A global cyber espionage campaign affecting over 350 government-related organisations, appears to be the work of Chinese hackers.
The NetTraveler data-stealing tool was spotted by Kaspersky running in 40 countries. The main targets of the campaign, which has been running since 2004, are government institutions, contractors and embassies, as well as the oil and gas industry, the Russian security firm said.
More recently, the Chinese hackers have shown an interest space exploration, nanotechnology, energy production, nuclear power, lasers, medicine and communications, according to the anti-virus company’s report.
But Tibetan activists have also been hit. Fingers have previously been pointed at the Chinese government following discoveries of malware aimed at Tibetan dissidents. It has always denied accusations it is using hacking techniques for any kind of cyber surveillance.
Based on its intelligence, Kaspersky believes the NetTraveller perpetrators consist of around 50 individuals, most of whom speak Chinese “natively” but also have a decent level of English.
The highest number of infections were in Mongolia, followed by India and Russia. UK organisations were also hit.
There is a second part to Kaspersky’s findings, in which it goes into greater detail on attributing the attacks, but the firm is not sharing it with press, TechWeekEurope was told. Only select organisations, including government bodies, will get that extra insight.
The findings come ahead of a meeting between US President Obama and Chinese President Xi Jinping in California this week, where they are set to discuss cyber espionage issues.
The attackers are using two vulnerabilities in Microsoft Office, which have been patched but remain highly-popular on the hacking scene, and have run NetTraveler alongside other malware.
Spear phishing emails were used to trick targets into opening malicious documents. They were unsophisticated, yet effective attacks, Kaspersky said.
“We have calculated the amount of stolen data stored on C&C [command and control] servers to be 22+ gigabytes. However, this data represents only a small fraction which we managed to see – the rest of the it had been previously downloaded and deleted from the C&C servers by the attackers,” the Kasperksy report read.
The malware focused on siphoning common file types such as DOC, XLS and PDF files, although it can be commanded to pilfer on other data.
Six victims were also hit by the Red October attackers, whom Kaspersky had profiled last year. Those victims included a military contractor in Russia and an embassy in Iran.
Do you know about Chinese tech? Try our quiz and find out!
CMA receives 'provisional recommendation' from independent inquiry that Apple,Google mobile ecosystem needs investigation
Government minister flatly rejects Elon Musk's “unsurprising” allegation that Australian government seeks control of Internet…
Northvolt files for Chapter 11 bankruptcy protection in the United States, and CEO and co-founder…
Targetting AWS, Microsoft? British competition regulator soon to announce “behavioural” remedies for cloud sector
Move to Elon Musk rival. Former senior executive at X joins Sam Altman's venture formerly…
Bitcoin price rises towards $100,000, amid investor optimism of friendlier US regulatory landscape under Donald…