Explore the latest news and trends  

Sign up for our weekly security newsletter

Be the first to receive important updates on security


Fresh Hackers’ Cabal Filching Volumes of Data Identified

Security investigators at Dell SecureWorks have just published one report regarding one freshly identified hackers' cabal, which attacked organizations worldwide and filched huge volumes of industrial information.

Given the designation Threat Group 3390 while dubbed "Emissary Panda" and understandably situated in China, the cabal's maximum targets have been within the aerospace, electronics, automotive, pharmaceutical and energy industries.

Dell SecureWorks, through a monitoring scheme over the hackers' syndicate spanning a 2-year period, has managed to detect the techniques which the Threat Group 3390 uses for infiltrating a business computer.

It was found that the group started with one code it loaded onto a target website diverting people visiting it onto one malicious site. Incase IP addresses of the visitors were of interest then those visitors would get delivered one exploit toolkit that would attack security flaws within their systems whenever they'd revisit the hijacked site next.

According to Andrew White, Counter-Threat Unit Researcher with Dell SecureWorks, the gang usually depended on old security flaws within Adobe Reader, Flash and Java software for penetrating an online site. Afr.com reported this, August 6, 2015.

After getting into the network, Emissary Panda would strike controller of domains i.e. the network's Internet-connected system that worked like one identification directory followed with stealing different end-users' security credentials.

From here, it would become easy for the hackers to navigate to other online sites within just 2-hrs, however, they would not pounce before approximately 4 weeks after when they would begin filching information from a company's computer systems.

Among the tasks Emissary Panda fulfills are exfiltrating intellectual property through Remote Access Trojan, PlugX-established backdoors; borrowing kits that other APT groups utilize-a kit called HttpBrowser, which is one Remote Access Tool, letting the hackers upload files as well as transmit data from the systems, a web shell called ChinaChopper and a web application scrutinizing program called Hunter, which looks for exploitable vulnerabilities within ColdFusion, JBoss and Apache Tomcat servers; besides spotting open ports, garnering banners on the web, or taking down less important files.

More possibly, hacking into organizations as Emissary Panda engages in will go on for long years to come, specialists summarize.

» SPAMfighter News - 8/14/2015

3 simple steps to update drivers on your Windows PCSlow PC? Optimize your Slow PC with SLOW-PCfighter!Email Cluttered with Spam? Free Spam Filter!

Dear Reader

We are happy to see you are reading our IT Security News.

We do believe, that the foundation for a good work environment starts with fast, secure and high performing computers. If you agree, then you should take a look at our Business Solutions to Spam Filter & Antivirus for even the latest version of Exchange Servers - your colleagues will appreciate it!

Go back to previous page