Digital Edition

SYS-CON.TV
UK Targeted for Trojan Attacks
British Government Agency Issues Warning About Attacks from Asia

The UK's National Infrastructure Security Co-Ordination Centre (NISCC) has issued a warning about a series of trojan attacks that go after British government agencies and companies, and which seem to emanating from "the Far East."

The attackers' goal appears to be "covert gathering and
transmitting of commercially or economically valuable information," the NISCC says. The e-mails include spoofed sender addresses "and information relevant to the recipient’s job or interests to entice them into opening the documents, the agency says.

Anti-virus software and firewall will not completely protect users from these attacks, as these trojans can use common ports such as HTTP, DNS, and SSL, and can also be modified to avoid anti-virus detection.


"An infected computer is under the control of the attacker and can be directed to carry out any function normally only available to the system owner, and trojans often communicate back to the attackers using standard application ports (for example TCP port 80, used for web traffic), making it very difficult to detect the data they send and receive amongst legitimate network traffic," the agnecy has warned.

The agency is working with other agencies worldwide to find and "neutralize" IP addresses that are known sources for the attacks. Meanwhile, it urges users to be vigilant in their detection and to follow a "current advice document" that it has posted, to be found at:

www.niscc.gov.uk/niscc/docs/currentAdvice.pdf


 


About Security News Desk
SYS-CON's Security News desk trawls the world of security for news of software, hardware, products, and services that seems likely to be of interest to infosec professionals and summarizes them for easy assimilation by busy IT managers and staff.



ADS BY GOOGLE
Subscribe to the World's Most Powerful Newsletters

ADS BY GOOGLE

ChatOps is an emerging topic that has led to the wide availability of integrations between group cha...
As DevOps methodologies expand their reach across the enterprise, organizations face the daunting ch...
As Marc Andreessen says software is eating the world. Everything is rapidly moving toward being soft...
You know you need the cloud, but you’re hesitant to simply dump everything at Amazon since you know ...
Is advanced scheduling in Kubernetes achievable?Yes, however, how do you properly accommodate every ...
The cloud era has reached the stage where it is no longer a question of whether a company should mig...
The need for greater agility and scalability necessitated the digital transformation in the form of ...
In his keynote at 18th Cloud Expo, Andrew Keys, Co-Founder of ConsenSys Enterprise, provided an over...
Coca-Cola’s Google powered digital signage system lays the groundwork for a more valuable connection...
In his session at 21st Cloud Expo, Raju Shreewastava, founder of Big Data Trunk, provided a fun and ...
While some developers care passionately about how data centers and clouds are architected, for most,...
"Since we launched LinuxONE we learned a lot from our customers. More than anything what they respon...
DevOps is under attack because developers don’t want to mess with infrastructure. They will happily ...
"As we've gone out into the public cloud we've seen that over time we may have lost a few things - w...
In his session at 21st Cloud Expo, Michael Burley, a Senior Business Development Executive in IT Ser...
Sanjeev Sharma Joins June 5-7, 2018 @DevOpsSummit at @Cloud Expo New York Faculty. Sanjeev Sharma is...
We are given a desktop platform with Java 8 or Java 9 installed and seek to find a way to deploy hig...
"I focus on what we are calling CAST Highlight, which is our SaaS application portfolio analysis too...
"Cloud4U builds software services that help people build DevOps platforms for cloud-based software a...
The question before companies today is not whether to become intelligent, it’s a question of how and...