{"id":5772,"date":"2015-05-20T09:00:36","date_gmt":"2015-05-20T13:00:36","guid":{"rendered":"http:\/\/kasperskydaily.com\/uk\/?p=5772"},"modified":"2020-02-26T15:11:09","modified_gmt":"2020-02-26T15:11:09","slug":"naikon-apt-south-china-sea","status":"publish","type":"post","link":"https:\/\/www.kaspersky.co.uk\/blog\/naikon-apt-south-china-sea\/5772\/","title":{"rendered":"Naikon APT steals geopolitical data from the South China Sea"},"content":{"rendered":"<p>The Chinese-language Naikon <a href=\"https:\/\/www.kaspersky.com\/blog\/all-you-need-to-know-about-apts\/\" target=\"_blank\" rel=\"noopener nofollow\">advanced persistent threat<\/a> group is targeting military, government and civil organizations located in and around the South China Sea, which is an increasingly contentious hot-bed of territorial disputes between various Southeast Asian nations.<\/p>\n<p>Like many APT campaigns, Naikon infects its victims with <a href=\"https:\/\/www.kaspersky.com\/blog\/no-monkeys-for-cozyduke\/\" target=\"_blank\" rel=\"noopener nofollow\">spear-phishing emails<\/a> in which malicious executables masquerade as seemingly relevant document attachments. When a victim open\u2019s one of these malicious attachments, a decoy document appears as an executable file quietly exploits an old Microsoft Office vulnerability, installing malware on the victim\u2019s machine.<\/p>\n<p>For five years, the APT group has employed cultural liaisons for each of its target countries. In this way, Naikon is able to exploit cultural tendencies, such as the reliance on personal email addresses to conduct business. Attackers exploited this reality by creating email addresses that appeared similar to those in actual use, which the attackers were able to leverage to send <a href=\"https:\/\/www.kaspersky.com\/blog\/how-to-avoid-phishing\/\" target=\"_blank\" rel=\"noopener nofollow\">more affective phishing messages<\/a>.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">Hellsing APT retaliates against Naikon attackers with own phishing ploy | <a href=\"http:\/\/t.co\/fah3HZ81Aj\" target=\"_blank\" rel=\"noopener nofollow\">http:\/\/t.co\/fah3HZ81Aj<\/a> <a href=\"http:\/\/t.co\/QUwv6hvzVK\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/QUwv6hvzVK<\/a><\/p>\n<p>\u2014 SC Media (@SCMagazine) <a href=\"https:\/\/twitter.com\/SCMagazine\/status\/588465747850067969?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">April 15, 2015<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>The group has also installed portions of its command and control infrastructure in the target countries in order to provide daily support for real-time connections and data theft. They also have the capacity to intercept traffic across entire victim networks and issue some 48 distinct and remote commands, including taking a complete inventory of system files, downloading and uploading data, installing add-on modules, or working with the command line or prompt.<\/p>\n<p>Taken together, these 48 commands allow the threat group to take complete control over any Naikon-infected machine. Naikon\u2019s ultimate goal is to gather geopolitical information.<\/p>\n<div class=\"pullquote\">The criminals behind the Naikon attacks managed to devise a very flexible infrastructure that can be set up in any target country<\/div>\n<p>\u201cThe criminals behind the Naikon attacks managed to devise a very flexible infrastructure that can be set up in any target country, with information tunneling from victim systems to the command centre,\u201d explained Kaspersky Lab principle security researcher, <a href=\"https:\/\/twitter.com\/k_sec\" target=\"_blank\" rel=\"noopener nofollow\">Kurt Baumgartner<\/a>. \u201cIf the attackers then decide to hunt down another target in another country, they could simply set up a new connection. Having dedicated operators focused on their own particular set of targets also makes things easy for the Naikon espionage group.\u201d<\/p>\n<p>In one country that Kaspersky Lab declined to name, the Naikon hackers managed to compromise Office of the President, Military Forces, Office of the Cabinet Secretary, National Security Council, Office of the Solicitor General, National Intelligence Coordinating Agency, Civil Aviation Authority, Department of Justice, Federal Police and Executive\/Presidential Administration and Management Staff.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>The #Naikon #APT is designed to steal geopolitical information from nation\u2019s located around the South China Sea<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2FKU9S&amp;text=The+%23Naikon+%23APT+is+designed+to+steal+geopolitical+information+from+nation%26%238217%3Bs+located+around+the+South+China+Sea\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>Kaspersky Lab experts recommend that users don\u2019t ever open attachments from people they don\u2019t know, <a href=\"https:\/\/www.kaspersky.com\/multi-device-security?redef=1&amp;reseller=gl_KDpost_pro_ona_smm__onl_b2c_kasperskydaily_lnk____kismd___\" target=\"_blank\" rel=\"noopener nofollow\">use an advanced anti-malware solution<\/a>, and keep operating systems patched and up-to-date.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Chinese-language Naikon advanced persistent threat group is targeting military, government and civil organizations located in and around the South China Sea, which is an increasingly contentious hot-bed of territorial<\/p>\n","protected":false},"author":42,"featured_media":5773,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5,2026],"tags":[423,1011,1010,36,990,529],"class_list":{"0":"post-5772","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"category-threats","9":"tag-apt","10":"tag-asia","11":"tag-geopolitics","12":"tag-malware-2","13":"tag-spear-phishing","14":"tag-threats"},"hreflang":[{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/naikon-apt-south-china-sea\/5772\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/naikon-apt-south-china-sea\/6095\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/naikon-apt-south-china-sea\/6075\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/naikon-apt-south-china-sea\/7771\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/naikon-apt-south-china-sea\/8696\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/naikon-apt-south-china-sea\/4542\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/naikon-apt-south-china-sea\/7629\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/naikon-apt-south-china-sea\/7771\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/naikon-apt-south-china-sea\/8696\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/naikon-apt-south-china-sea\/8696\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.co.uk\/blog\/tag\/apt\/","name":"apt"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts\/5772","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/users\/42"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=5772"}],"version-history":[{"count":3,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts\/5772\/revisions"}],"predecessor-version":[{"id":19218,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts\/5772\/revisions\/19218"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/media\/5773"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=5772"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=5772"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=5772"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}