Connecting to LinkedIn...

W1siziisijiwmtuvmdqvmtuvmdgvntqvmzgvnzi1l01ptlrbu0hfqkxpr19vtljftkrfukvex0lnqudfx3jlc2l6zwrfyw5kx3jlbmrlcmvklmpwzyjdlfsiccisinrodw1iiiwimtkymhgxmjuwiyjdxq

Blog

Mysterious Hacking Group Wild Neutron Returns to Wreak Havoc

10/07/2015 by

W1siziisijiwmtuvmdcvmtavmtuvmjivndkvnjkxl25ldxryb25zlmpwzyjdlfsiccisinrodw1iiiwinjawedqwmfx1mdazzsjdxq

The notorious hacking group Wild Neutron is back with a new round of attacks.

The group, also known as Jripbot and Morpho, is best-known for attacking Apple, Facebook, Twitter and Microsoft in 2013; after the incident was widely publicized, the threat actor went dark for almost a year. Now, acccording to Kaspersky, Wild Neutron is back, using a stolen valid code verification certificate and an unknown Flash Player exploit to infect companies and private users around the world and steal sensitive business information.

Targets include law firms, investment companies, healthcare companies and even individual users. Other targets inclue major IT companies, spyware developers (FlexiSPY), jihadist forums (the Ansar Al-Mujahideen English Forum) and Bitcoin companies.

“The focus of the attacks suggests that this is not a nation-state sponsored actor,” Kaspersky noted. “However, the use of zero-days, multi-platform malware as well as other techniques makes Kaspersky Lab researchers believe it’s a powerful entity engaged in espionage, possibly for economic reasons.”

 Kaspersky Lab researchers were able to identify targets of Wild Neutron in 11 countries, including France, Russia, Switzerland, Germany, Austria, Palestine, Slovenia, Kazakhstan, UAE, Algeria and the United States.

The initial infection vector of the recent attacks is still unknown, although there are clear indications that victims are exploited by a kit that leverages an unknown Flash Player exploit through compromised websites. The exploit delivers a malware dropper package to the victim.

In the attacks observed by Kaspersky Lab researchers, the dropper was signed with a legitimate code verification certificate. The use of certificates allows malware to avoid detection by some protection solutions. The certificate used in the Wild Neutron attacks appears to be stolen from a popular manufacturer of consumer electronics. The certificate is now being revoked.

After getting in the system, the dropper installs the main backdoor, which is no different to many other remote access tools (RATs). What IS different is the built-in protection that it has against take-downs.

This article has been extracted from http://www.infosecurity-magazine.com, please click on this link to read the article in full http://www.infosecurity-magazine.com/news/mysterious-hacking-group-wild/

Montash is a multi-award winning global technology recruitment business. Specialising in permanent and contract positions across mid-senior appointments across a wide range of industry sectors and IT functions, including:

ERP Recruitment, BI & Data Recruitment, Information Security Recruitment, Enterprise Architecture & Strategy Recruitment , Energy Technology Recruitment, Demand IT and Business Engagement Recruitment, Digital and E-commerce Recruitment, Leadership Talent, Infrastructure and Service Delivery Recruitment, Project and Programme Delivery Recruitment.

Montash is headquartered in Old Street, London, in the heart of the technology hub. Montash has completed assignments in over 30 countries and has appointed technical professionals from board level to senior and mid management in permanent and contract roles.

comments powered by Disqus

Social Stream

Latest News

W1siziisijiwmtcvmdkvmtgvmtavmtivndyvodeyl1dvbwvuigluihrly2ggkdiplmpwzyjdlfsiccisinrodw1iiiwimzgwedewmcmixv0

Tech is for girls... and always has been!

2017-09-18 10:00:00 +0100

Today, it's hard to deny that the IT and tech industry is a male-dominated field. Women earn only 28%[1] of computer science degrees, while the quit rate for women in the high tech industry is 41%[2], twice as high as it is for men. These two statistics would suggest that perhaps women aren't just discouraged from entering the tech field, but may find it a challenging environment to work in both in terms of treatment and pay. Facebook chief operating of...

W1siziisijiwmtcvmdkvmdgvmtevmtuvmzqvmtgwl0hpcmluzybnaxn0ywtlcy5qcgcixsxbinailcj0ahvtyiisijm4mhgxmdajil1d

Common Hiring Mistakes for SAP Consultants

2017-09-08 12:00:00 +0100

Choosing the wrong consultant can lead a project down a ruinous path. Deadlines get missed, quality of work decreases and money is wasted. When you're putting together a new SAP project, getting the right talent is paramount. We discussed hiring mistakes with our Senior Business Manager, Adam Blaney and asked him the question of how to minimise risk in hiring SAP Consultants. “Hiring any form of technology based consultant is difficult. The hardest part...