TechEconomy
  • About
  • Privacy Policy
  • Careers
  • Manage Subscriptions
Sunday, October 1, 2023
Advertisement
  • News
  • Tech
    • DisruptiveTECH
    • ConsumerTech
      • Accessories
      • Phones
      • Laptop
      • Apps
      • Gadgets and Appliances
    • How To
    • TechTAINMENT
  • Business
    • Telecoms
      • Broadband
    • Mobility
    • Environment
    • Travel
    • Commerce
    • StartUPs
    • TE Insights
    • Security
  • Partners
  • Economy
    • Finance
    • Fintech
    • Digital Assets
    • Personal Finance
    • Insurance
  • Features
    • IndustryINFLUENCERS
    • Guest Writer
    • Appointment
    • EventDIARY
    • Editorial
  • Podcast
  • TECHECONOMY TV
No Result
View All Result
  • News
  • Tech
    • DisruptiveTECH
    • ConsumerTech
      • Accessories
      • Phones
      • Laptop
      • Apps
      • Gadgets and Appliances
    • How To
    • TechTAINMENT
  • Business
    • Telecoms
      • Broadband
    • Mobility
    • Environment
    • Travel
    • Commerce
    • StartUPs
    • TE Insights
    • Security
  • Partners
  • Economy
    • Finance
    • Fintech
    • Digital Assets
    • Personal Finance
    • Insurance
  • Features
    • IndustryINFLUENCERS
    • Guest Writer
    • Appointment
    • EventDIARY
    • Editorial
  • Podcast
  • TECHECONOMY TV
No Result
View All Result
Tech | Business | Economy
No Result
View All Result

Home » NaiveCopy; Highly Active Cyber Threat Targeting Cryptocurrency Industry

NaiveCopy; Highly Active Cyber Threat Targeting Cryptocurrency Industry

Techeconomy by Techeconomy
August 2, 2022
in Security
1
Sifax
Advertisements

In the second quarter of 2022, Kaspersky researchers witnessed Advanced Persistent Threat (APT) actors increasingly targeting the cryptocurrency industry.

Using cryptocurrency-related content and warnings from law enforcements as bait, the actor behind this new and highly active campaign, dubbed “NaiveCopy”, attacked stock and cryptocurrency investors in South Korea.

RelatedPosts

Christoper on security issues with X Circles shut down

X (formerly Twitter) Getting Rid of “Circles” Raises New Privacy Concerns

September 28, 2023

Cybersecurity: Understanding Burglars’ Tactics and Protecting Your Home

September 25, 2023

Further analysis of NaiveCopy’s tactics and techniques revealed another related campaign active the year before which targeted unknown entities in both Mexico and the UK. This, along with other discoveries, is revealed in Kaspersky’s latest quarterly threat intelligence summary.

NaiveCopy APT actors are continuously changing their tactics, sharpening their toolsets and developing new techniques. To help users and businesses keep up with these changes and stay informed about the potential threats they might face, Kaspersky’s Global Research and Analysis (GReAT) team provides quarterly reports about the most important developments across the advanced persistent threat landscape.

The three-month APT trends report is created using Kaspersky’s private threat intelligence research and includes major developments and cyber-incidents that researchers believe everyone should be aware of.

In the second quarter of 2022, Kaspersky researchers discovered a new, highly active campaign which had started in March and targeted stock and cryptocurrency investors.

This is unusual considering most APT actors do not pursue financial gain. The actor used cryptocurrency-related contents and complaints from law enforcement as themes to lure its victims. The infection chains involved remote template injection, spawning a malicious macro which starts a multi-stage infection procedure using Dropbox.

Ad 16
Advertisements

After beaconing the victim’s host information, the malware then attempts to fetch the final stage payload.

Luckily, Kaspersky experts had a chance to acquire the final stage payload, consisting of several modules used for exfiltrating sensitive information from the victim.

By analysing this payload, Kaspersky researchers found additional samples that had been used a year ago during another campaign against entities in Mexico and UK.

Kaspersky experts do not see any precise connections to known threat actors, however they believe that they are familiar with the Korean language and have utilised a similar tactic previously used by the Konni group to steal the login credentials for a renowned Korean portal. The Konni group is a threat actor which has been active since mid-2021, mostly targeting Russian diplomatic entities.

“Over the course of several quarters, we have seen APT actors turn their attention to the cryptocurrency industry. Using various techniques, the actors seek not only information, but money as well. This is an unusual, but increasing, tendency for the APT landscape. In order to combat the threats, organisations need to gain visibility across the recent cyberthreat landscape. Threat intelligence is an essential component that enables reliable and timely anticipation of such attacks,” comments David Emm, principal security researcher at Kaspersky’s GReAT. 

To read the full APT Q2 2022 trends report, visit Securelist.com

Advertisements
innovation
AIT
Advertisements
Tags: Advanced Persistent ThreatCryptocurrencyNaiveCopy
ShareTweetSend
Previous Post

Shuttlers Partners with RCCG to Transport 50,000 Members

Next Post

Pantami, NCS Executives Visit Gov Abiodun as S3N2022 Opens Today

Techeconomy

Techeconomy

Related Posts

Christoper on security issues with X Circles shut down
Security

X (formerly Twitter) Getting Rid of “Circles” Raises New Privacy Concerns

by Admin
September 28, 2023
0

The recent announcement by X (formerly Twitter) hinting they plan to shut down “Circles” feature as of Oct 31st, 2023, has...

Read more
burglars' tactics

Cybersecurity: Understanding Burglars’ Tactics and Protecting Your Home

September 25, 2023
Location Data

Cybersecurity: The Power and Potential Misuse of Location Data

September 25, 2023
Sophos Engenuity ATT&CK Evaluations

Sophos Excels in MITRE Engenuity ATT&CK Evaluations with 99% Detection Coverage

September 22, 2023
Truecaller Rebrands, Unveils Anti-Fraud Feature in App Update

Truecaller Rebrands, Unveils Anti-Fraud Feature in App Update

September 21, 2023
UC solution and Security (Photo: GettyImages)

Boosting Collaboration and Strengthening Security with UC in the Financial Services Sector

September 20, 2023
Next Post

Pantami, NCS Executives Visit Gov Abiodun as S3N2022 Opens Today

Comments 1

  1. Pingback: NaiveCopy; Extremely Energetic Cyber Menace Focusing on Cryptocurrency Business – TechEconomy.ng - Only Easy Tech

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

I agree to the Terms & Conditions and Privacy Policy.

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Ad 16
Advertisements

NEWSLETTER

Subscribe

* indicates required
Techeconomy
Advertisements
Ad 15
Insurance Meet Tech
Advertisements
ADVERTISEMENT
  • Trending
  • Comments
  • Latest
​Sodiq Tijani Toju Africa

Meet Sodiq Tijani, a Product Expert and Entrepreneur Banking the Unbanked

March 2, 2023
Product Led vs Sales Led Business Models

Product Led vs Sales Led Business Models: What Startups Should Know

January 10, 2023
Samsung Galayx A04e - Cheapest Samsung Phones in 2023

Cheapest Samsung Phones in 2023

September 11, 2023
Sodiq Tijani Youcloudpay

How Sodiq Tijani is Empowering African SMEs for Economic Growth

February 9, 2022
Google Cybersecurity Scholarship

Google Recognizes Shortage of Cybersecurity Experts in Africa, Announces Scholarships

22

Ad Dynamo Has Eyes on Nigeria – CEO

19

Digital Marketing in Africa: Bringing Much-Needed Skills to Nigeria’s Youth

16

Ad Dynamo by Aleph Group Launches free Digital Academy

14
ASUS ROG Strix G16 Review

ASUS ROG Strix G16 Review: Pinnacle Performance and Innovation Unleashed

September 30, 2023
International Podcast Day

Top 10 Podcasts of the Decade: A Journey Through Audio Excellence

September 30, 2023
International Podcast Day

Behind the Voices: Spotlight on Global Renowned Podcast Hosts

September 30, 2023
Telecom Operators - MNOs want price regime review

Ubiquitous Network Access: Reasons NCC, MNOs and Vendors Should Embrace Emetrics

September 30, 2023

Follow Us

MarkTECH

No Content Available

WomenPreneurs

Hiring in South Africa by Jessica Hawkey redAcademy
WomenPreneurs

Women in Business: Q&A with Jessica Hawkey, Founder & MD of redAcademy

by Techeconomy
August 22, 2023
0

"Jessica Hawkey is the Managing Director of redAcademy"

Read more

BusinesSENSE For SMEs

Managing Difficult Customer
BusinesSENSE For SMEs

Five Keys to Managing Difficult Customers

by Techeconomy
August 23, 2023
0

You will at one point in your business be confronted with dealing with difficult customers. So, mastering the right strategies...

Read more
  • About Us
  • Career
  • Contact Us
  • Policy
  • en English
    • ar Arabic
    • en English
    • fr French
    • ha Hausa
    • ru Russian
    • yo Yoruba

© 2023 Techeconomy - Designed by Opimedia.

No Result
View All Result
  • News
  • Tech
    • DisruptiveTECH
    • ConsumerTech
      • Accessories
      • Phones
      • Laptop
      • Apps
      • Gadgets and Appliances
    • How To
    • TechTAINMENT
  • Business
    • Telecoms
      • Broadband
    • Mobility
    • Environment
    • Travel
    • Commerce
    • StartUPs
    • TE Insights
    • Security
  • Partners
  • Economy
    • Finance
    • Fintech
    • Digital Assets
    • Personal Finance
    • Insurance
  • Features
    • IndustryINFLUENCERS
    • Guest Writer
    • Appointment
    • EventDIARY
    • Editorial
  • Podcast
  • TECHECONOMY TV

© 2023 Techeconomy - Designed by Opimedia.

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.