ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

You Don’t Want to Get Caught in the Middle of a Hacking War [VIDEO]

b2ap3_thumbnail_hacker_wars_400.jpgWhen you see the results of a major hacking campaign on the news, you might tend to sympathize with the victim. While most hacks target individuals or high-profile businesses, hackers have, for the first time, intentionally targeted each other. The attack in question occurred between Naikon, a cyberespionage group, and another group called Hellsing.

While the attack might look like simple revenge on the surface, Kaspersky Labs seems to think it’s the start of a new cybercrime trend in which hackers explicitly target each other. These are being called advanced persistent threat (APT) wars, where two major threats exchange blows over the possession of certain information.

The attack which launched these suspicions occurred on April 15th 2015, when Naikon launched a spear-phishing attack against Hellsing. As the smaller threat, Hellsing boldly responded to the attack with their own brand of malware. Once again, Naikon responded by masquerading as a foreign government official. This game of cat and mouse continued for some time, until Hellsing sent a password-protected message containing a special backdoor specifically made to target Naikon.

Commenting on the behavior of these two entities, Costin Daiu, Director of the Global Research and Analyst Team of Kaspersky Labs, reports:

The targeting of the Naikon group by Hellsing, in some sort of a vengeful vampire-hunting -- "Empire Strikes Back" style, is fascinating. In the past, we've seen APT groups accidentally hitting each other while stealing address books from victims and then mass-mailing everyone on each of these lists. However, considering the targeting and origin of the attack, it seems more likely that this is an example of a deliberate APT-on-APT attack.

The nature of the attack was likely in the interest of stealing information, which is the primary objective of most advanced persistent threats. The way these two threats fire off assaults is interesting, and the attacks they use are unsurprisingly sophisticated; almost as if they’re simply trying to outsmart the other. As always, the primary goal is to leverage each other to obtain higher profits.

This might suggest that hackers will eliminate themselves if we leave them alone long enough, but we highly doubt that. So long as there is information to steal, hackers will continue to find ways to take it. As a business owner, you should always remain aware of how much danger an advanced persistent threat holds for your business. In this case, you want to avoid getting caught in between two of these hackers at all costs. Always keep your machines in peak condition, and never forget to apply the latest patches and updates to your IT infrastructure.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 05 May 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Privacy Network Security Data Cloud Business User Tips IT Support Internet Hardware Innovation Email Hosted Solutions Malware Efficiency Workplace Tips Computer Google Microsoft Collaboration Android Phishing Cybersecurity Business Management IT Services Backup Ransomware Data Backup Smartphone communications Upgrade Smartphones Microsoft Office Small Business Mobile Devices Network Data Recovery Managed IT Services Communication Quick Tips Productivity Social Media VoIP Users Mobile Device Tech Term Automation Business Continuity Facebook Windows 10 Disaster Recovery Passwords Holiday Covid-19 Windows 10 Managed Service Apps IT Support Browser Miscellaneous Cloud Computing Outsourced IT Data Management Internet of Things Managed Service Provider Remote Work Government Saving Money Operating System Gadgets Networking Windows Workplace Strategy Artificial Intelligence Managed IT services Remote Bandwidth Business Technology Encryption Mobile Device Management Blockchain App Server Virtualization WiFi Spam Information Employee/Employer Relationship Budget History Gmail Apple Office Two-factor Authentication Information Technology Office 365 BDR Wi-Fi Cybercrime Health Analytics Big Data Access Control Data Security Conferencing Remote Monitoring Hacker Save Money Vendor Employer-Employee Relationship Compliance IT Management Voice over Internet Protocol Training Remote Computing Help Desk Cost Management Hacking Patch Management Document Management Project Management Money Applications Search... Customer Service Unified Threat Management Firewall Best Practice Vulnerabilities Retail Augmented Reality BYOD Word Alert Mobile Office Computing IBM Hiring/Firing Vendor Management Website Managed Services Hard Drive Outlook Data loss Password Legal Data storage Marketing Travel Running Cable Virtual Reality Social Engineering Sports Social SaaS Websites DDoS Cryptocurrency Black Market Storage Mobility Meetings Monitoring Cleaning Healthcare Robot iPhone Google Maps Education Cortana Scam Remote Workers Content Filtering Windows 7 User Free Resource Router VPN Update How To Twitter The Internet of Things YouTube Chrome Law Enforcement End of Support Printer Windows 11 Laptop Paperless Office Antivirus Maintenance Mobile Computing Data Breach Holidays IT Consultant Processor Google Docs Virtual Desktop Bluetooth Experience Start Menu Cooperation Distributed Denial of Service Customer Relationship Management Downloads Co-Managed IT Office Tips Video Conferencing Computer Care Entertainment Private Cloud Memory Virtual Machines Vulnerability Computer Repair Multi-factor Authentication Software as a Service Disaster Data Protection Professional Services Politics Machine Learning Settings Saving Time Lithium-ion battery Managed Services Provider Solid State Drive Computers Bitcoin HIPAA Virtual Private Network Telephone Processors Chromebook Tech Terms Drones Current Events Automobile Managed IT Digital Excel Solutions How To Microchip Images 101 Taxes Integration Display Flexibility Wireless Technology Virtual Assistant eWaste PowerPoint Administration Employees Hack Identity Theft Presentation Notifications Downtime Physical Security Avoiding Downtime Specifications Safety Unified Communications Workplace Health IT Proactive IT Equifax SSID Administrator Phone System Text Messaging Bring Your Own Device Printing Media Tactics Development CCTV Hard Drive Disposal Employer/Employee Relationships Virtual Machine Touchscreen Username Scams Reviews Music Startup Optimization Computer Malfunction Freedom of Information Emergency Navigation 2FA Vendor Mangement Addiction email scam Teamwork Mobile Security Hypervisor Computer Accessories Data Storage Samsung Cables User Tip Shopping Staffing Uninterrupted Power Supply Legislation Webcam News Medical IT Botnet Rental Service Evernote Paperless Micrsooft Business Mangement Network Management IP Address SQL Server Licensing Flash PCI DSS Tablets Telephone Systems Point of Sale Proxy Server Gig Economy Business Growth Emails Humor Fake News Google Calendar Business Communications Service Level Agreement Internet Service Provider Supercomputer Computing Infrastructure Azure Device security Managed IT Service Virus Shortcuts Management Regulations Compliance Banking Recovery Google Wallet Wireless Headphones Memes Competition Motion Sickness Microsoft Excel Troubleshooting Messenger Comparison Tech Human Resources Deep Learning Google Drive Going Green Net Neutrality Business Cards Entrepreneur LiFi Be Proactive Error Financial Data Business Metrics Knowledge Bookmark Risk Management Documents Hosted Solution Corporate Profile IT Application Books Television Term Google Apps Telephony Download Employer Employee Relationship Piracy Business Intelligence Society Cabling HTML Language Workplace Strategies Telework Browsers Smartwatch Securty Tablet Nanotechnology Communitications G Suite Microsoft 365 Business Owner Reading Mouse Google Play Monitors VoIP Upload Procurement Domains Visible Light Communication Tracking Software License Windows 8 Social Network FinTech Data Analysis CES Screen Reader IT Assessment Web Server Relocation SharePoint Security Cameras Displays Trends Supply Chain Management Advertising Digital Payment Mobile Technology Value Customer Resource management Organization Tech Support Worker Devices Cyber security Work/Life Balance Smart Technology Fileless Malware Access Smart Devices Public Speaking Tip of the week Company Culture Inbound Marketing Streaming Media Time Management Gamification Remote Working Public Cloud Telephone System AI Regulations Trend Micro Keyboard In Internet of Things Hacks Audit Directions Digital Security Cameras Network Congestion Spyware Backup and Disaster Recovery Electronic Health Records Hard Drives Transportation Desktop Wasting Time intranet Reliable Computing Writing Content File Sharing Supply Chain Electronic Medical Records Wireless Accountants eCommerce Shortcut Electronic Payment Modem Redundancy Videos Cache Database Surveillance Heating/Cooling Environment Managing Costs Social Networking Scalability Windows XP Unified Threat Management Workers

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?