Sykipot Malware Now Targeting Civil Aviation Information
Sykipot attack now being repurposed to steal civil aviation data, TrendLabs researchers say
An older malware exploit called Sykipot has recently been reworked to steal data on the civil aviation sector in the United States, researchers say.
According to a new blog from researchers at Trend Micro's TrendLabs, the retooled attack appears to be an intelligence-gathering operation.
"The intentions of this latest round of targeting are unclear, but it represents a change in shift in objectives or mission," the blog states.
Sykipot, which has been used as a backdoor since 2007, traditionally has targeted U.S. defense agencies and related industries, such as telecommunications, computer hardware makers, and government contractors, according to TrendLabs. But now it appears to be going after aviation data.
"Like most targeted attacks, Sykipot uses malicious attachments to spread," the blog says. "Once Sykipot is running on the victim's machine, it establishes an SSL connection to a [command and control] server, where more malicious files are then downloaded and installed on the victim's machine. The capabilities of the Sykipot framework allow for arbitrary code and commands to be run.
"The change -- slowly moving away from file-based exploits and into [the PC's dynamic link library] or process injection -- is a notable observation on the evolution of the campaign," TrendLabs says. "The closed-source intelligence of the most recent attacks shows consistency in methodology, tools and exploited target entity, but examining the targeted data suggests the campaign expanded beyond the typical US [defense industry] and into more civilian sectors and infrastructure."
Sykipot frequently spreads through the use of zero-day versions, so organizations in civil aviation and related industries should seek to patch frequently, TrendLabs says. And since the initial infection often occurs through phishing or other forms of social engineering, a solid end user training program may also help, the blog says.
Have a comment on this story? Please click "Add a Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message.
About the Author
You May Also Like
Securing Tomorrow, Today: How to Navigate Zero Trust
Nov 13, 2024The State of Attack Surface Management (ASM), Featuring Forrester
Nov 15, 2024Applying the Principle of Least Privilege to the Cloud
Nov 18, 2024The Right Way to Use Artificial Intelligence and Machine Learning in Incident Response
Nov 20, 2024Safeguarding GitHub Data to Fuel Web Innovation
Nov 21, 2024