Cyberspies target APAC execs in luxury hotels

Cyberspies target APAC execs in luxury hotels

"Darkhotel" is used for for stealing sensitive data from selected corporate executives

Hackers are targeting travelling corporate executives during their stays at luxury hotels through an espionage campaign known as "Darkhotel".

The campaign, which has been lurking for at least four years according to Kaspersky and is still active, is used for used for stealing sensitive data from selected corporate executives.

The group rarely hits the same target twice and performs operations with precision, obtaining all the valuable data they can from first contact, deleting traces of their work and melting into the background to await the next high profile individual.

The most recent travelling targets include top executives from the US and Asia doing business and investing in the APAC region; with chief executives, senior vice presidents, sales and marketing directors, and top research and development staff targeted.

Kaspersky Lab principal security researcher, Kurt Baumgartner, said, for the past few years, Darkhotel had performed a number of successful attacks against high-profile individuals, employing methods and techniques that went well beyond typical cyber criminal behaviour.

"This threat has operational competence, mathematical and crypto-analytical offensive capabilities, and other resources that are sufficient to abuse trusted commercial networks and target specific victim categories with strategic precision,” he said.

The Darkhotel maintains an effective intrusion set on hotel networks, providing ample access over the years to systems that were believed to be private and secure.

The attackers wait until after check-in when the victim connects to the hotel Wi-Fi network, submitting their room number and surname at login.

Once the user is in the compromised network, embedded frames located within the login portals of the hotels are used to prompt them to download and install a back door that poses as one of several major software releases, including Google Toolbar, Adobe Flash and Windows Messenger.

The unsuspecting executive downloads this hotel ‘welcome package’, only to infect his machine with a back door - Darkhotel’s spying software.

Once on a system, the back door is used to further download more advanced stealing tools: a digitally-signed advanced key logger, the Trojan ‘Karba’ and an information-stealing module.

These tools collect data about the system and the anti-malware software installed on it, stealing all keystrokes, and hunting for private information, including cached passwords and login credentials.

Victims are targeted for sensitive information and confidential data - likely the intellectual property of the business entities they represent.

After the operation, the attackers carefully delete their tools from the hotel network and go back into hiding.

This campaign is unusual in that its malicious activity can be indiscriminate in its spread of malware.

Alongside its highly targeted attacks, the attackers use spear-phishing e-mails deploying zero-day exploits to infiltrate organisations from different sectors.

These include defence industrial base, government and non-governmental Organisations.

At the other end of the spectrum, malware can be spread indiscriminately via Japanese P2P (peer-to-peer) file-sharing sites.

The malware is delivered as part of a large RAR archive that purports to offer sexual content, but installs a backdoor Trojan that allows attackers to perform a mass surveillance campaign. This Darkhotel package was downloaded over 30,000 times in less than six months.

Baumgartner said the mix of both targeted and indiscriminate attacks was becoming more and more common in the APT scene, where targeted attacks are used to compromise high profile victims, and botnet-style operations are used for mass surveillance or performing other tasks such as DDoSing hostile parties or simply upgrading interesting victims to more sophisticated espionage tools.

According to Kaspersky, the attackers left a footprint in a string within their malicious code pointing to a Korean-speaking actor.

Read more: Hands-on with the world’s lightest gaming laptop

The campaign has targeted thousands of victims worldwide, with 90 per cent of identified infections in Japan, Taiwan, China, Russia and Hong Kong, alongside smaller infection rates from victims in Germany, the USA, Indonesia, India, and Ireland.

To reduce vulnerability to attacks When traveling, any network, even semi-private ones in hotels, should be viewed as potentially dangerous.

You should choose a Virtual Private Network (VPN) provider – you will get an encrypted communication channel when accessing public or semi-public Wi-Fi.

Always regard software updates as suspicious. Confirm that the proposed update installer is signed by the appropriate vendor.

Make sure your Internet security solution includes proactive defence against new threats rather than just basic antivirus protection.

Use two-factor authentication for e-mail and other confidential services.

Further, use strong, unique passwords for each resource you access.

Follow Us

Join the newsletter!


Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.

Tags Chinaadobe flashtaiwanJapan‘Karba’Russia and Hong KongKasperky Lab principal security researcherGoogle ToolbarWindows MessengerKurt Baumgartner

Show Comments