AGL 37.72 Decreased By ▼ -0.22 (-0.58%)
AIRLINK 168.65 Increased By ▲ 13.43 (8.65%)
BOP 9.09 Increased By ▲ 0.02 (0.22%)
CNERGY 6.85 Increased By ▲ 0.13 (1.93%)
DCL 10.05 Increased By ▲ 0.52 (5.46%)
DFML 40.64 Increased By ▲ 0.33 (0.82%)
DGKC 93.24 Increased By ▲ 0.29 (0.31%)
FCCL 37.92 Decreased By ▼ -0.46 (-1.2%)
FFBL 78.72 Increased By ▲ 0.14 (0.18%)
FFL 13.46 Decreased By ▼ -0.14 (-1.03%)
HUBC 114.10 Increased By ▲ 3.91 (3.55%)
HUMNL 14.95 Increased By ▲ 0.06 (0.4%)
KEL 5.75 Increased By ▲ 0.02 (0.35%)
KOSM 8.23 Decreased By ▼ -0.24 (-2.83%)
MLCF 45.49 Decreased By ▼ -0.17 (-0.37%)
NBP 74.92 Decreased By ▼ -1.25 (-1.64%)
OGDC 192.93 Increased By ▲ 1.06 (0.55%)
PAEL 32.24 Increased By ▲ 1.76 (5.77%)
PIBTL 8.57 Increased By ▲ 0.41 (5.02%)
PPL 167.38 Increased By ▲ 0.82 (0.49%)
PRL 31.01 Increased By ▲ 1.57 (5.33%)
PTC 22.08 Increased By ▲ 2.01 (10.01%)
SEARL 100.83 Increased By ▲ 4.21 (4.36%)
TELE 8.45 Increased By ▲ 0.18 (2.18%)
TOMCL 34.84 Increased By ▲ 0.58 (1.69%)
TPLP 11.24 Increased By ▲ 1.02 (9.98%)
TREET 18.63 Increased By ▲ 0.97 (5.49%)
TRG 60.74 Decreased By ▼ -0.51 (-0.83%)
UNITY 31.98 Increased By ▲ 0.01 (0.03%)
WTL 1.61 Increased By ▲ 0.14 (9.52%)
BR100 11,289 Increased By 73.1 (0.65%)
BR30 34,140 Increased By 489.6 (1.45%)
KSE100 105,104 Increased By 545.3 (0.52%)
KSE30 32,554 Increased By 188.3 (0.58%)

Hackers have developed a scheme to steal sensitive information from top executives by penetrating the Wi-Fi networks of luxury hotels, security researchers said Monday. A report by Kaspersky Lab said the "Darkhotel" espionage effort "has lurked in the shadows for at least four years while stealing sensitive data from selected corporate executives travelling abroad."
Kaspersky said about 90 percent of the infections appear to be located in Japan, Taiwan, China, Russia and South Korea, but that the executives targeted include those travelling from the United States and other countries. "The infection count numbers in the thousands," the report said. "The more interesting travelling targets include top executives from the US and Asia doing business and investment in the (Asia-Pacific) region."
The hackers are able to compromise hotel Wi-Fi networks, and to then trick executives into downloading malicious software that can allow their information to accessed remotely. "These tools collect data about the system and the anti-malware software installed on it, steal all keystrokes, and hunt for cached passwords in Firefox, Chrome and Internet Explorer; Gmail Notifier, Twitter, Facebook, Yahoo and Google login credentials; and other private information," the report said.
"Victims lose sensitive information - likely the intellectual property of the business entities they represent. After the operation, the attackers carefully delete their tools from the hotel network and go back into hiding." Kaspersky researcher Kurt Baumgartner said the attacks are highly sophisticated. "This threat actor has operational competence, mathematical and crypto-analytical offensive capabilities, and other resources that are sufficient to abuse trusted commercial networks and target specific victim categories with strategic precision," he said.
Targets have included corporate chief executives, senior vice presidents, sales and marketing directors and top research staff at companies in the electronics, defence manufacturing, finance, automotive and pharmaceutical industries, among others. Some law enforcement, military and non-governmental officials have also been targeted. "From our observations, the highest volume of offensive activity on hotel networks started in August 2010 and continued through 2013, and we are investigating some 2014 hotel network events," Kaspersky said.
The researchers said the risk can be mitigated by using a virtual private network that protects data. The security team said that travellers should be extra cautious about software updates and should use software with protection against a broad range of threats in addition to viruses.

Copyright Agence France-Presse, 2014

Comments

Comments are closed.