Hackers target top execs via Asian hotels' Wi-Fi

Hackers target top execs via Asian hotels' Wi-Fi

FRANKFURT - Security researchers have uncovered a sophisticated industrial espionage campaign that targets business executives in luxury hotels across Asia once they sign on to computers using in-room wireless connections they consider private and secure.

The attacks, which go well beyond typical cyber criminal operations, have claimed thousands of victims dating back to 2009 and continue to do so, Kaspersky Lab, the world's largest private security firm, reported yesterday.

In 2012, the United States Federal Bureau of Investigation (FBI) issued a general warning to US government officials, businessmen and academics, advising them to use caution when updating computer software via hotel Internet connections when travelling abroad.

Kaspersky's report goes further in detailing the scale, methods and precise targeting of these attacks on top business travellers.

The movements of executives appear to be tracked as they travel, allowing attackers to pounce once a victim logs on to a hotel Wi-Fi network. Hackers cover their tracks by deleting these tools from hotel networks afterward.

[[nid:152056]]

"These attackers are going after a very specific set of individuals who should be very aware of the value of their information and be taking strong measures to protect it," said Kurt Baumgartner, principal security researcher for Kaspersky.

Unsuspecting executives who submit their room number and surname while logging on to their hotel room's wireless network are tricked into downloading an update for legitimate software such as Adobe Flash, Google Toolbar or Microsoft Messenger, Kaspersky said. Because attacks happen at sign-on, encrypted communications set up later offer no defence against attack.

The same elite spying crew has used advanced keystroke-logging software and encryption-breaking at multiple hotel chains across Asia, it said.

Ninety per cent of the victims came from five locations: Japan, Taiwan, China, Russia and South Korea.

Business travellers to Asia from Germany, Hong Kong, Ireland and the United States have also been duped, Mr Baumgartner added.

The Kaspersky report said a key mystery remains how attackers appear to know the precise travel itinerary of each victim, which points to a larger compromise of hotel business networks that researchers say they are continuing to probe.

[[nid:31919]]
This website is best viewed using the latest versions of web browsers.