapers from Thailand