website statistics

Cyber espionage is increasingly popular in today's digital world. Security researchers at Dell have now released a detailed report about them.
1 Star2 Stars3 Stars4 Stars5 Stars (Rate This)
Loading...

Cyber espionage has become a very popular tool in today’s digital world. It is used to steal sensitive information, mint millions through fraud and perform a number of other cheats. It has been accused in the past that certain governments unofficially endorse such groups to serve national interests. Now, researchers seem to affirm this.


This has been revealed in a detailed report titled ‘Chasing APT.’ APT stands for Advanced Persistent Threats and refers to the many online espionage groups who make use of lot of resources and advanced techniques.

Security researchers have revealed that two main groups which are involved in cyber-espionage are based in Beijing and Shanghai. These groups attack notable organizations around the world and try to steal their sensitive information. The most astonishing part is that these groups are very sophisticated and well-organized. They make use of 200 families of custom malware and 1,110 domain names which are used specifically to act as command-and-control servers.

According to Director of malware research at Dell Secureworks Counter Threat Unit, Joe Stewart, “You have to to have that kind of paranoia to know anything you get that is unsolicited is suspicious.” Stewart also reveals how these espionage groups attack anyone, from organizations to government institutions, “Now it’s not just a limited set of targets. It’s anybody who has a competitor.”

Asia-based cyber espionage organization:
Stewart further revealed that during the course of research, they found out that a private security company in Asia, excluding China, was involved in cyber espionage. This company was carrying out a very powerful cyber-espionage operation against the military of another country. Naturally, this couldn’t have been done with the informal support and approval of the country in which the company is based.

Interestingly, another SecureWorks researchers found out that 14 out of 20 Top Fortune 500 firms have their systems infected with Zeus Gameover malware. This makes it one of the largest financial botnets and also shows how many business firms are utterly oblivious to the kind of risks they face in today’s cyber world.

The research further details how malware in today’s world are very sophisticated tools which can steal information, disrupt activities of a system and launch DDoS attacks to take down systems and websites. Moreover, since malware is based on a peer-to-peer structure, it’s really hard to bring it down.

Courtesy: CNET

Buy Cheapest Related Product From Amazon.com


Facebook Introduces New Feature- Recommendations Bar

[Tutorial] How To Protect Yourself Against Keyloggers – Windows Web Browsers
You can also press the left/right arrow key on your keyboard to go to previous/next post
  On July 27, 2012(3 years, 11 months ago.)

You May Also Like:

What Do You Think?

Leave a Reply




Loading Facebook Comments ...

FTC Disclosure: Some of the links of this website are "affiliate links." This means if you click on the link and purchase the item, we will receive an affiliate commission.


Recent Search

Recent Tutorials

Siri might not understand the question you asked. But you can use Siri by editing the text that you asked & it will give an updated answer.
Perhaps, you are new Apple user and you might have no idea how to change name of your iPhone. Check out this tutorial to change the name.
Check out this tutorial to lock Android phone using PIN code, Password or Pattern. Following the easy steps, you can secure your smartphone.
If you could not figure out yet, how to save and send GIF from your iPhone, then this tutorial is just for you.
Google released 'Ambient Display' feature with Android 5.x Lollipop. Check the tutorial to know how to turn off Android’s Ambient Display .
Have you recently got your 3D Touch iPhone 6s and struggling to delete apps? Go through the tutorial to learn how to delete or move the apps.
Just read this tutorial by yourself and from now on, we will show you, how you can make your iOS device read text loudly for you.
If you're still struggling to take selfie on iPhone then check it out to know how to take photos from far using iPhone's headset as a remote.
Even if your iPhone is locked, people can reply from the lock screen. Check out, how to turn off the quick reply message from locked screen.
Have you forgot Apple ID password or having trouble signing in? Check out this tutorial to reset the password.
Close You Have To Login
User:
Pass:
Login With »Login With TwitterLogin With Facebook