Engineering:DarkHotel

From HandWiki
Revision as of 09:10, 22 October 2022 by John Stpola (talk | contribs) (link)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Dark Hotel
Common nameDarkHotel
Technical name
AliasesTapaoux
TypeAPT
Point of originSouth Korea

DarkHotel (or Darkhotel) is a targeted spear-phishing spyware and malware-spreading campaign that appears to be selectively attacking business hotel visitors through the hotel's in-house WiFi network. It is characterized by Kaspersky Lab as an advanced persistent threat.[3][4]

The attacks are specifically targeted at senior company executives,[5] using forged digital certificates, generated by factoring the underlying weak public keys of real certificates, to convince victims that prompted software downloads are valid.[6]

Uploading malicious code to hotel servers, attackers are able to target specific users who are guests at luxury hotels primarily in Asia and the United States . Zetter (2014) explains that the group, dubbed DarkHotel or Tapaoux, has also been actively infecting users through spear-phishing and Peer-to-Peer networks since 2007 and using those attacks to load key logging and reverse engineering tools onto infected endpoints.[7]

Targets are aimed primarily at executives in investments and development, government agencies, defense industries, electronic manufacturers and energy policy makers.[8] Many victims have been located in Korea, China , Russia and Japan .[9]

Once attackers are in the victim's computer(s), sensitive information such as passwords and intellectual property are quickly stolen before attackers erase their tools in hopes of not getting caught in order to keep the high level victims from resetting all of the passwords for their accounts.[10]

In July 2017 Bitdefender published new research about Inexsmar,[11] another version of the DarkHotel malware, which was used to target political figures instead of business targets.

References

  1. "Detailed Analysis - Troj/Tapaoux-AD - Viruses and Spyware - Advanced Network Threat Protection | ATP from Targeted Malware Attacks and Persistent Threats | sophos.com - Threat Center". https://www.sophos.com/en-us/threat-center/threat-analyses/viruses-and-spyware/Troj~Tapaoux-AD/detailed-analysis.aspx. 
  2. "Trojan.Tapaoux | Symantec". https://www.symantec.com/security-center/writeup/2011-111518-0144-99. 
  3. "The Darkhotel APT: A Story of Unusual Hospitality". Kaspersky Labs. November 10, 2014. https://securelist.com/blog/research/66779/the-darkhotel-apt/. 
  4. Carly Page (November 10, 2014). "Darkhotel malware is targeting travelling execs via hotel WiFi". The Inquirer. http://www.theinquirer.net/inquirer/news/2380394/darkhotel-malware-is-targeting-travelling-execs-via-hotel-wifi. 
  5. Leo Kelion (2014-11-11). "DarkHotel hackers targets company bosses in hotel rooms". BBC News. https://www.bbc.co.uk/news/technology-30001424. 
  6. Dan Goodin (2014-11-10). ""DarkHotel" uses bogus crypto certificates to snare Wi-Fi-connected execs". Ars Technica. https://arstechnica.com/security/2014/11/darkhotel-uses-bogus-crypto-certificates-to-snare-wi-fi-connected-execs/. 
  7. Zetter, Kim. "DarkHotel: A Sophisticated New Hacking Attack Targets High-Profile Hotel Guests". Wired. https://www.wired.com/2014/11/darkhotel-malware/. Retrieved 6 June 2017. 
  8. Kovacs, Eduard. "Darkhotel APT Uses Hacking Team Exploit to Target Specific Systems". http://www.securityweek.com/darkhotel-apt-uses-hacking-team-exploit-target-specific-systems. 
  9. "'DarkHotel' Hacks Target Business Travelers: Report". http://www.nbcnews.com/tech/security/dark-hotel-hacks-target-business-travelers-report-n245266. 
  10. "DarkHotel- a spy campaign in Luxury hotels". Techplus Media Pvt. Ltd. IT Var News. 28 Nov 2014. 
  11. "Inexsmar: An unusual DarkHotel campaign". https://labs.bitdefender.com/2017/07/inexsmar-an-unusual-darkhotel-campaign/.