Anzeige
Mehr »
Login
Dienstag, 30.04.2024 Börsentäglich über 12.000 News von 686 internationalen Medien
Uran Boom: Die Bullen starten durch - spektakuläre Kursgewinne möglich
Anzeige

Indizes

Kurs

%
News
24 h / 7 T
Aufrufe
7 Tage

Aktien

Kurs

%
News
24 h / 7 T
Aufrufe
7 Tage

Xetra-Orderbuch

Fonds

Kurs

%

Devisen

Kurs

%

Rohstoffe

Kurs

%

Themen

Kurs

%

Erweiterte Suche
PR Newswire
87 Leser
Artikel bewerten:
(0)

Hunting Desert Falcons - The First Known Arabic Cyber Espionage Group Attacking Thousands of Victims Globally

LONDON, February 18, 2015 /PRNewswire/ --

Kaspersky Lab's Global Research and Analysis Team has discovered Desert Falcons - a cyber espionage group targeting multiple high profile organisations and individuals from Middle East countries. Kaspersky Lab experts consider this actor to be the first known Arabic group of cyber mercenaries to develop and run full-scale cyber-espionage operations.

  • The campaign has been active for at least two years. The Desert Falcons started developing and building their operation in 2011, with their main campaign and real infection beginning in 2013. The peak of their activity was registered at the beginning of 2015;
  • The vast majority of targets are based in Egypt, Palestine, Israel and Jordan;
  • Apart from the Middle East countries focused on as initial targets, the Desert Falcons are also hunting out of the territory. In total, they have been able to attack more than 3,000 victims in 50+ countries globally, with over one million files stolen;
  • The attackers utilise proprietary malicious tools for attacks on Windows PCs and Android-based devices;
  • Kaspersky Lab experts have multiple reasons to believe that the attackers behind the Desert Falcons are native Arabic speakers.

The list of targeted victims include Military and Government organisations - particularly employees responsible for countering money laundering as well as health and the economy; leading media outlets; research and education institutions; energy and utilities providers; activists and political leaders; physical security companies; and other targets in possession of important geopolitical information. In total Kaspersky Lab experts were able to find signs of more than 3000 victims in 50+ countries, with more thanone million files stolen. Although the main focus of Desert Falcons' activity appears to be in countries such as Egypt, Palestine, Israel and Jordan, multiple victims were also found in Qatar, KSA, UAE, Algeria, Lebanon, Norway, Turkey, Sweden, France, the United States, Russia and other countries.

Deliver, Infect, Spy

The main method used by the Falcons to deliver the malicious payload is spear phishing via e-mails, social networking posts and chat messages. Phishing messages contained malicious files (or a link to malicious files) masquerading as legitimate documents or applications. Desert Falcons use several techniques to entice victims into running the malicious files. One of the most specific techniques is the so-called right-to-left extension override trick.

This method takes advantage of a special character in Unicode to reverse the order of characters in a file name, hiding the dangerous file extension in the middle of the file name and placing a harmless-looking fake file extension near the end of the file name. Using this technique, malicious files (.exe, .scr) will look like a harmless document or pdf file; and even careful users with good technical knowledge could be tricked into running these files. For example, a file ending with .fdp.scr would appear .rcs.pdf.

After the successful infection of a victim, Desert Falcons would use one of two different Backdoors: the main Desert Falcons' Trojan or the DHS Backdoor, which both appear to have been developed from scratch and are in continuous development. Kaspersky Lab experts were able to identify a total of more than 100 malware samples used by the group in their attacks.

The malicious tools used have full Backdoor functionality, including the ability to take screenshots, log keystrokes, upload/download files, collect information about all Word and Excel files on a victim's Hard Disk or connected USB devices, steal passwords stored in the system registry (Internet Explorer and live Messenger) and make audio recordings. Kaspersky Lab experts were also able to find traces of activity of a malware which appears to be an Android backdoor capable of stealing mobile calls and SMS logs.

Using these tools the Desert Falcons launched and managed at least three different malicious campaigns targeting different set of victims in different countries.

A Pack of Falcons on the hunt for secrets

Kaspersky Lab researchers estimate that at least 30 people, in three teams, spread across different countries, are operating the Desert Falcons malware campaigns.

"The individuals behind this threat actor are highly determined, active and with good technical, political and cultural insight. Using only phishing emails, social engineering and homemade tools and backdoors, the Desert Falcons were able to infect hundreds of sensitive and important victims in the Middle East region through their computer systems or mobile devices, and exfiltrate sensitive data. We expect this operation to carry on developing more Trojans and using more advanced techniques. With enough funding, they might be able to acquire or develop exploits that would increase the efficiency of their attacks," said Dmitry Bestuzhev, security expert at Kaspersky Lab's Global Research and Analysis Team.

Kaspersky Lab products successfully detect and block the malware used by Desert Falcons threat actors.

Read more about the campaign on Securelist.com

About Kaspersky Lab

Kaspersky Lab is the world's largest privately held vendor of endpoint protection solutions. The company is ranked among the world's top four vendors of security solutions for endpoint users*. Throughout its more than 17-year history Kaspersky Lab has remained an innovator in IT security and provides effective digital security solutions for large enterprises, SMBs and consumers. Kaspersky Lab, with its holding company registered in the United Kingdom, currently operates in almost 200 countries and territories across the globe, providing protection for over 400 million users worldwide. Learn more athttp://www.kaspersky.co.uk.

* The company was rated fourth in theIDCrating Worldwide Endpoint Security Revenue by Vendor, 2013. The rating was published in theIDCreport "Worldwide Endpoint Security 2014-2018 Forecast and 2013 Vendor Shares (IDC#250210, August 2014). The report ranked software vendors according to earnings from sales of endpoint security solutions in 2013.

Editorial contact:
Berkeley PR
Lauren White
kasperskylab@berkeleypr.co.uk
Telephone: +44(0)118-909-0909
1650 Arlington Business Park
RG7 4SA, Reading

Kaspersky Lab UK
Ruth Knowles
Ruth.Knowles@kasperskylab.co.uk
Telephone: +44(0)7590-440-433
2 Kingdom Street
W2 6BD, London


© 2015 PR Newswire
Werbehinweise: Die Billigung des Basisprospekts durch die BaFin ist nicht als ihre Befürwortung der angebotenen Wertpapiere zu verstehen. Wir empfehlen Interessenten und potenziellen Anlegern den Basisprospekt und die Endgültigen Bedingungen zu lesen, bevor sie eine Anlageentscheidung treffen, um sich möglichst umfassend zu informieren, insbesondere über die potenziellen Risiken und Chancen des Wertpapiers. Sie sind im Begriff, ein Produkt zu erwerben, das nicht einfach ist und schwer zu verstehen sein kann.