Same Hacker of Japanese Defense Sector Attacks Two Large Corporations
According to Japanese authorities, fresh online-assaults against two big corporate houses were from the same cyber-criminal who tried to hack into the government network for stealing confidential defense information, published UPI.com on October 17, 2011.
The Kawasaki Heavy Industries was attacked with a PC-virus that was transmitted through e-mail via a SJAC (Society of Japanese Aerospace Companies) computer. Consequently, many other PCs became infected that were compelled to open a US-based Internet site.
Using the header, "Prior distribution of documents" the e-mail carried an attachment named "Comments on lump sum procurement."
With a largely copied text, the fake e-mail lifted its content from an electronic mail, which the executive officer really dispatched to the organization's other staff. This copying was done some 10-hrs prior to the dispatch of the fraudulent electronic mail.
Moreover, a virus was utilized that was loaded onto a global telephone service firm's computer.
Similar to the assault against Mitsubishi Heavy Industries Ltd. of Tokyo, is the current one against Kawasaki Heavy Industries. Both the industrial magnets represent as SJAC's members.
Essentially, during the above kinds of assaults, computers along with other equipments, whose security maybe lax, become contaminated with PC-worms while their owners remain unaware.
During June-July, 2011, Kawasaki Heavy Industries encountered just likewise assaults.
Security specialists stated that perhaps the hacker utilized the American website for triggering off the attack, and a PC-server whose operations were unknown to its owner while it acted like relay points for concealing the port originating from them that could be any place on the globe.
Normally, attackers left such websites alone after their objectives were accomplished alternatively their assaults detected.
One senior police officer stated that since the industrial society had insufficient security, it was easy for the hacker to attack it. Presumably, the hacker did so for disseminating PC-worms across Japan's defense sector, he added. Thesacramentobee reported this on October 17, 2011.
Meanwhile, after examining the company's PC, the police discovered that the hacker utilized the virus-infected system for masking his identity, and doubted the attacker of Kawasaki and Mitsubishi utilized the American website for capturing the companies' data for transmitting them elsewhere.
Related article: Some Suggestions to Deter ‘Windows Rot’
» SPAMfighter News - 10/26/2011
We are happy to see you are reading our IT Security News.
We do believe, that the foundation for a good work environment starts with fast, secure and high performing computers. If you agree, then you should take a look at our Business Solutions to Spam Filter & Antivirus for even the latest version of Exchange Servers - your colleagues will appreciate it!