Posted on 04/12/2015 7:32:42 PM PDT by BenLurkin
An otherwise unremarkable hacking group likely aligned with China appears to be one of the first to have targeted so-called air-gapped networks that are not directly connected to the Internet, according to FireEye.
The computer security firm released a 69-page technical report on Sunday on the group, which it calls APT (Advanced Persistent Threat) 30, which targeted organizations in southeast Asia and India.
FireEye picked up on it after some of the malware used by the group was found to have infected defense-related clients in the U.S., said Jen Weedon, manager of strategic analysis with FireEye.
APT 30 has operated since at least 2005. It has targeted people through spear phishing, or sending emails containing malicious attachments or harmful links.
The group has consistently updated its malware, but the tools it uses are generally not that sophisticated, and it has used some of the same command-and-control infrastructure for years on end.
It seems to be theyve been successful in being good enough, Weedon said Sunday.
(Excerpt) Read more at pcworld.com ...
Wow! To see hacks like this is always amazing.
I’ve heard of a virus communicating with other locally infected machines by high frequency sound out of the human range; seems so impractical but apparently stuff like that does work.
networks not connected to the Internet?
that might be what is needed for us to have real information as the Obama dictator is getting his FCC gestapo to ruin the Internet with Soros’s net neutrality regulations
bookmark
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.