You are here: Home » News-ANI » Technology
Business Standard

Chinese-speaking APT actor caught spying on pharmaceutical organizations

ANI  |  New Delhi [India] 

Kaspersky Lab's researchers have discovered evidence of an emerging and alarming trend

PlugX is a well-known (RAT). It is usually spread via spear phishing and has previously been detected in targeted attacks against the military, government and political organizations.

The RAT has been used by a number of Chinese-speaking cyber threat actors, including Deep Panda, NetTraveler or Winnti. In 2013, it was discovered that the latter - responsible for attacking companies in the - had been using PlugX since May 2012.

Interestingly, Winnti has also been present in attacks against companies, where the aim has been to steal digital certificates from medical equipment and manufacturers.

PlugX RAT allows attackers to perform various malicious operations on a system without the user's permission or authorization, including - but not limited to - copying and modifying files, logging keystrokes, stealing passwords and capturing screenshots of user activity. PlugX, as with other RATs, is used by cyber criminals to discreetly steal and collect sensitive or profitable information for malicious purposes.

RAT usage in attacks against organizations indicates that sophisticated APT actors are showing an increased interest in capitalizing on the

products successfully detect and block the PlugX

"Private and is steadily migrating from paper to digital form within medical organizations. While the security of the network infrastructure of this sector is sometimes neglected, the hunt by APTs for information on advancements in drug and equipment innovation is truly worrying. Detections of PlugX in organizations demonstrate yet another battle that we need to fight - and win - with cyber criminals," said Yury Namestnikov, at

Other key findings for 2017 in the research include:

• More than 60 percent of medical organizations had on their servers or computers;

• Philippines, and topped the list of countries with attacked devices in medical organizations.

In order to stay protected, experts advise businesses to take the following measures:

• Remove all nodes that process medical data from public and secure public web portals;

• Automatically update installed using on all nodes, including servers.

• Perform network segmentation: refrain from connecting expensive equipment to the main of your organization

• Use a proven in combination with and threat intelligence, such as and Defense solution. These are capable of spotting and catching advanced targeted attacks by analyzing network anomalies and giving cybersecurity teams full visibility over the network and response automation.

(This story has not been edited by Business Standard staff and is auto-generated from a syndicated feed.)

First Published: Fri, March 16 2018. 19:10 IST
RECOMMENDED FOR YOU
RECOMMENDED FOR YOU