Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Things Get Ugly When Hackers Turn on Each Other [VIDEO]

b2ap3_thumbnail_hacker_vs_hacker_400.jpgNormally in cybersecurity, we hear about hacking attacks and immediately sympathize with the victim. It’s usually an individual or a business that suffers the most; yet, a recent trend is showing that hackers are lashing out at one another in response to certain threats. In response to a hack from the cyberespionage group Naikon, another group, Hellsing, retaliated with their own attack.

It might seem like a classic case of good ol’ revenge, but the researchers at Kaspersky Labs seem to think it hints toward a new trend in the world of cybercrime. They are calling it the advanced persistent threat (APT) wars, in which two major threats duke it out for supremacy over their target.

The attack in question was initiated on April 15, 2015, when Naikon targeted the smaller threat, Hellsing, with a spear phishing attack. Hellsing, however, didn’t respond well to the attack, and instead turned their own malware against Naikon. Naikon responded by posing as a member of a foreign government. As you might imagine, this back-and-forth action continued with both parties, ultimately resulting in Hellsing sending a password-protected message containing a backdoor specially made to target Naikon.

Commenting on the behavior of these two entities, Costin Daiu, Director of the Global Research and Analyst Team of Kaspersky Labs, reports:

The targeting of the Naikon group by Hellsing, in some sort of a vengeful vampire-hunting -- "Empire Strikes Back" style, is fascinating. In the past, we've seen APT groups accidentally hitting each other while stealing address books from victims and then mass-mailing everyone on each of these lists. However, considering the targeting and origin of the attack, it seems more likely that this is an example of a deliberate APT-on-APT attack.

These two threats going after each other tooth and claw was likely in the interest of gathering information; something which advanced persistent threats are known for. It’s an interesting exchange of blows, almost like they’re trying to outsmart each other. It’s the classic example of who can gain advantage of vital information that can be leveraged for greater profits.

Will the future see a world in which cybercriminals scramble for power, only to fall from grace and be lost to the ages, like the remains of an empire spreading itself too thin? Only time can tell. In the meantime, not even other hackers are safe from advanced persistent threats that lurk on the Internet. As a business owner and end user, the last thing you want to do is get caught between two wild hacking animals vying for a scrap of meat. Be sure to keep your machines up to date with the latest patches and upgrades that will minimize the possibility of a hacking attack.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 17 March 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Productivity Business Software Innovation Hackers Cloud Network Security User Tips Hardware Internet Efficiency IT Support Malware Privacy Email Phishing Google Workplace Tips Computer Users Collaboration IT Services Hosted Solutions Mobile Device Ransomware Quick Tips Workplace Strategy Microsoft Cybersecurity Small Business Communication Data Backup Passwords Smartphone Saving Money Android Backup Business Management VoIP Smartphones Mobile Devices communications Data Recovery Upgrade Disaster Recovery Managed Service Managed IT Services Social Media Browser Microsoft Office Windows Network Tech Term Remote Internet of Things Artificial Intelligence Facebook Automation Current Events Productivity Cloud Computing Covid-19 Server Managed Service Provider Remote Work Miscellaneous Gadgets Outsourced IT Information Holiday Encryption Spam AI Employee/Employer Relationship Windows 10 Compliance Office Government Data Management Business Continuity Training Wi-Fi Blockchain Windows 10 Bandwidth Virtualization Business Technology Apps Data Security Two-factor Authentication Mobile Office Employer-Employee Relationship Managed Services Voice over Internet Protocol Networking Mobile Device Management Chrome Vendor Gmail Budget Apple App Conferencing Computing Hacker Information Technology Avoiding Downtime How To BDR Marketing Office 365 BYOD Applications WiFi Access Control Tip of the week Retail Operating System Healthcare Computers Risk Management Managed IT Services Website Analytics Office Tips IT Support Augmented Reality HIPAA Router Storage Virtual Private Network Password Bring Your Own Device Big Data Health Help Desk Document Management Going Green Remote Workers Customer Service Cybercrime Telephone Scam Data loss Windows 11 Cooperation Free Resource 2FA Project Management Windows 7 Excel Patch Management Save Money Microsoft 365 Remote Monitoring Vulnerability End of Support Firewall Vendor Management Solutions Display The Internet of Things Printer Paperless Office Infrastructure Social Monitoring Saving Time Virtual Machines Professional Services Customer Relationship Management Settings Wireless Managed IT Service Printing Content Filtering Maintenance Downloads Hacking Antivirus YouTube iPhone Presentation Licensing Cryptocurrency Entertainment Vulnerabilities Wireless Technology Supply Chain Virtual Desktop Images 101 Data storage LiFi Telephone System Multi-Factor Authentication Robot Mobility Word Cost Management Outlook Money Humor IT Management Employees VPN Meetings Physical Security Integration Safety Sports User Tip Modem Mouse Processor Data Privacy Computer Repair Mobile Security Holidays Administration Data Storage Smart Technology Video Conferencing Machine Learning Managed Services Provider Gig Economy Lenovo Screen Reader Workforce Writing Distributed Denial of Service Cortana Service Level Agreement Internet Service Provider Threats Virtual Reality Computing Infrastructure Teamwork Private Cloud Identity Workplace Strategies Evernote Alt Codes Server Management Regulations Compliance Downtime Superfish Bookmark Identity Theft Smart Tech Memes Meta Competition Hosted Solution Download Net Neutrality Amazon Twitter Alerts SQL Server Error History Typing Financial Data Smartwatch Browsers Connectivity IT Outsource IT Social Engineering Break Fix Google Drive Media User Knowledge Upload Procurement Environment Remote Computing Azure Telework Social Network Cyber security Multi-Factor Security Tech CES 5G Tablet IoT Communitications Small Businesses Dark Web Alert IP Address Google Docs Unified Communications Experience Trends Supply Chain Management Displays FinTech Managed IT Customer Resource management File Sharing Regulations Dark Data Google Calendar Term Bitcoin Running Cable Data Analysis Star Wars IT Assessment Outsourcing How To Microsoft Excel Google Wallet Notifications Staff Value Recovery Gamification Flexibility Organization Travel Social Networking Workplace Legislation Hard Drives Windows 8 Laptop Drones Digital Security Cameras Techology Fileless Malware Google Maps Smart Devices Hiring/Firing Domains Wearable Technology Memory Paperless Content Remote Working Halloween Health IT Unified Threat Management Motherboard Data Breach Co-managed IT Comparison Google Play Refrigeration Public Speaking Videos Unified Threat Management Directions Assessment Electronic Health Records Technology Care Permissions Wasting Time Lithium-ion battery Business Communications Entrepreneur Scary Stories Trend Micro Scams Network Congestion Specifications Security Cameras Hacks User Error Microchip Fun Internet Exlporer Software as a Service Hybrid Work Fraud Managing Costs Human Resources Deep Learning Username Point of Sale eCommerce Cables Black Friday SSID Undo Education Database Surveillance Virtual Assistant Tech Support IT Technicians Virtual Machine Google Apps Network Management Reviews Proxy Server Cookies IT Maintenance Monitors Cyber Monday Medical IT Mobile Computing Search Tactics Development Business Intelligence Hotspot Transportation Websites Mirgation Hypervisor Shortcuts Application Best Practice Buisness Shopping Nanotechnology Optimization Ransmoware PowerPoint IBM Legal IT solutions SharePoint Addiction Vendors Electronic Medical Records Language Employer/Employee Relationships Chatbots Be Proactive Navigation Business Growth Management PCI DSS

Blog Archive