'DragonSpark' Malware: East Asian Cyberattackers Create an OSS Frankenstein
In our series of letters from African journalists, film-maker and columnist Ahmed Rashid looks at some of the most striking cybersecurity stories of the year.
Additionally, the Web shell they used to deploy their malware — a well-known tool called China Chopper — and all of the open source tools described above were originally developed by Chinese-speaking developers and vendors. The DragonSpark attackers carried out their opportunistic attacks with programs like SharpToken and BadPotato, which enable the execution of commands at the level of the Windows operating system. In staging their malware, the hackers puppeteered servers located in China, Hong Kong, Singapore, and Taiwan, many of which were hosted by perfectly ordinary businesses, including an art gallery, a retailer for baby products, and companies in the gaming and gambling industries.
Source read time: 3 min - darkreading.com
Also offered in: Nederlands