ADVERTISEMENT
TechEconomy
Saturday, June 7, 2025
No Result
View All Result
Advertisement
ADVERTISEMENT
  • News
  • Tech
    • DisruptiveTECH
    • ConsumerTech
      • Accessories
      • Phones
      • Laptop
      • Gadgets and Appliances
      • Apps
    • How To
    • TechTAINMENT
  • Business
    • Telecoms
      • Broadband
    • Mobility
    • Environment
    • Travel
    • Commerce
    • StartUPs
    • TE Insights
    • Security
  • Partners
  • Economy
    • Finance
    • Fintech
    • Digital Assets
    • Personal Finance
    • Insurance
  • Features
    • IndustryINFLUENCERS
    • Guest Writer
    • Appointment
    • EventDIARY
    • Editorial
  • Apply
  • TecheconomyTV
  • Techeconomy Events
  • BusinesSENSE For SMEs
  • TBS
  • News
  • Tech
    • DisruptiveTECH
    • ConsumerTech
      • Accessories
      • Phones
      • Laptop
      • Gadgets and Appliances
      • Apps
    • How To
    • TechTAINMENT
  • Business
    • Telecoms
      • Broadband
    • Mobility
    • Environment
    • Travel
    • Commerce
    • StartUPs
    • TE Insights
    • Security
  • Partners
  • Economy
    • Finance
    • Fintech
    • Digital Assets
    • Personal Finance
    • Insurance
  • Features
    • IndustryINFLUENCERS
    • Guest Writer
    • Appointment
    • EventDIARY
    • Editorial
  • Apply
  • TecheconomyTV
  • Techeconomy Events
  • BusinesSENSE For SMEs
  • TBS
No Result
View All Result
Tech | Business | Economy
No Result
View All Result
Podcast

Home » How APT Group Uses ShadowPad Backdoor and MS Exchange Vulnerability to attack Companies

How APT Group Uses ShadowPad Backdoor and MS Exchange Vulnerability to attack Companies

Techeconomy by Techeconomy
June 28, 2022
in Security
0

RelatedPosts

Why Nigeria Must Embrace AI-Powered Cybersecurity Now

Why Nigeria Must Embrace AI-Powered Cybersecurity Now

June 5, 2025

Sophos Updates its Firewall Software to Enhance Protection, Incident Response Capabilities

June 5, 2025
UBA
Advertisements

In mid-October 2021, Kaspersky ICS CERT discovered a previously unknown Chinese-speaking threat actor attacking telecommunications, manufacturing, and transport organisations in several Asian countries.

During the initial attacks, the group exploited MS Exchange vulnerability to deploy ShadowPad malware and infiltrated building automation systems of one of the victims.

A building automation system (BAS) connects all the functions inside the building – from electricity and heating to fire and security – and is managed from one control center.

Once a BAS is compromised, all processes within that organisation are at risk, including those relating to information security.

The experts at Kaspersky ICS CERT witnessed attacks on organisations in Pakistan, Afghanistan, and Malaysia in industrial and telecommunications sector.

The attacks had a unique set of tactics, techniques, and procedures (TTPs), which led the experts to believe that the same Chinese-speaking threat actor was behind all of these observed attacks.

Their attention was particularly drawn to the actor’s use of engineering computers in building automation systems, belonging to the companies’ infrastructures, as the point of infiltration – that is unusual for APT groups.

By taking control over those systems, the attacker can reach other, even more sensitive systems of the attacked organisation.

As the investigation showed, the main tool of the APT group is ShadowPad backdoor. Kaspersky has been witnessing this malware being used by various Chinese-speaking APT actors.

During the attacks of the observed actor, the ShadowPad backdoor was downloaded onto the attacked computers under the guise of legitimate software.

In many cases the attacking group exploited a known vulnerability in MS Exchange, and entered the commands manually, that indicates the highly targeted nature of their campaigns.

“The building automation systems are rare targets for advanced threat actors. However, those systems can be a valuable source of highly confidential information and may provide the attackers with a backdoor to other, more secured, areas of infrastructures. Since these attacks develop extremely rapidly, they must be detected and mitigated during their very early stages. Thus, our advice is to constantly monitor the mentioned systems, especially in critical sectors,” comments Kirill Kruglov, security expert at Kaspersky ICS CERT.  

Learn more about the attacks through building automation systems on Kaspersky’s ICS CERT website.

To keep your OT computers protected from various threats, Kaspersky experts recommend:

· Regularly updating operating systems and any application software that are part of the enterprise’s network. Apply security fixes and patches to OT network equipment as soon as they are available.

· Conducting regular security audits of OT systems to identify and eliminate possible vulnerabilities.

· Using OT network traffic monitoring, analysis and detection solutions for better protection from attacks that potentially threaten OT systems and main enterprise assets.

· Providing dedicated OT security training for IT security teams and OT engineers. This is crucial to improve response to new and advanced malicious techniques.

· Providing the security team responsible for protecting industrial control systems with up-to-date threat intelligence. ICS Threat Intelligence Reporting service provides insights into current threats and attack vectors, as well as the most vulnerable elements in OT and how to mitigate them.

· Using security solutions for OT endpoints and networks such as Kaspersky Industrial CyberSecurity to ensure comprehensive protection for all critical systems.

· Protect the IT infrastructure. Integrated Endpoint Security protects corporate endpoints and enables automated threat detection and response capabilities.

Loading

Advertisements
MTN ADS

Author

  • Techeconomy
    Techeconomy

    View all posts
0Shares
Tags: building automation systemKaspersky ICS CERTMS Exchange vulnerabilityShadowPad malware
Previous Post

Clear Vision Underground: The Changing Role of Surveillance in Mining

Next Post

Build Your Brand with HUAWEI Ads

Techeconomy

Techeconomy

Related Posts

Why Nigeria Must Embrace AI-Powered Cybersecurity Now
Security

Why Nigeria Must Embrace AI-Powered Cybersecurity Now

by Techeconomy
June 5, 2025
0

As someone who recently analyzed TSAN’s performance on industry-standard datasets like NSL-KDD, I found that it consistently outperformed older detection...

Read more
Sophos Launches New XGS Series of Desktop Firewalls

Sophos Updates its Firewall Software to Enhance Protection, Incident Response Capabilities

June 5, 2025
Aminu Maida and Judiciary | Cybersecurity Framework

NCC Unveils Cybersecurity Framework to Strengthen Nigeria’s Digital Space

June 5, 2025
Phishing, vishing, and smishing attacks

How to Spot Phishing, Vishing and Smishing

June 4, 2025
SMS Scams on the rise

SMS Scams Surge 73% | Data Finds Key Trends

June 2, 2025
IHS Nigeria and Tower sites security

IHS Nigeria Commissions 65 Patrol Vehicles to Enhance Telecoms Tower Site Security

June 2, 2025
Next Post

Build Your Brand with HUAWEI Ads

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

I agree to the Terms & Conditions and Privacy Policy.

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Techeconomy Podcast

Techeconomy Podcast
Techeconomy Podcast

Infowave is brought to you by TechEconomy. Every week we will bring new stories from startups and influencers who are shaping and changing the world we live in. We’ll also bring you reports on topics you should know.

Follow us @techeconomyng for more.

TECH TALK EPISODE 2
byTecheconomy

PRODUCTIVITY AND WORK-Life Balance

TECH TALK EPISODE 2
TECH TALK EPISODE 2
May 22, 2025
Techeconomy
CYBERSECURITY ESSENTIALS
April 24, 2025
Techeconomy
Digital Marketing Trends and strategies for 2025 and beyond
February 27, 2025
Techeconomy
Major Lesson for Techies in 2024 and Projections for 2025
December 6, 2024
Techeconomy
Major Lessons for Techies in an AI-Driven World | Techeconomy Business Series Highlights
November 26, 2024
Techeconomy
Maximizing Profitability Through Seasonal Sales: Strategies For Success
November 8, 2024
Techeconomy
Techeconomy Business Series
October 15, 2024
Techeconomy
PRIVACY IN THE ERA OF AI: GETTING YOUR BUSINESS READY
May 30, 2024
Techeconomy
Unravel the Secrets of Marketing Everywhere All At Once with Isaac Akanni from Infobip | Infowave Podcast Episode 1
February 9, 2024
Techeconomy
The Role of Ed-tech in Life Long Learning and Continuous Education
October 19, 2023
Techeconomy
Search Results placeholder

WHAT IS TRENDING

https://www.youtube.com/watch?v=g_MCUwS2woc&list=PL6bbK-xx1KbIgX-IzYdqISXq1pUsuA4dz

Follow Us

  • About Us
  • Contact Us
  • Careers
  • Privacy Policy

© 2025 Techeconomy - Designed by Opimedia.

No Result
View All Result
  • News
  • Tech
    • DisruptiveTECH
    • ConsumerTech
      • Accessories
      • Phones
      • Laptop
      • Gadgets and Appliances
      • Apps
    • How To
    • TechTAINMENT
  • Business
    • Telecoms
      • Broadband
    • Mobility
    • Environment
    • Travel
    • Commerce
    • StartUPs
    • TE Insights
    • Security
  • Partners
  • Economy
    • Finance
    • Fintech
    • Digital Assets
    • Personal Finance
    • Insurance
  • Features
    • IndustryINFLUENCERS
    • Guest Writer
    • Appointment
    • EventDIARY
    • Editorial
  • Apply
  • TecheconomyTV
  • Techeconomy Events
  • BusinesSENSE For SMEs
  • TBS

© 2025 Techeconomy - Designed by Opimedia.

Translate »
This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.