APT28 has already attacked travelers in hotels throughout Europe and the Middle East in a campaign that dates back to July this year, according to the US-based company FireEye. APT28 uses various hacking techniques, such as "EternalBlue" and "Responder" sniffing passwords from Wi-Fi traffic.
"One of the most concerning aspects of this operation is the victims included hotel guests who didn't do anything wrong. They didn't click a malicious link or open an attachment they shouldn't have. They simply used the Internet over Wi-Fi in their hotels", Subhendu Sahu, Acting Country Manager for India, FireEye, told IANS.
"Indian organizations should have strong security controls in place to detect attackers who compromise traveling employees' systems and then follow them home like an unwanted souvenir", Sahu added.
FireEye has claimed to have found a malicious document named "Hotel_Reservation_Form.doc", sent in spear phishing emails to multiple companies in the hospitality industry, including hotels in at least seven European countries and one Middle Eastern country.
APT28 used EternalBlue and Responder to spread laterally through networks and target travelers to steal usernames and hashed passwords. According to FireEye, APT28, in an incident in 2016, gained initial access to a victim's network via credentials likely stolen from the hotel Wi-Fi network and hacked the victim's Outlook Web Access (OWA) account. Once inside the network of a hospitality company, APT28 seeks machines that control both guest and internal Wi-Fi networks.
"Cyber espionage activity against the hospitality industry is typically focused on collecting information on or from hotel guests of interest rather than on the hotel industry itself, though actors may also collect information on the hotel as a means of facilitating operations", FireEye said. "Business and government personnel who are traveling often rely on systems to conduct business other than those at their home office, and may be unfamiliar with threats posed while abroad", it added.
Travelers must be aware of the threats especially when in foreign countries and take extra precautions to secure their systems and data. "Publicly accessible Wi-Fi networks present a significant threat and should be avoided whenever possible", FireEye warned.
There are also other hacking groups targeting travelers apart from APT28, including "South Korea-nexus Fallout Team" and "Duqu 2.0".
News Source: TECH2Last modified on Tuesday, 26 September 2017