Tuesday, August 18, 2015

APT: NetTraveler

NetTraveler
STATUS:Active
TYPE:Cyberespionage toolkit
DISCOVERY:2013
TARGETED PLATFORMS:Windows
FIRST KNOWN SAMPLE:2004
NUMBER OF TARGETS:101-500

Top targeted countries:
Mongolia, India, Russia. In total, infections were identified in 40 countries.

Special Features:
The crew behind NetTraveler specifically targets Tibetan/Uyghur activists.
NetTraveler infects high-profile targets: space exploration, nanotechnology, energy production, nuclear power, lasers, medicine and communications.
More than 22 gigabytes of stolen data is stored on NetTraveler’s C&C servers.
Office and Java exploits were used.


Targets:
Activists
Energy, oil and gas companies
Academia/Research
Private companies
Government entities
Diplomatic organizations/embassies
Military

No comments:

Operating system - Part 1:

 In our blog, we published several articles on OS concepts which mostly on the perspective for malware analysis/security research. In few in...