Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India

Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

- shutterstock pakistan passport - If you’d rather cyber-scoundrels didn’t know the contents of your comp, don’t apply for a Pakistani passport –

Credits: The Register

A Pakistani government website was compromised with a keylogger and other malware that hoovered up a whole host of information about people checking on their passport application status.

Researchers from Trustwave discovered that the Scanbox JavaScript framework was running on the site.

The keylogger scooped up users’ login details for the compromised site, while Scanbox fingerprinted the user’s browser and collected details of programs installed on the machine used to sign in. It also hunted for 77 common anti-malware packages, beaming back details of its findings to the attackers’ command-and-control servers.

The user’s IP address, the referring site, operating system, user-agent string and installed browser plugins were all collected. The compromised site is at hxxp://gdip.gov.pk (do NOT visit this link!).

Trustwave’s Ziv Mador told The Register his firm discovered the breach after noticing unusual things cropping up in telemetry data. He said: “Its appearance on the website is very minimal. Apart from the link [to the Scanbox payload server] there is no other sign of compromise.”

Scanbox previously cropped up in infosec firm FireEye’s research, dating back to at least 201. That company described it as an APT tool.

Highlighting how this malware campaign differs from the usual get-rich-quick scams set up by lower-level cybercrooks, Mador said: “We can say that the most common purpose [of malware criminals] is fundamentally driven by … things that generate revenue. Here it’s different: they didn’t try to any malware.”

Describing the miscreants as “probably a sophisticated team”, Mador speculated that their intent was to “infect with further malware”, using the information slurped by Scanbox to precisely craft nasties that worked around known anti-malware suites installed on target devices.

“We contacted the Pakistani government site regarding this infection, but as of the time of publishing this blog post have received no response and the site remains compromised,” shrugged Trustwave. While the command-and-control server went dormant shortly after the threat research firm started poking around, there is no guarantee that the operators will not reactive it again.

The timing of the attack is of interest in the wider political context. Trustwave first spotted the infection on 2 March, shortly after tensions between India and Pakistan flared up into military action. While Trustwave did not have any information to indicate who was behind the infection, Mador told El Reg: “Given it’s a passport website, it’s quite likely [the infection] was politically motivated. About one-third to one-quarter [of those Trustwave observed using the site after spotting the compromise] are people living outside Pakistan. Maybe they’re travelling into Pakistan. Someone has an interest in monitoring this.”

Last year the Pakistani Air Force was targeted by a state-sponsored group in a campaign dubbed Operation Shaheen, while previous researchers noticed that cyber-sniping between the two countries tends to peak around national holidays and sports fixtures between the two.

- logo16 - If you’d rather cyber-scoundrels didn’t know the contents of your comp, don’t apply for a Pakistani passport –

www.extremehacking.org

Sadik Shaikh | Cyber Suraksha Abhiyan, Ethical Hacking Training Institute, CEHv10,CHFI,ECSAv10,CAST,ENSA, CCNA, CCNA SECURITY,MCITP,RHCE,CHECKPOINT, ASA FIREWALL,VMWARE,CLOUD,ANDROID,IPHONE,NETWORKING HARDWARE,TRAINING INSTITUTE IN PUNE, Certified Ethical Hacking,Center For Advanced Security Training in India, ceh v10 course in Pune-India, ceh certification in pune-India, ceh v10 training in Pune-India, Ethical Hacking Course in Pune-India



Source link

No tags for this post.

LEAVE A REPLY

Please enter your comment!
Please enter your name here