Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cyberwarfare

Targeted Attacks in Asia-Pacific Region Twice as High as Other Regions: FireEye

New research from FireEye shows that the Asia-Pacific region was twice as likely to be targeted by advanced persistent threats during 2013 than the rest of the world.

New research from FireEye shows that the Asia-Pacific region was twice as likely to be targeted by advanced persistent threats during 2013 than the rest of the world.

Leading the way for countries in this region was South Korea, with Japan and Taiwan rounding out the top three. Thailand and Hong Kong were ranked fourth and fifth, respectively.

Attackers also had certain verticals within the region they favored as well. The most popular among these were: the financial services industry; federal government; high-tech industry; chemical/manufacturing/mining industries and consulting services.

“According to the 2012 World Intellectual Property Organization (WIPO) report (PDF), which cited global data collected in 2010, three of the top five patent offices are now located in Asia, and they represented more than 45 percent of all patents filed worldwide,” blogged FireEye researchers Geok Meng Ong and Kenneth Geers. “With such a high volume of intellectual property concentrated in the region, Asia is a logical battleground for cyber attacks. Stealing information about an advanced-stage product can allow an unscrupulous competitor to bring a similar product to market at a much lower cost and effort — and at the direct expense of the victim.”

Japan and South Korea in particular saw heavy concentrations of APT malware.  

Advertisement. Scroll to continue reading.

“That two of the most recently discovered zero-day vulnerabilities (CVE-2013-3893 and CVE-2013-3897) have been used in advanced cyber attacks specifically targeted at Japanese and Korean language users is striking,” the researchers noted.

“Zero-day vulnerabilities are often hard to come by, and the frequent use of these exploits against Japan and Korea is an indicator of determined and resourceful attackers, as well as the high value of the information they are extracting from these targets,” they added.

The attackers behind the APT campaigns are using many different tools, the most popular of which include Gh0stRat, Sisproc and DarkComet. In certain countries – such as Japan and South Korea – FireEye spotted more than 30 unique APT families. In North Asia, APT tools like Terminator RAT (also known as FakeM) have been used against Tibetan and Uyghur activists.

Gh0stRat is one of the most commonly used remote administration tools (RAT) in the world,” the researchers noted. “But we have also found an increased use of malware such as Houdini — a heavily obfuscated VBScript-based RAT that was analyzed by FireEye researchers in a recent blog post.”

“Some APT malware, such as Mirage, has been used for specific purposes in Asia,” the researchers continued. “Threat actors using this malware often employ spear phishing attacks using legitimate decoy documents that are related to a target’s national economy or politics including regional events such as ASEAN summits, Asia-Pacific Economic Cooperation (APEC) summits, energy exploration, or military affairs.”

Written By

Marketing professional with a background in journalism and a focus on IT security.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Bill Dunnion has joined telecommunications giant Mitel as Chief Information Security Officer.

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

More People On The Move

Expert Insights

Related Content

Cyberwarfare

WASHINGTON - Cyberattacks are the most serious threat facing the United States, even more so than terrorism, according to American defense experts. Almost half...

Cybercrime

Patch Tuesday: Microsoft calls attention to a series of zero-day remote code execution attacks hitting its Office productivity suite.

Cyberwarfare

Russian espionage group Nomadic Octopus infiltrated a Tajikistani telecoms provider to spy on 18 entities, including government officials and public service infrastructures.

Cyberwarfare

Several hacker groups have joined in on the Israel-Hamas war that started over the weekend after the militant group launched a major attack.

Cyberwarfare

An engineer recruited by intelligence services reportedly used a water pump to deliver Stuxnet, which reportedly cost $1-2 billion to develop.

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

Cyberwarfare

The war in Ukraine is the first major conflagration between two technologically advanced powers in the age of cyber. It prompts us to question...