City
Epaper

Chinese hacking group targeting governments across Asia to gather geopolitical intelligence

By ANI | Updated: May 8, 2020 08:15 IST

According to a news released by security firm Check Point, Naikon has reportedly attacked governments in Australia, Indonesia, Philippines, Vietnam, Thailand, Myanmar and Brunei, targeting foreign affairs, science and technology ministries.Should the hapless victim open the email attachment, it is spiked with a sophisticated piece of backdoor malware called 'Aria-body.' That gives the attacker access to the target's networks and from there, they attempt to access other parts of the infrastructure to gain wider access and launch new attacks", it said.

Open in App

A renowned technology blog network site, Engadget, has claimed that a Chinese hacking group, Naikon, has been conducting ongoing operations on foreign governments across Asia to gather "geopolitical intelligence".

According to a news released by security firm Check Point, Naikon has reportedly attacked governments in Australia, Indonesia, Philippines, Vietnam, Thailand, Myanmar and Brunei, targeting foreign affairs, science and technology ministries.

"The primary attack vector is our old friend, phishing. First, Naikon creates an official-looking e-mail with information of interest to potential targets, obtained via public or stolen information. Should the hapless victim open the email attachment, it is spiked with a sophisticated piece of backdoor malware called 'Aria-body.' That gives the attacker access to the target's networks and from there, they attempt to access other parts of the infrastructure to gain wider access and launch new attacks", it said.

"Naikon's primary method of attack is to infiltrate a government body, then use that body's contacts, documents and data to launch attacks on others, exploiting the trust and diplomatic relations between departments and governments to increase the chances of its attack succeeding," said Check Point.

Naikon is a known hacker group but apparently dropped out of view around 2015. However, Check Point found that despite avoiding detection, the group has been very active during the last five years, especially in 2019-2020. During that time, the group developed new tools including Aria-body.

"To evade detection, they were using exploits attributed to lots of APT (advanced persistent threat) groups and uniquely using their victims' servers as command and control centres," wrote Check Point.

"We have published this research as a warning and resource for any government entity to better spot Naikon's or other hacker group's activities," it warned.

( With inputs from ANI )

Tags: australiaasiaCheck Point
Open in App

Related Stories

InternationalIndian Student Brutally Attacked in Australia: 23-Year-Old Left Unconscious with Severe Facial Fractures in Racist Assault

Social ViralGlowing Quoll: Tasmanian Photographer Captures 'Glow in the Dark' Creature in Australia

MumbaiMumbai: Over 10 International Schools Receive Threat Emails in 2 Months via Foreign VPNs; Probe Underway

NationalSolar Eclipse 2025: Know Date, Time, Visibility, and Key Dos & Don’ts

CricketSouth Africa Wins WTC Final 2025; Beats Australia to Claim Historic First World Test Championship Title at Lord’s (VIDEO)

International Realted Stories

InternationalAwami League slams Yunus-led interim govt over rising minority persecution in Bangladesh

InternationalUN humanitarians alarmed by intensifying conflict, mounting civilian casualties in Sudan

InternationalVisa applicants may be required to post bond of up to $15,000 to enter US

InternationalUK intelligence agencies plan to involve NATO allies to raid 'shadow fleet': Russia claims

InternationalUganda to host nearly 2 million refugees by end of 2025 due to escalating crises: UN