• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer
  • Jobs
  • Career
    • Cyber Security Training
    • Work from Home
    • Cyber Security Analyst
    • Remote Work – Six Ways to Keep Your Data Safe When Working Remotely
  • Field Guide
  • Newsletter Signup
  • Deals
  • News
AskCyberSecurity.com

AskCyberSecurity.com

Cyber Security News & Information

  • Home
  • Data Privacy
    • Gamers
    • Government Cyber Security
      • Legislation
      • Standards
        • What are the risks of computer security?
        • Medical Cyber Security
    • Social Media
  • Security
    • Data Breaches
    • Scams
      • Identity theft
    • Malware
      • Ransomware
  • Software
    • Apps
    • Web Browsers
  • Glossary
    • Cyber Security Acronyms
  • About Ask Cyber Security
    • Authors
    • Contact Us
  • VPN
    • How Do I Know If My VPN is Working?
    • Best Free VPN iPhone
    • Why Use a VPN?
    • NordVPN vs IPVanish
    • Private Internet Access Download
    • Best VPN for Streaming
      • TikTok VPN
    • VPN Porn
    • Computer Security Software – What You Really Need
  • Tutorials
AskCyber Home » News » Government Cyber Security » Chinese Naikon APT Spying on Government Entities

Chinese Naikon APT Spying on Government Entities

2020-05-07 by Michelle Dvorak

Naikon APT

China-based Naikon APT Group Carrying Out Esionage on APAC Nations

An Advanced Persistent Threat (APT) Group, referred to as Naikon, is targeting APAC nations. In these attacks, the APT hackers focus on stealing valuable information from ministries of foreign affairs, science and technology offices, as well as government-owned companies. This is according to cyber security researchers at Check Point.

The cyber attack appears to be a multi-year campaign against government entities in APAC. It seemed that Naikon was inactive recently, but instead they have successfully conducted operations without detection for about five years.

The goal of the cyber attacks is to conduct espionage on Asia-Pacific countries to collect intelligence from target governments. The APT group steals documents and data from network devices. Its malware can log keystrokes and take screenshot from infected computers. It has also used to infected networks then pass malware onto more target organizations in other nations.

READ: Chinese Hackers Use News Sites to Install Malware On iPhones

“In one case, a foreign embassy unknowingly sent malware-infected documents to the government of its host country, showing how the hackers are exploiting trusted, known contacts and using those them to infiltrate new organizations and extend their espionage network,” Check Point said in their report.

The hackers registered domain names with GoDaddy and used Alibaba for web hosting the infrastructure. The attacks used Aria-body backdoor. Some of the capabilities of Aria-body remote access terminal (RAT) malware are:

  • Create and delete files and directories
  • Take screenshots
  • Search and launch files
  • Collect metadata from files
  • Close a TCP session
  • Collect operating system information

RAT malware is a type of malicious computer code that can allow a hacker to remote control a computer as if they were sitting at the keyboard.

Aria-body malware was used to attack the governments of Australia, Indonesia, the Philippines, Vietnam, Thailand, Myanmar and Brunei. RoyalRoad was used in some of the attacks to drop Aria-body,

APT Groups

An advanced persistent threat group is a nation-state sponsored hacking organization that works on behalf of a government. They carry out various attacks on other nations, political organizations, high-profile public figures, critical infrastructure, research intuitions, and financial institutions. In general, APT groups collect sensitive data, conduct espionage, and steal money to fund operations on behalf of their nation.

APT groups carry out their cyber attack using a low-and-slow strategy. Their campaigns may carry on for months or years, evading detection because they do not overwhelm a network with a suspicious amount of heavy activity.

Naikon has been carrying out cyber espionage against including Australia, Indonesia, Philippines, Vietnam, Thailand, Myanmar and Brunei. However, the group also has a history of cyber attacks against  Malaysia, Cambodia, Vietnam, Singapore, and Nepal

What is Naikon APT?

Naikon is an Advanced Persistent Threat Group attributed to China. In 2015, cyber security research firm Kaspersky Labs noted Naikon’s activity in a report. Then Naikon APT used a backdoor to compromise governmental organizations.

APT groups are assigned numbers as well as monikers by cyber security researchers so as not to offend the nations they operate in. Naikon is known as APT 30 or APT30. Their various monikers are Override Panda, Camerashy, APT.Naikon, Lotus Panda, and Hellsing.

Filed Under: Government Cyber Security Tagged With: China

About Michelle Dvorak

Michelle writes about cyber security, data privacy focusing on social media privacy as well as how to protect your IoT devices. She has worked in internet technology for over 20 years and owns METRONY, LLC. Michelle earned a B.S. in Engineering from Rensselaer Polytechnic Institute. Michelle published a guide to Cyber Security for Business Travelers


LinkedInTwitterFacebook

Primary Sidebar

Subscribe to Our Free Newsletter

We Don't Share or Sell Your Info

Web Browsers

Where Are My Saved Passwords in Chrome?

Google Removes 70 Malicious Browser Add-ons from Chrome Web Store

Firefox 75 Reports Your Browser Settings to Mozilla

511 Tactical

WHAT TO SHOP NOW

Shop

Safeguard Your Money with a VPN

Beat the Stock Market! - Get Rule Breakers!

Malwarebytes Anti-Virus is On Sale!

Shop Kaspersky Anti-Virus

Cyber Security Field Guide

Computer Security While TravelingGet Our Cyber Security Field Guide - Available on Amazon!

Recent Posts

Feds Warn of Microsoft Defender Security Bug

New and Noteworthy Security and IT Courses

Classiscam Telegram Phishing Scam Targeting Europeans

Niantic Wins Game Cheat Lawsuit

Principal Security Consultant – AWS – NY

Categories

Cyber Security News

Classiscam Telegram Phishing Scam Targeting Europeans

… [Read More...] about Classiscam Telegram Phishing Scam Targeting Europeans

Niantic Wins Game Cheat Lawsuit

… [Read More...] about Niantic Wins Game Cheat Lawsuit

Reserve Bank of New Zealand Reports Data Breach

… [Read More...] about Reserve Bank of New Zealand Reports Data Breach

Security Bug Exposed 100K UN Employee Records

… [Read More...] about Security Bug Exposed 100K UN Employee Records

More Cyber Security News

Tags

amazon Android Apple bitcoin Career China chrome CISA credit card Cyber Attack Cyber security Data Breach data privacy DHS Equifax Facebook FBI Firefox FTC games GDPR Google Government hack hacker identity theft iPhone Iran IRS malware Microsoft North Korea PayPal phishing phishing email ransomware Russia scam smartphone TikTok tutorial VPN web browser WhatsApp WiFi

Government

FTC Releases Cyber Threat Video Playlist

Malware Found on US Government Funded Phones

UK NCA Reaches Out to Youth to Deter Cybercrimes

Texas DOT Hit by Ransomware Attack

More Posts from this Category

Footer

Menu

  • Home
  • About
  • Authors
  • News
  • Newsletter Signup
  • PRIVACY POLICY

Search

Why Use a VPN?

NordVPN vs IPVanish VPN Review

NAVIGATION

  • Data Breaches
  • Data Privacy
  • Gamers
  • Scams
  • Malware

MEMBER NJCCIC

New Jersey Cybersecurity & Communications Integration Cell

STAY CONNECTED

  • Facebook
  • Instagram
  • Pinterest
  • YouTube
  • Twitter
  • RSS

Copyright © 2021 · AskCyberSecurity.com · METRONY, LLC

Go to mobile version