Symantec Corp, a Cyber security firm Symantec corp says it has identified a sustained cyber spying campaign which is likely to be considered state sponsored, against Pakistani and Indian entities involved in regional security issues.
In Symantec’s threat intelligence report, the company said that the online espionage effort dated back to October 2016 and the campaign appeared to be the work of several groups, whereas the tactics and techniques used suggest that the groups were operating with “similar goals or under the same sponsor”, probably a nation state, according to the threat report, which was reviewed by Reuters. The detailed report on the cyber spying comes at a time of heightened tensions in the region. It did not name a state.
Symantec did not identify the likely sponsor of the attack. But it said that governments and militaries with operations in South Asia and interests in regional security issues would likely be at risk from the malware. The malware utilises the so-called “Ehdoor” backdoor to access files on computers.
Read: Indian Hackers Defame Several Government Websites On Independence Day
A security expert shared:
“There was a similar campaign that targeted Qatar using programs called Spynote and Revokery. They were backdoors just like Ehdoor, which is a targeted effort for South Asia.”
To install the malware, Symantec found, the attackers used decoy documents related to security issues in South Asia. The documents included reports from Reuters, Zee News, and the Hindu, and were related to military issues, Kashmir, and an Indian secessionist movement.
The malware allows spies to upload and download files, carry out processes, log keystrokes, identify the target’s location, steal personal data, and take screenshots, Symantec said, adding that the malware was also being used to target Android devices.
In response to frequent cyber-security incidents, India in February established a center to help companies and individuals detect and remove malware. The center is operated by the Indian Computer Emergency Response Team (CERT-In).
Read: NTC and Supernet Sign Agreement for ICT Services
Gulshan Rai, the director general of CERT-In, declined to comment specifically on the attack cited in the Symantec report, but added: “We took prompt action when we discovered a backdoor last October after a group in Singapore alerted us.” He did not elaborate.
Symantec’s report said an investigation into the backdoor showed that it was constantly being modified to provide “additional capabilities” for spying operations.
A senior official with Pakistan’s Federal Investigation Agency said it had not received any reports of malware incidents from government information technology departments. He asked not to be named due to the sensitivity of the matter.
Read: Punjab Police Launches App to Monitor Legal Affairs of Police
A spokesman for FireEye, another cybersecurity company, said that based on an initial review of the malware, it had concluded that an internet protocol address in Pakistan had submitted the malware to a testing service. The spokesman requested anonymity, citing company policy.
Another FireEye official said the attack reported by Symantec was not surprising. Tim Wellsmore, FireEye’s director of threat intelligence for the Asia Pacific region said:
“South Asia is a hotbed of geopolitical tensions, and wherever we find heightened tensions we expect to see elevated levels of cyber espionage activity”
The Symantec report said the ‘Ehdoor’ backdoor was initially used in late 2016 to target government, military and military-affiliated targets in the Middle East and elsewhere.
Image source: CSO Online
Source: Express Tribune/Reuters