Connecting to LinkedIn...

W1siziisijiwmtuvmdqvmtuvmdgvntqvmzgvnzi1l01ptlrbu0hfqkxpr19vtljftkrfukvex0lnqudfx3jlc2l6zwrfyw5kx3jlbmrlcmvklmpwzyjdlfsiccisinrodw1iiiwimtkymhgxmjuwiyjdxq

Blog

Iron Tiger Campaign Stolen ‘Terabytes’ of Data in APAC and US

17/09/2015 by Sharon Shahzad

W1siziisijiwmtuvmdkvmtcvmtyvntuvmtyvnzyyl1rpz2vylkpqryjdlfsiccisinrodw1iiiwinjawedqwmfx1mdazzsjdxq

Security researchers have discovered another advanced China-based targeted attack campaign which shifted its focus from APAC targets in 2013 to steal up to terabytes of data from hi-tech US government contractors.

“Emissary Panda” or “Threat Group-3390 (TG-3390)” launched its Iron Tiger campaign in 2010, spying on political targets and government agencies in China, Hong Kong, the Philippines and Tibet, according to Trend Micro.

“The actors have stolen emails, full Active Directory dumps, intellectual property, strategic planning documents, and budget- or finance-related content—all of which can be used to sabotage target governments’ or private organizations’ plans.”

The huge geographical shift to US government contractors in aerospace, energy, intelligence, nuclear engineering, and telecoms indicates that Iron Tiger “is part of a bigger campaign where specific targets are assigned to various teams,” the report claimed.

The actors involved are said to be China based for several reasons.

The VPN servers they used were mainly located in China; file names and passwords, as well as some text resources and language IDs used in malware, were in simplified Chinese; several domains were found to be located in China; and other resources used including QQ, Lofter, and 163.com are used mainly in the Middle Kingdom.

Although the hackers are said to be “skilled computer security experts” they’ve not needed to pull out the full repertoire of advanced techniques as target networks were poorly protected, Trend Micro claimed.

This article has been extracted from http://www.infosecurity-magazine.com, please click on this link to read the article in full http://www.infosecurity-magazine.com/news/iron-tiger-stole-terabytes-data/

Montash is a multi-award winning global technology recruitment business. Specialising in permanent and contract positions across mid-senior appointments across a wide range of industry sectors and IT functions, including:

ERP Recruitment, BI & Data Recruitment, Information Security Recruitment, Enterprise Architecture & Strategy Recruitment , Energy Technology Recruitment, Demand IT and Business Engagement Recruitment, Digital and E-commerce Recruitment, Leadership Talent, Infrastructure and Service Delivery Recruitment, Project and Programme Delivery Recruitment.

Montash is headquartered in Old Street, London, in the heart of the technology hub. Montash has completed assignments in over 30 countries and has appointed technical professionals from board level to senior and mid management in permanent and contract roles.

comments powered by Disqus

Social Stream

Latest News

W1siziisijiwmtcvmdcvmtgvmdgvndcvmduvntu5l2jpz3n0b2nrluv4b3rpyy1qyxjhzglzzs1ucmf2zwwtvg91cmktmtc2mju4ndm3lmpwzyjdlfsiccisinrodw1iiiwimzgwedewmcmixv0

Getting Ready to Switch Off

2017-07-17 09:00:00 +0100

According to research by online travel company Expedia, just 53% of workers come back feeling rested after they’ve been on holiday. When you bring work-related stress on holiday with you, you’re never going to be able to truly switch off. So if you've got a summer holiday coming up, what should you do to switch off and unwind? Before you leave... Plan ahead As soon as you know when your last day of work is, make a plan. You don't want to get to that fin...

W1siziisijiwmtcvmdyvmzavmtyvmtgvmjavmtg5l3nodxr0zxjzdg9ja182njkxody3mdkuanbnil0swyjwiiwidgh1bwiilcizodb4mtawiyjdxq

In Her Shoes... SAP Contracting

2017-07-03 09:00:00 +0100

In IT, being a freelancer is very common; due to the nature of project work or other life commitments. SAP is an area in which a quality freelancer can really thrive. We sat down with one of our SAP freelancers, who has 20 years' experience, to find out more about SAP and working under a contract employment model. "After getting a degree in computing, I started my career as a training assistant, but I've always liked to fix things. I used to fix my own ...