Carding 4 Carders
Professional
- Messages
- 2,724
- Reaction score
- 1,588
- Points
- 113
Cyber Spies play criminal Tetris with the governments of the Asia-Pacific countries.
From the latest report of Kaspersky Lab, it became known that the government structures of the countries of the Asia-Pacific region (APR) for a long time were subjected to a cyber espionage attack, called "TetrisPhantom".
Attackers exploited a vulnerability in a particular type of encrypted USB drive to collect confidential information. Such drives with hardware encryption are widely used by government agencies for secure storage and transmission of information. Experts do not rule out that in the future attacks may spread globally.
The identity of the hackers has not yet been established, but the Kaspersky team believes that the high level of complexity and selectivity of attacks indicate the involvement of state intelligence services. According to Nushin Shabab, a senior researcher at the company,"the attacks were targeted and affected a very limited number of targets."
Hackers used various malicious modules to break into systems, steal data, and distribute malware. According to Kaspersky, they were injecting their code into a legitimate access control mechanism on flash drives. This allowed the program to be used as a virus loader when the drive was connected to an uninfected computer. Thus, attackers could infect isolated systems and spread the infection further.
Recently, Kaspersky Lab became aware of another spy campaign. An unknown hacker, who received the conditional pseudonym BadRory, attacked Russian government agencies, military organizations, universities and hospitals using phishing emails. They contained malicious Microsoft Office documents that triggered a multi-stage infection scheme and installed a Trojan for data theft and remote management. These attacks were carried out in two waves-in October 2022 and April 2023.
From the latest report of Kaspersky Lab, it became known that the government structures of the countries of the Asia-Pacific region (APR) for a long time were subjected to a cyber espionage attack, called "TetrisPhantom".
Attackers exploited a vulnerability in a particular type of encrypted USB drive to collect confidential information. Such drives with hardware encryption are widely used by government agencies for secure storage and transmission of information. Experts do not rule out that in the future attacks may spread globally.
The identity of the hackers has not yet been established, but the Kaspersky team believes that the high level of complexity and selectivity of attacks indicate the involvement of state intelligence services. According to Nushin Shabab, a senior researcher at the company,"the attacks were targeted and affected a very limited number of targets."
Hackers used various malicious modules to break into systems, steal data, and distribute malware. According to Kaspersky, they were injecting their code into a legitimate access control mechanism on flash drives. This allowed the program to be used as a virus loader when the drive was connected to an uninfected computer. Thus, attackers could infect isolated systems and spread the infection further.
Recently, Kaspersky Lab became aware of another spy campaign. An unknown hacker, who received the conditional pseudonym BadRory, attacked Russian government agencies, military organizations, universities and hospitals using phishing emails. They contained malicious Microsoft Office documents that triggered a multi-stage infection scheme and installed a Trojan for data theft and remote management. These attacks were carried out in two waves-in October 2022 and April 2023.