|Latest campaign targets organizations in Bangladesh, India, Nepal and Pakistan,|
seeking information on border disputes
FireEye hasjust revealed the details of an advanced campaign which appears to target information about ongoing border disputes and other diplomatic matters.
The advanced persistent threat (APT) group behind the operation, which FireEye believes is most likely based in China, sent targeted spear phishing emails containing Microsoft Word attachments to its intended victims. These documents pertained to regional issues and contained a script called WATERMAIN, which creates backdoors on infected machines. The campaign's attacks were also detected in April 2015, about one month ahead of Indian Prime Minister Narendra Modi's first state visit to China.
FireEye has observed WATERMAIN activity since 2011. Over the past four years, this threat group has used WATERMAIN to target over 100 victims, approximately 70 percent of which were in India. The group launching WATERMAIN attacks has also targeted Tibetan activists and others in Southeast Asia, with a focus on governmental, diplomatic, scientific and educational organizations.
"Collecting intelligence on India remains a key strategic goal for China-based APT groups, and these attacks on India and its neighboring countries reflect growing interest in its foreign affairs," said Bryce Boland, FireEye chief technology officer for Asia Pacific. "Organizations should redouble their cyber security efforts and ensure they can prevent, detect and respond to attacks in order to protect themselves."
APT attacks on organizations in India and neighboring countries are now commonplace. In April, FireEye revealed the details of APT30, a decade-long cyber espionage campaign by suspected China-based threat actors that compromised an aerospace and defence company in India among others.