Skip to main content

What Morpho Means: Why Hackers Target Intellectual Property And Business-Confidential Information


Jasper_The_Rasper
Moderator
Forum|alt.badge.img+54
See Also - Sophisticated, successful Morpho APT group is after corporate data
 
13th July 2015  By Raj Samani
 
A quiet, professional cyberespionage group steals what every company wants to keep secret: valuable information that drives business. Welcome to the new normal.
 Corporate cyberespionage made the front page last week with the news of Morpho, also known as Wild Neutron. Regardless of what you call it, this revelation was the latest reminder of the growing prominence of corporate espionage on the cyber landscape. The group targets major IT, pharmaceutical, legal, and commodity companies spanning the globe, with concentrated efforts in the United States, Europe, and Canada. It is highly organized and homes in on victims to gather confidential information for future monetization.
Here’s the quick and dirty on how Morpho operates: The group’s modus operandi is a combination of watering-hole attacks, zero-day exploits, and multi-platform malware. It compromises websites pertinent to the target, exploits them, and delivers either a Java-based zero-day exploit or a potential Internet Explorer zero-day exploit. Bottom line: This is cyberespionage via zero-day.
 
Full Article
 

0 replies

Be the first to reply!

Reply