Post by account_disabled on Jan 8, 2024 3:21:08 GMT
Kaspersky researchers has revealed a highly sophisticated cyber espionage operation aimed at stealing data from diplomatic, government and military agencies in Southeast Asia. The operation has been ongoing for nearly six years and has been linked to attacks recently detected in the region. Further examination of the tools and procedures used in the operation led the researchers to conclude that The attackers behind the operation were PLATINUM, a cyber-theft group that researchers thought had long disappeared. In an operation that had gone unnoticed for a long time, The group uses a method of encrypting data using a technique called Information camouflage technology (Steganography) which helps conceal the presence of any information in the operating process. Security researchers have previously warned about the dangers of cloaking.
The science of data camouflage is the work B2B Email List of transferring data by formatting the data (Format) that is hidden. This helps conceal the fact that data is currently being exported. With this way of working The science of data camouflage is therefore different from encryption of data signals. (Cryptography), which is only to conceal information. When using information camouflage technology Spyders can remain hidden in compromised systems for long periods of time without raising suspicion. This is a method used by the Platinum Group to threaten government agencies and related organizations in South and East Asia.
southeast This is a group whose threatening activity was last detected in 2017. A recently disclosed case of operations by Platinum Group is that malware has discovered commands embedded in a website's HTML code, usually the Tab and Space buttons. bar) on the keyboard does not change when the HTML code is used on a web page, so attackers encode commands using these two key sequences. As a result, it is nearly impossible to detect attack vectors in the network. Not at all. This is because malware only appears at the level of access to the website in question. This is hardly noticeable in the overall signal network. In detecting this malware The research team had to investigate programs that had the ability to upload data files to the device.
The science of data camouflage is the work B2B Email List of transferring data by formatting the data (Format) that is hidden. This helps conceal the fact that data is currently being exported. With this way of working The science of data camouflage is therefore different from encryption of data signals. (Cryptography), which is only to conceal information. When using information camouflage technology Spyders can remain hidden in compromised systems for long periods of time without raising suspicion. This is a method used by the Platinum Group to threaten government agencies and related organizations in South and East Asia.
southeast This is a group whose threatening activity was last detected in 2017. A recently disclosed case of operations by Platinum Group is that malware has discovered commands embedded in a website's HTML code, usually the Tab and Space buttons. bar) on the keyboard does not change when the HTML code is used on a web page, so attackers encode commands using these two key sequences. As a result, it is nearly impossible to detect attack vectors in the network. Not at all. This is because malware only appears at the level of access to the website in question. This is hardly noticeable in the overall signal network. In detecting this malware The research team had to investigate programs that had the ability to upload data files to the device.