Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Things Get Ugly When Hackers Turn on Each Other [VIDEO]

b2ap3_thumbnail_hacker_vs_hacker_400.jpgNormally in cybersecurity, we hear about hacking attacks and immediately sympathize with the victim. It’s usually an individual or a business that suffers the most; yet, a recent trend is showing that hackers are lashing out at one another in response to certain threats. In response to a hack from the cyberespionage group Naikon, another group, Hellsing, retaliated with their own attack.

It might seem like a classic case of good ol’ revenge, but the researchers at Kaspersky Labs seem to think it hints toward a new trend in the world of cybercrime. They are calling it the advanced persistent threat (APT) wars, in which two major threats duke it out for supremacy over their target.

The attack in question was initiated on April 15, 2015, when Naikon targeted the smaller threat, Hellsing, with a spear phishing attack. Hellsing, however, didn’t respond well to the attack, and instead turned their own malware against Naikon. Naikon responded by posing as a member of a foreign government. As you might imagine, this back-and-forth action continued with both parties, ultimately resulting in Hellsing sending a password-protected message containing a backdoor specially made to target Naikon.

Commenting on the behavior of these two entities, Costin Daiu, Director of the Global Research and Analyst Team of Kaspersky Labs, reports:

The targeting of the Naikon group by Hellsing, in some sort of a vengeful vampire-hunting -- "Empire Strikes Back" style, is fascinating. In the past, we've seen APT groups accidentally hitting each other while stealing address books from victims and then mass-mailing everyone on each of these lists. However, considering the targeting and origin of the attack, it seems more likely that this is an example of a deliberate APT-on-APT attack.

These two threats going after each other tooth and claw was likely in the interest of gathering information; something which advanced persistent threats are known for. It’s an interesting exchange of blows, almost like they’re trying to outsmart each other. It’s the classic example of who can gain advantage of vital information that can be leveraged for greater profits.

Will the future see a world in which cybercriminals scramble for power, only to fall from grace and be lost to the ages, like the remains of an empire spreading itself too thin? Only time can tell. In the meantime, not even other hackers are safe from advanced persistent threats that lurk on the Internet. As a business owner and end user, the last thing you want to do is get caught between two wild hacking animals vying for a scrap of meat. Be sure to keep your machines up to date with the latest patches and upgrades that will minimize the possibility of a hacking attack.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 17 March 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Productivity Business Software Innovation Hackers Cloud Network Security User Tips Hardware Internet Efficiency IT Support Malware Privacy Email Phishing Google Workplace Tips Computer Users Collaboration IT Services Hosted Solutions Mobile Device Ransomware Quick Tips Workplace Strategy Small Business Microsoft Cybersecurity Data Backup Communication Passwords Smartphone Saving Money Business Management Android Smartphones VoIP Backup Mobile Devices communications Managed Service Disaster Recovery Data Recovery Upgrade Social Media Managed IT Services Browser Microsoft Office Windows Tech Term Network Remote Internet of Things Automation Artificial Intelligence Current Events Facebook Productivity Cloud Computing Covid-19 Remote Work Miscellaneous Gadgets Server Managed Service Provider Holiday Outsourced IT Information Employee/Employer Relationship Spam Encryption AI Windows 10 Training Business Continuity Office Compliance Government Data Management Virtualization Business Technology Bandwidth Blockchain Windows 10 Wi-Fi Two-factor Authentication Apps Mobile Office Data Security Employer-Employee Relationship Chrome Managed Services Voice over Internet Protocol Budget Apple Networking Mobile Device Management App Gmail Vendor Applications Information Technology Access Control Office 365 Tip of the week Conferencing Hacker Avoiding Downtime Marketing How To BDR BYOD Computing WiFi Risk Management Big Data Virtual Private Network Health Help Desk Analytics Office Tips IT Support Augmented Reality Computers Retail Storage Healthcare Password Bring Your Own Device Website Managed IT Services Operating System HIPAA Router Display Printer Social Paperless Office Windows 11 Infrastructure 2FA Monitoring Excel Document Management Customer Service Remote Workers Telephone Scam Data loss Cooperation Free Resource Project Management Windows 7 Firewall Going Green Patch Management Save Money Microsoft 365 Remote Monitoring End of Support Vulnerability Vendor Management Solutions Cybercrime The Internet of Things Cryptocurrency Modem User Tip Processor Computer Repair Mobile Security Virtual Desktop Holidays Data storage LiFi Data Storage Smart Technology Supply Chain Customer Relationship Management Outlook Video Conferencing Machine Learning Managed Services Provider Virtual Machines Professional Services Money Saving Time Humor Hacking Presentation Managed IT Service Maintenance Downloads Wireless Technology Antivirus Sports iPhone Mouse Licensing Administration Vulnerabilities Entertainment Data Privacy Word Images 101 Robot Mobility Telephone System Multi-Factor Authentication Cost Management Settings Wireless Printing Content Filtering Safety IT Management YouTube Meetings VPN Employees Physical Security Integration Username Managing Costs Amazon Point of Sale eCommerce 5G Black Friday SSID Google Docs Unified Communications Database Surveillance Experience Virtual Assistant Outsource IT Application Media Bitcoin Network Management Running Cable Tech Support IT Technicians Virtual Machine Environment Cookies Monitors Cyber Monday Medical IT IBM Google Wallet Proxy Server Reviews Tactics Development Hotspot Transportation Small Businesses Windows 8 Laptop Websites Mirgation Hypervisor Displays Nanotechnology Optimization PowerPoint Drones Shopping SharePoint Addiction Electronic Medical Records Language Employer/Employee Relationships Outsourcing Navigation Competition Management PCI DSS Halloween Chatbots Screen Reader Writing Distributed Denial of Service Workplace Lenovo Gig Economy Service Level Agreement Internet Service Provider Virtual Reality Computing Infrastructure Teamwork Hiring/Firing Evernote Paperless Hacks Server Management Regulations Compliance Scary Stories Private Cloud Identity Identity Theft Smart Tech Memes Fun Co-managed IT User Superfish Bookmark Deep Learning Download Net Neutrality Twitter Alerts SQL Server Technology Care Business Communications Financial Data Error History Education Connectivity IT Social Engineering Break Fix Scams IP Address Browsers Smartwatch Upload Procurement Remote Computing Azure Hybrid Work Multi-Factor Security Tech Human Resources Mobile Computing Social Network Telework Cyber security Tablet IoT Communitications Search Dark Web Cables Recovery CES Hard Drives Best Practice Trends Supply Chain Management Alert Dark Data Google Calendar Term Google Apps Domains Managed IT Customer Resource management FinTech Buisness File Sharing Regulations IT solutions Star Wars IT Assessment How To Microsoft Excel IT Maintenance Legal Data Analysis Refrigeration Business Growth Gamification Flexibility Notifications Staff Value Business Intelligence Legislation Shortcuts Public Speaking Organization Travel Social Networking Techology Fileless Malware Digital Security Cameras Google Maps Smart Devices Cortana Ransmoware Lithium-ion battery Entrepreneur Alt Codes Content Remote Working Wearable Technology Memory Vendors Downtime Unified Threat Management Motherboard Data Breach Comparison Google Play Be Proactive Health IT Unified Threat Management Directions Videos Hosted Solution Assessment Electronic Health Records Permissions Workforce Undo Typing Wasting Time Threats Trend Micro Network Congestion Specifications Security Cameras Workplace Strategies Google Drive User Error Microchip Internet Exlporer Software as a Service Knowledge Fraud Meta

Blog Archive