• Cyber Security
    • Ransomware Prevention
    • Ransomware Removal
    • Ransomware File Recovery
    • Ransomware Types
  • Ransomware Services
    • Ransomware Removal
    • Ransomware File Recovery
  • News
  • Tutorials
  • Ransomware TV

UK Government Contractor Hacked over a Sensitive Military Information

March 15, 2018Simeon Georgiev

A cyber-espionage group that has long been considered a foreign arm, acting on the special directives of the Chinese government, has come forth with its latest attacks. This time, it has targeted the UK government contractor where it is believed that the attackers found and stole information regarding the British government’s departments as well as sensitive military technology.

The attackers are believed to have used tools that have not yet been encountered by the authorities. It is believed that while the tools and the virus itself was an older malware, it helped them infiltrate the computers longer as they utilized some legitimate apps. Almost all of the compromised systems were found with these apps as well as clear indication that this was a deliberate maneuver in order to remain undetected for as long as possible.

The NCC group which was given the responsibility of investigating as well as coming up with a future fire wall suggestion to prevent such attacks further revealed that this attack seems to have been carried out by a group that had an earlier attack thwarted but was able to infiltrate the system this time due to more clinical tools being used. The same tools also aided them in staying undetected within the system. The new malware signals that the attackers have developed several new malware techniques which allow them to infiltrate systems and prolong their stay while remaining undetected for several days.

The group that carried out this particular attack has been identified through their distinct codename “APT15”. APT15 is an online espionage outfit which aims to carry out similar attacks in other European and Western countries in order to gain access to any sort of sensitive information. Their name has popped in several other reports which highlight them as a digital threat to the cyber security of these nations. Similar attacks have been carried out by groups such as Ke3chang, Mirage, Vixen Panda GREF and Playful Dragon.

Revealing the specific details of the attack, the UK government contractor revealed that APT15 deployed two additional backdoors titled Royal CLI and Royal DNS to be able to gain access to the contractor’s network.

Simeon Georgiev
https://www.linkedin.com/in/simeon--georgiev/
I am a Cyber Security Enthusiast from Bulgaria. I like to write about malware and ransomware and global cyber attacks. You can reach me on Twitter @sgeorgiev1995 or Email: [email protected]
Previous post Hacked Remote Desktop infected with a LockCrypt .1BTC Variant Next post What is Zenis Ransomware and how to remove it?

Related Articles

NonPetya Ransomware Caused Millions of Dollars Worth of Damage to Maersk

January 27, 2018Simeon Georgiev
NonPetya Ransomware Caused Millions of Dollars Worth of Damage to Maersk

NonPetya Ransomware Caused Millions of Dollars Worth of Damage to Maersk

February 1, 2018Simeon Georgiev
NonPetya Ransomware Caused Millions of Dollars Worth of Damage to Maersk

BitPaymer Ransomware Traced Back to Dridex Developers

February 1, 2018Simeon Georgiev
BitPaymer Ransomware Traced Back to Dridex Developers

Latest on Ransomware TV

https://vimeo.com/399908876?loop=0

Recent Posts

  • How to protect your organization against ransomware reinfections
  • AuKill Helps Ransomware Operators Disable EDR and Security Tools
  • AI-ransomware is a real threat, just not a realistic one yet
  • Rorschach is the new speed king in the ransomware space
  • The Role of Supply Chain Breaches in Ransomware Attacks

Stay Protected

Subscribe to our mailing list to get the latest cyber security and ransomware removal articles!

Thank you for subscribing.

Something went wrong.

Navigation

  • Cyber Security
    • Ransomware File Recovery
    • Ransomware Prevention
    • Ransomware Removal
    • Ransomware Types
  • News
  • Tutorials

Ransomware Attacks (Last 6M)

0

Connect & Protect

Facebook
Google+
LinkedIn
YouTube
Vimeo

More

  • BECOME A CONTRIBUTOR

MonsterCloud Reviews

© 2020 MonsterCloud.com. All Rights Reserved.