sb-au logo
Story image

Operation Ghoul targets industrial sector with spear phishing malware

24 Aug 2016

Operation Ghoul is targeting the industrial and engineering sectors across the world, hitting more than 130 organisations in 30 countries, Kaspersky Labs reports.

The attacks use a combination of spear-phishing and malware. The spear-phishing is targeted towards senior and middle managers. The malware is disguised as an attached SWIFT document from a bank in the UAE.

The attackers look for sensitive business data, including keystrokes, clipboard data, FTP server credentials, browser account data, messaging account data, email client data and information about installed software. The malware is delivered by commercial spyware HawkEye, distributed on the dark web. The collected information is sent back to attackers, allowing them to mine the data and potentially sell it on the black market.

While most targets are in the industrial and engineering sectors, Kaspersky Labs has found that attacks have also been made against shipping, trading, education and manufacturing organisations.

The company suspects the attacks are the work of Operation Ghoul, which has conducted similar campaigns in the past. The current trojans run under the following names:

  • Trojan.MSIL.ShopBot.ww
  • Trojan.Win32.Fsysna.dfah
  • Trojan.Win32.Generic

“In ancient Folklore, the Ghoul is an evil spirit associated with consuming human flesh and hunting kids, originally a Mesopotamian demon. Today, the term is sometimes used to describe a greedy or materialistic individual. This is quite a precise description of the group behind Operation Ghoul. Their main motivation is financial gain resulting either from sales of stolen intellectual property and business intelligence, or from attacks on their victim’s banking accounts. Unlike state-sponsored actors, which choose targets carefully, this group and similar groups might attack any company. Even though they use rather simple malicious tools, they are very effective in their attacks. Thus companies that are not prepared to spot the attacks, will sadly suffer," explains Mohammad Amin Hasbini, security expert at Kaspersky Lab.

Kaspersky Labs stresses protection by:

  • Educating staff about how to identify phishing and spear-phishing emails
  • Using corporate-grade security solutions and anti-targeted attack solutions
  • Keeping threat intelligent data up to date to help staff implement attack prevention and discovery. Using indicators of compromise and YARA rules will help
Story image
Fast track your digital transformation with dynamic security services from Fortinet
Jon McGettigan, Fortinet A/NZ Regional Director, explains how enterprises can speed up their network service delivery programmes by embracing Fortinet’s dynamic security services.More
Story image
Sophos named mobile security Leader in IDC MarketScape
Sophos Intercept X for Mobile has capabilities in protecting Android, iOS and Chrome OS users from known and never before seen mobile threats.More
Story image
Yubico rolls out subscription service for hardware authentication keys
“With immediate success from the initial roll out in the US and Canada, we are proud to now offer YubiEnterprise Subscription to our APAC channel partners.” More
Story image
APAC organisations struggle to find balance between digital adoption and cybersecurity
Organisations in the Asia Pacific (APAC) region are significantly concerned about security threats, but nevertheless are looking to advance operations through digital adoption.More
Story image
CrowdStrike acquires Preempt Security for $96m, develops zero trust security offerings
With this acquisition, the company plans to offer customers enhanced Zero Trust security capabilities and strengthen the CrowdStrike Falcon platform with conditional access technology. More
Story image
ESET launches the latest version of its Mobile Security solution
“With this latest version of ESET Mobile Security, we want to ensure our users feel completely secure when performing financial transactions on their devices, in addition to being protected from malware and phishing attempts."More