Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Monday, 5 June, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

12 year siphoning campaign hit German companies from UK websites

by The Gurus
September 4, 2014
in Editor's News
Share on FacebookShare on Twitter

A massive cybercrime network which penetrated hundreds of blue-chip companies, Government institutions, research laboratories and critical infrastructure facilities was facilitated for 12 years by the incorporation of over 800 false companies registered in the UK.
 
According to research by Cybertinel, the espionage system was traced back to over 800 front companies registered in UK and to German individuals who operated the espionage network.
 
Named the ‘Harkonnen Operation’, the network performed numerous targeted penetrations on over 300 organisations and planted Trojans in specific workstations in the organisations, gaining access to sensitive confidential documents and information and silently siphoning them to the organisations who ordered the attack.
 
It reported that the organisation invests tens of thousands of Euros every year installing and maintaining IT security systems and tools. Those behind it are described as “very skilled” who work according to the latest security standards and threat warnings.
 
Also, a lack of interest in British firms in purchasing SSL security certificates were exploited by the network, enabling them to create pseudo legitimate internet service names and use them to camouflage their fraudulent activity.
 
Jonathan Gad of Elite Cyber Solutions, Cybertinel’s UK partner, said: “The network exploited the UK’s relatively tolerant requirements for purchasing SSL security certificates, and established British front companies so they could emulate legitimate web services. The German attackers behind the network then had total control over the targeted computers and were able to carry out their espionage undisturbed for many years.
 
“At this point, we are aware of the extent of the network, but the damage to the organisations who have been victims in terms of loss of valuable data, income or the exposure of information related to employees and customers is immeasurable.”
 
The ‘Harkonnen Operation’ began on 14th June 2013 using spear phishing messages which carried two Trojan variants. Once installed, hundreds of domain names, IP addresses and Wildcard certificates were acquired on behalf of these front companies at an estimated expense of $150,000 to camouflage fraudulent activity as legitimate services.
 
Mark Sparshott, EMEA director at Proofpoint, said: “Cybertinel’s report confirms yet again that spear-phishing is the weapon of choice for targeted attacks and, most worryingly, that they breeze through email and web gateways, next-generation firewalls and multiple anti-virus layers completely undetected.
 
“There are new technologies designed specifically to protect against spear-phishing, longlining attacks and other advanced email attacks. So it is high time that senior executives, who are often targeted, ask their security teams why they are not using these additional technologies in the face of such a clear risk and obvious hole in their security.”

FacebookTweetLinkedIn
ShareTweet
Previous Post

Goodwill admits breach was enabled by attack on third party

Next Post

LinkedIn announce security and privacy additions

Recent News

A Roadmap for Becoming a Penetration Tester in 2023

A Roadmap for Becoming a Penetration Tester in 2023

May 31, 2023
Electronic tablet with social media icons, hands holding screen.

Research Reveals UK Firms Plan to Embrace New Era of Digital Identity

June 1, 2023
AWS and Salt

Salt Security Attains AWS Security Competency Status 

May 31, 2023
Purple spiral circle. Text reads "Centripetal", san-serif.

Centripetal Extends Innovative CleanINTERNET® Technology to the Cloud

May 31, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information