BrahMos WORLD INDIA MADHYA PRADESH BHOPAL SPORTS BUSINESS FUN FACTS ENTERTAINMENT LIFESTYLE TRAVEL ART & LITERATURE SCIENCE & TECHNOLOGY HEALTH EDUCATION DIASPORA WTN SPECIAL OPINION & INTERVIEW GOSSIP CORNER RECIPES DRINKS BIG MEMSAAB 2017 BUDGET 2017 FUNNY VIDEOS VIRAL ON WEB PICTURE STORIES
ABOUT US PRIVACY POLICY SITEMAP CONTACT US
logo

Breaking News

Travellers in India at data theft risk: FireEye

Friday - August 11, 2017 6:30 pm , Category : SCIENCE & TECHNOLOGY

San Francisco Aug 11 (IANS) A Russian hacking group "APT28" is targeting the hospitality sector globally and the Indian hotels and resorts must have strong Wi-Fi security in place to safeguard travellers data from being stolen a cyber security company said on Friday.



APT28 has already attacked travellers in hotels throughout Europe and the Middle East in a campaign that dates back to July this year according to the US-based company FireEye.

APT28 uses various hacking techniques such as "EternalBlue" and "Responder" sniffing passwords from Wi-Fi traffic.

"One of the most concerning aspects of this operation is the victims included hotel guests who didn t do anything wrong. They didn t click a malicious link or open an attachment they shouldn t have. They simply used the Internet over Wi-Fi in their hotels " Subhendu Sahu Acting Country Manager for India FireEye told IANS.

"Indian organisations should have strong security controls in place to detect attackers who compromise travelling employees systems and then follow them home like an unwanted souvenir " Sahu added.

FireEye has claimed to have found a malicious document named "Hotel_Reservation_Form.doc" sent in spear phishing emails to multiple companies in the hospitality industry including hotels in at least seven European countries and one Middle Eastern country.

APT28 used EternalBlue and Responder to spread laterally through networks and target travellers to steal usernames and hashed passwords.

According to FireEye APT28 in an incident in 2016 gained initial access to a victim s network via credentials likely stolen from the hotel Wi-Fi network and hacked the victim s Outlook Web Access (OWA) account.

Once inside the network of a hospitality company APT28 seeks machines that control both guest and internal Wi-Fi networks.

"Cyber espionage activity against the hospitality industry is typically focused on collecting information on or from hotel guests of interest rather than on the hotel industry itself though actors may also collect information on the hotel as a means of facilitating operations " FireEye said.

"Business and government personnel who are travelling often rely on systems to conduct business other than those at their home office and may be unfamiliar with threats posed while abroad " it added.

Travellers must be aware of the threats especially when in foreign countries and take extra precautions to secure their systems and data.

"Publicly accessible Wi-Fi networks present a significant threat and should be avoided whenever possible " FireEye warned.

There are also other hacking groups targeting travellers apart from APT28 including "South Korea-nexus Fallout Team" (also known as "Darkhotel") and "Duqu 2.0".

--IANS
sau/na/nir

RELATED NEWS