Explore the latest news and trends  

Keep yourself up to date with one of the following options:

  • Explore more news around Spam/Phishing, Malware/Cyber-attacks and Antivirus
  • Receive news and special offers from SPAMfighter directly in your inbox.
  • Get free tips and tricks from our blog and improve your security when surfing the net.
Go

Chemical Companies Become Targets of Cyber-Espionage, States Symantec

Symantec the Internet security company based in USA lately brought into light a cyber-espionage scheme aimed at seizing reputed chemical companies' trade secrets, while associated the spying with a China-based individual, published Zdnet.com.au dated November 1, 2011.

Symantec, which named the scheme "Nitro," reported that 48 firms-or-more, a few of which manufactured sophisticated military vehicle equipments, became targets when the scheme tried to garner a particular kind of information.

Gavin O'Gorman and Eric Chien, team members of the security response group of Symantec stated that assaults against the chemical companies were just the most recent surge of assaults the man from China was allegedly part of. Zdnet.com.au published this.

Some NGOs, dedicated to upholding human rights, were targeted in the assaults during late April-early May prior to those assaults targeting the automobile sector.

Later, during late-July-mid-September, the cyber-espionage targeted prominent chemical companies mostly in Bangladesh, Britain and USA, the security company stated.

Nitro, according to O'Gorman and Chien, tried to capture intellectual property to gain advantage over chemical firms.

Reportedly, the cyber-spies installed Trojan Poison Ivy on Windows computers through e-mails spammed to the system operators. Those e-mails that weren't actually delivered in bulk, as they were sent to select company staff, canvassed for complying with requests that established business affiliates made, alternatively touted Adobe Flash Player or anti-virus updates.

And when users unwittingly clicked on the e-mail attachments, they loaded Poison Ivy onto their systems. Consequently, the attackers managed in controlling and instructing the infected PCs, steal high-profile passwords and thereby acquire admission into servers holding secret data, and ultimately transmit that data to remote computers under hackers' control.

Furthermore, according to Symantec, the company communicated with a person named "Covert Grove," who operated a certain command-and-control server from the total involved in the attack that was situated in the Hebei province of China near Beijing.

Senior Researcher Jeff Wilhelm of Symantec remarked that the company managed in tracking the server to the particular person. However, it wasn't sure if that hacker was the only one for, it might've been big business spying, he concluded. Upi.com published this on October 31, 2011.

Related article: Consultant Offers Suggestions to Apple Struggling against malware & Online Threats

ยป SPAMfighter News - 07-11-2011

3 simple steps to update drivers on your Windows PCSlow PC? Optimize your Slow PC with SLOW-PCfighter!Email Cluttered with Spam? Free Spam Filter!

Exchange Anti Spam Filter
Go back to previous page
Next