‘NetTraveler’ Cyberespionage Campaign Uncovered

An intrstuing  article from Dark Reading:

A less sophisticated but long-running cyberspying program out of China aimed at high-profile targets in government, embassies, oil and gas, military contractors, activists, and universities has infected hundreds of targets across 40 nations.

The so-called NetTraveler campaign revealed today by Kaspersky Lab comes from a midsize APT group out of China that has some 50 members and who also have used other malware including Zegost (from Gh0stNet), Saker, and other APT-related tools. That doesn’t mean the same group is behind Gh0stNet or other campaigns, however: “The groups and their activities are large, complex and in many ways separate, and we are simply saying that there are inter-relations in the dataset,” said Kurt Baumgartner, senior security researcher for the Americas on the Global Research and Analysis Team at Kaspersky Lab, in an email interview. “This group’s connections with a handful of other groups is both operational and shares infrastructure.”

To read more click here: 

Be the first to comment

Leave a Reply

Your email address will not be published.


*


error: Content is protected !!