Sunday, August 28, 2016
Search
  
Submit your own News for
inclusion in our Site.
Click here...
Breaking News
Facebook 'Trending' To Rely Less On Humans
Apple Patches iOS Security Flaws Discovered In Spyware Targeting Activist
LG To Showcase Latest OLED TVs Compatible With HDR Technologies At IFA
NHK Join Forces With Panasonic And Sony To Win The 8K TV Race
Intel Introduces New 3D NAND SSDs
Facebook To Use Personal Data From WhatsApp To Bring You Personalized Ads
Amazon Introduces Car Research Portal
Google Uses Artificial Intelligence To Compress Images
Active Discussions
Which of these DVD media are the best, most durable?
How to back up a PS2 DL game
Copy a protected DVD?
roxio issues with xp pro
Help make DVDInfoPro better with dvdinfomantis!!!
menu making
Optiarc AD-7260S review
cdrw trouble
 Home > News > General Computing > Hackers...
Last 7 Days News : SU MO TU WE TH FR SA All News

Friday, February 22, 2013
Hackers Circulate Malicious Mandiant Report


Symantec has discovered that someone has been performing targeted attacks by using a recent report by a security firm that accuses the Chinese military of supporting widespread cyber attacks on U.S. companies.

The report (APT1: Exposing One of China's Cyber Espionage Units) released last week by cyber forensics firm Mandiant, is used as bait in an attempt to infect those who might be interested in reading it, Symantec says.

The report has drawn worldwide attention by both the security world and the general public. This interest is due to the conclusion the report has drawn regarding the origin of targeted attacks, using advanced persistent threats (APT), performed by a certain group of attackers dubbed the 'Comment Crew. '

The email Symantec has come across is in Japanese, but this does not mean there are no emails in other languages spreading in the wild. The email purports to be from someone in the media recommending the report. The attachment is made to appear like the actual report with the use of a PDF file and the name of the company as the file name. However, like in many targeted attacks, the email is sent from a free email account and the content of the email uses subpar language.

Symantec detects the fake report as Trojan.Pidief. Once it's opened, a blank PDF is shown but in the background exploit code for Adobe Acrobat and Reader Remote Code Execution Vulnerability (CVE-2013-0641) is executed. The PDF file may drop Trojan.Swaylib and Trojan.Dropper, which drops Downloader, if the vulnerbility is successfully exploited.

Symantec has also also confirmed that there are multiple variants of the malicious fake report.

Similar tactics have been used in the past, one of which actually involved Symantec. Back in 2011, when the security firm released a whitepaper on another group performing targeted attacks, the attackers took the opportunity to use the publication to infect those interested in reading the paper.

The original report is available from Mandiant at intelreport.mandiant.com/ and charges that a secretive Chinese military unit is behind a series of hacking attacks. Last week it prompted a denial from Beijing and accusations that China was in fact the victim of U.S. hacking.


Previous
Next
Intel 3D Graphics Solution Certified for Mobile        All News        Seagate Joins The Openstack Foundation And Open Compute Project
Microsoft's Computer's Hacked, Service Outage For Azure     General Computing News      Chrome 25 Brings Voice Recognition To The Web

Get RSS feed Easy Print E-Mail this Message

Related News
Hackers Accesssed Customer Credit Card Data From Acer Store
Mark Zuckerberg's Social Media Accounts Were Hacked
Hackers Target Banks in the Middle East
Hackers Steal, Sell Verizon Enterprise Customer Data
U.S IRS Discovers More Data Had Leaked In Last Year's Cyberattack
Hackers Hit Homeland Security And FBI
T-Mobile Customers Exposed in Experian Breach
Cisco Routers Vulnerable To Attack: researchers
Hackers Stole Data From Bugzilla
American Airlines, Sabre, Hacked
Researchers Showcase Javascript-based Attack On a Computer's DRAM
Hackers Used Twitter hashtags To Extract Data From Compromised Networks

Most Popular News
 
Home | News | All News | Reviews | Articles | Guides | Download | Expert Area | Forum | Site Info
Site best viewed at 1024x768+ - CDRINFO.COM 1998-2016 - All rights reserved -
Privacy policy - Contact Us .