1600 Burrstone Road, Utica, NY 13502
(315) 792-3006

Cyberespionage Operators Work In Groups, Process Enormous Data Workloads

(Dark Reading) In a study of the lifecycle of cyberespionage attacks, a group of researchers at a Taiwanese security startup have found that the nation’s major government agencies encounter a dozen such attacks each day and that the operators behind the attacks have virtual data centers that appear to be processing enormous workloads.

The research, which will be presented at the Black Hat Briefings later this summer, focuses on a part of the espionage lifecycle that most incident responders do not see: The attackers sifting through their data caches and processing the stolen information in virtual “APT [advanced persistent threat] operation centers,” says Benson Wu, co-founder and lead security researcher at Taiwan-based Xecure Lab and one of the presenters.

We “will show that there are lots of people in these APT operation centers,” Wu says. “We can’t see [the] data that is being stolen, but there are a lot of operators. The workloads are so high that there must be tons of victims.” …read full article

Tags: , , , , , , , , ,