Verified Document

Customized Malware To Attack Areospace Industry Essay

Cyber Intelligence Report

Executive Summary

In 2017, a new cyber threat actor called Webworm began targeting government networks in Asia with customized malware. To date, the group has attacked networks in Russia, Mongolia, and several other countries in the region. The industries targeted include energy, IT services, and aerospace. Webworm's ultimate goal is to take control of networks, steal information, or gain access to computers. This is a significant problem for the affected countries because it exposes them to potentially malicious software. One possible solution is for these countries to rethink their use of vulnerable Windows-based systems and move to more secure operating systems. This would help to mitigate the risk posed by Webworm and other cyber threat actors.

Actor

Webworm is a threat actor who has been active since 2017, particularly among Asian countries.

Targets

Webworm has primarily targeted Asian governments, agencies and industries, from IT services industries to aerospace and electric power plants everywhere from Russia to Mongolia. According to Broadcom Software, Webworm is using Windows-based remote access Trojans to compromise IT service providers.

Intentions

The intentions of the group are unclear, but the actions speak for themselves. Remote access trojans (RATs) are a type of malware that allows attackers to gain control of a victims computer. RATs can be used to steal sensitive information, install...

…enable remote access to a victim's computer. If one suspects that a computer may be infected with either of these RATs, it is important to seek professional help immediately.

Assessment

https://thehackernews.com/2022/09/webworm-hackers-using-modified-rats-in.html

Since 2017, Asian-centered cyber threat actor Webworm has been attacking with customized malware multiple Asian government networks, from Russia to Mongolia, in energy, IT services, and aerospace industries in order to take control of networks, steal information, or gain access to computers. This is important because it puts many countries at risk without realizing they may be exposing themselves to malicious software. One possible solution is for these countries, rethink the way the type of computer operating systems they have and move away from…

Cite this Document:
Copy Bibliography Citation

Related Documents

Malware Since the Earliest Days
Words: 1957 Length: 6 Document Type: Term Paper

However, nothing can be done until the malware actually occurs. With all the different viruses, worms and Trojans, how can security managers possibly predict what malware will occur next? In contrast, a behavioral rule defines legitimate activity in a system. Any activity not matching the profile will cause the security product to be triggered. As rules are not specific to a particular type of attack, they can block malicious

Malware Attacks the Democratic Process Once Upon
Words: 2658 Length: 10 Document Type: Essay

Malware Attacks the Democratic Process Once upon a time, a candidate had to excel at kissing babies and stump speeches. These were the major ways in which the candidate got his -- or much less frequently her -- image out to voters. All that the candidate's staff had to do as to ensure that reporters and photographers showed up at the right time to capture the choreographed images. The world of

Malware and Hacking Attacks
Words: 586 Length: 2 Document Type: Research Paper

Asset Descriptions Computer Server A computer server is basically a fancier computer that serves as a centralized point for one or more functions that are used by one or more workstations, commonly referred to as clients. Servers can be used as launch points for applications, as a place to store files and so forth. For example, a Citrix server could be set up so as to allow people to use their "2nd

Cyber Security Most Important Cyber
Words: 2328 Length: 8 Document Type: Research Paper

The operating system faced these issues due to the lackluster approach from Apple to patch their software in time. As a result, it led to risking the data of personal users. It shows that irregularities in the patching of computers affected users adversely without any fault of their own (Daily Tech, 2012). In addition to that, the operating system of Apple is now considered as one of the most favored

Cyber Security Cloud Computing
Words: 1389 Length: 4 Document Type: Term Paper

Cyber Security/Cloud Computing Consider a recent cyber security breach (specific event) and address the following questions: Describe the circumstances involved Monster Com: Confidential information of 1.3 million job seekers was stolen and used in a phishing fraud Monster.Com, a United States online recruitment site reported in 2008 that hackers broke into the site using password-protected resume library. They used credentials that Monster Worldwide Inc. claims were stolen from some of its clients. Reuters reported

Cybersecurity As an Organizational Strategy an Ethical and Legal...
Words: 3101 Length: 10 Document Type: Research Paper

Cybersecurity as an Organizational Strategy: An Ethical and Legal Perspective Cybersecurity as Organizational Strategy Across the board -- in business, society, and government -- the promise of cyber capabilities are matched by potential peril. The cyber environment is never static, but it is perhaps most agile in response to the continual stream of emerging cyber threats and realized cyber attacks ("PCAST," 2007). Cybersecurity must be agile. The challenges that must be met

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now