Explore the latest news and trends  

Sign up for our weekly security newsletter


Be the first to receive important updates on security





Send

Switzerland’s CERT Discloses Details about Cyber-Attack on Defense Contractor


Swiss government authorities declined from declaring a hackers' attack on RUAG the country's defense contractor. However, Switzerland's Computer Emergency Readiness Team (CERT), on Monday, disclosed the assault as well as the way it was pulled off.

A specialist in ammunition, aerospace like drones, and defense, RUAG turns out to be an extremely favorable target for spying.

It was just earlier in 2016 that experts discovered the breach, but it was hushed up until earlier in May 2016, the time NZZ am Sonntag reported about how cyber criminals by gaining admission into RUAG further acquired admission into the Special Forces division Swiss DRA10 whose secrecy is highly maintained.

A report being released provides further information on the RUAG assaults that CERT.ch i.e. Switzerland's CERT disclosed. As per top security researchers of the country, the cyber criminals hijacked RUAG long back in September 2014; based on logs Swiss CERT was able to obtain no earlier.

CERT.ch asserts that it has detected malicious code on the PC-network of RUAG which has an association with the same malicious software that the Russia-connected threat disseminator APT Turla utilized.

The assault took the form of espionage, with the criminals doing much for remaining undetected via applying one gradual and patient ruse involving hacking the systems first followed with moving laterally to contaminate several other machines. Threatpost.com posted this, May 23, 2016.

Once perpetrators got at their wanted attack points, they leveraged Turla malware's variant. Turla, which is as well called Tavdig, employs separate workers who are tasked differently such as some collecting data, a few behaving like proxies, and the remaining being merely communication nodes.

After data collection, the Turla employees would dispatch the same onto an external command and control (CnC) server in massive amounts utilizing proxy servers. According to CERT.ch, the attackers sent out huge batches of data five times during June, July, September, October and December each in 2015.

CERT.ch explains that revelation of the online assaults on RUAG may've spoiled the contractor's future regulatory operations. Data got dispatched via port 80 that would as well work like CnC for launching fresh assaults.

» SPAMfighter News - 5/30/2016

3 simple steps to update drivers on your Windows PCSlow PC? Optimize your Slow PC with SLOW-PCfighter!Email Cluttered with Spam? Free Spam Filter!

Dear Reader

We are happy to see you are reading our IT Security News.

We do believe, that the foundation for a good work environment starts with fast, secure and high performing computers. If you agree, then you should take a look at our Business Solutions to Spam Filter & Antivirus for even the latest version of Exchange Servers - your colleagues will appreciate it!

Go back to previous page
Next