• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer
  • Jobs
  • Career
    • Cyber Security Training
    • Work from Home
    • Cyber Security Analyst
    • Remote Work – Six Ways to Keep Your Data Safe When Working Remotely
  • Field Guide
  • Newsletter Signup
  • Deals
  • News
AskCyberSecurity.com

AskCyberSecurity.com

Cyber Security News & Information

  • Home
  • Data Privacy
    • Gamers
    • Government Cyber Security
      • Legislation
      • Standards
        • What are the risks of computer security?
        • Medical Cyber Security
    • Social Media
  • Security
    • Data Breaches
    • Scams
    • Malware
  • Software
    • Apps
    • Web Browsers
  • Glossary
    • Cyber Security Acronyms
  • About Ask Cyber Security
    • Authors
    • Contact Us
  • VPN
    • How Do I Know If My VPN is Working?
    • Best Free VPN iPhone
    • Why Use a VPN?
    • NordVPN vs IPVanish
    • Private Internet Access Download
    • Best VPN for Streaming
      • TikTok VPN
    • VPN Porn
    • Computer Security Software – What You Really Need
  • Tutorials
  • ChatGPT
    • Does ChatGPT Save Data?
AskCyber Home » News » Government Cyber Security » Chinese Naikon APT Spying on Government Entities

Chinese Naikon APT Spying on Government Entities

2020-05-07 by Michelle Dvorak

Naikon APT

China-based Naikon APT Group Carrying Out Esionage on APAC Nations

An Advanced Persistent Threat (APT) Group, referred to as Naikon, is targeting APAC nations. In these attacks, the APT hackers focus on stealing valuable information from ministries of foreign affairs, science and technology offices, as well as government-owned companies. This is according to cyber security researchers at Check Point.

The cyber attack appears to be a multi-year campaign against government entities in APAC. It seemed that Naikon was inactive recently, but instead they have successfully conducted operations without detection for about five years.

The goal of the cyber attacks is to conduct espionage on Asia-Pacific countries to collect intelligence from target governments. The APT group steals documents and data from network devices. Its malware can log keystrokes and take screenshot from infected computers. It has also used to infected networks then pass malware onto more target organizations in other nations.

READ: Chinese Hackers Use News Sites to Install Malware On iPhones

“In one case, a foreign embassy unknowingly sent malware-infected documents to the government of its host country, showing how the hackers are exploiting trusted, known contacts and using those them to infiltrate new organizations and extend their espionage network,” Check Point said in their report.

The hackers registered domain names with GoDaddy and used Alibaba for web hosting the infrastructure. The attacks used Aria-body backdoor. Some of the capabilities of Aria-body remote access terminal (RAT) malware are:

  • Create and delete files and directories
  • Take screenshots
  • Search and launch files
  • Collect metadata from files
  • Close a TCP session
  • Collect operating system information

RAT malware is a type of malicious computer code that can allow a hacker to remote control a computer as if they were sitting at the keyboard.

Aria-body malware was used to attack the governments of Australia, Indonesia, the Philippines, Vietnam, Thailand, Myanmar and Brunei. RoyalRoad was used in some of the attacks to drop Aria-body,

APT Groups

An advanced persistent threat group is a nation-state sponsored hacking organization that works on behalf of a government. They carry out various attacks on other nations, political organizations, high-profile public figures, critical infrastructure, research intuitions, and financial institutions. In general, APT groups collect sensitive data, conduct espionage, and steal money to fund operations on behalf of their nation.

APT groups carry out their cyber attack using a low-and-slow strategy. Their campaigns may carry on for months or years, evading detection because they do not overwhelm a network with a suspicious amount of heavy activity.

Naikon has been carrying out cyber espionage against including Australia, Indonesia, Philippines, Vietnam, Thailand, Myanmar and Brunei. However, the group also has a history of cyber attacks against  Malaysia, Cambodia, Vietnam, Singapore, and Nepal

What is Naikon APT?

Naikon is an Advanced Persistent Threat Group attributed to China. In 2015, cyber security research firm Kaspersky Labs noted Naikon’s activity in a report. Then Naikon APT used a backdoor to compromise governmental organizations.

APT groups are assigned numbers as well as monikers by cyber security researchers so as not to offend the nations they operate in. Naikon is known as APT 30 or APT30. Their various monikers are Override Panda, Camerashy, APT.Naikon, Lotus Panda, and Hellsing.

Filed Under: Government Cyber Security Tagged With: China

About Michelle Dvorak

Michelle writes about cyber security, data privacy focusing on social media privacy as well as how to protect your IoT devices. She has worked in internet technology for over 20 years and owns METRONY, LLC. Michelle earned a B.S. in Engineering from Rensselaer Polytechnic Institute. Michelle published a guide to Cyber Security for Business Travelers


LinkedInTwitterFacebook

Primary Sidebar

Subscribe to Our Free Newsletter

We Don't Share or Sell Your Info

Web Browsers

Where Are My Saved Passwords in Chrome?

Google Removes 70 Malicious Browser Add-ons from Chrome Web Store

Firefox 75 Reports Your Browser Settings to Mozilla

Categories

Cyber Security Field Guide

Computer Security While TravelingGet Our Cyber Security Field Guide - Available on Amazon!

Recent Posts

Security Marketing Manager – Remote

Sr. Associate, Cybersecurity Architect – Pfizer

Strategic Customer Success Manager – Cybersecurity – Opportunity for Working Remotely

Top 20 Passwords Leaked on Dark Web

ISU Cybersecurity Leader Job Opening

Cyber Security News

Top 20 Passwords Leaked on Dark Web

… [Read More...] about Top 20 Passwords Leaked on Dark Web

Apple Warns of Actively Exploited Zero-Day Flaw

… [Read More...] about Apple Warns of Actively Exploited Zero-Day Flaw

IRS Stops Facial Recognition System for Online Access

… [Read More...] about IRS Stops Facial Recognition System for Online Access

National Cybersecurity Alliance Announces Data Privacy Week

… [Read More...] about National Cybersecurity Alliance Announces Data Privacy Week

More Cyber Security News

Tags

amazon Android Apple bitcoin China chrome CISA credit card DarkSide DHS DOJ Equifax Europe Facebook facial recognition FBI Firefox FTC games GDPR Google Government hacker identity theft India iPhone Iran IRS LinkedIn Microsoft North Korea PayPal phishing phishing email ransomware REvil Russia smartphone T-Mobile TikTok tutorial VPN WhatsApp WiFi Windows

Government

CBP Looks to Access Airline Passenger Data

FTC Releases Cyber Threat Video Playlist

Malware Found on US Government Funded Phones

UK NCA Reaches Out to Youth to Deter Cybercrimes

More Posts from this Category

Footer

Menu

  • Home
  • About
  • Authors
  • Newsletter Signup
  • PRIVACY POLICY

Search

Why Use a VPN?

NordVPN vs IPVanish VPN Review

NAVIGATION

  • Data Breaches
  • Data Privacy
  • Gamers
  • Scams
  • Malware

MEMBER NJCCIC

New Jersey Cybersecurity & Communications Integration Cell

STAY CONNECTED

  • Facebook
  • Instagram
  • Pinterest
  • YouTube
  • Twitter
  • RSS

Copyright © 2023 · AskCyberSecurity.com · METRONY, LLC

Go to mobile version