Russian hackers attack hotels in europe and the middle east
Table of contents:
A group of Russian hackers known as APT28 is carrying out a series of attacks on hotels in Europe and the Middle East. The group appears to have ties to the country's government. They are using modified Word documents to break the security of these hotels.
Russian hackers attack hotels in Europe and the Middle East
Once they get in, they have access to the personal data of all the hotel guests. Apparently, obtaining such data and being able to spy on customers is the main objective of the group. The attacks have been carried out throughout the month of July.
Hotel attacks
Russian hackers reportedly used an NSA spy tool that was leaked earlier this year. What they have in common in their attacks is that they focus on luxury hotels. They look for those hotels with distinguished guests among the people who stay in it. So the idea of the type of people looking to attack is quite clear.
First, in order to access the hotel system, they sent an email with a form that the hotel had to fill out. Thus, once said document was opened, they managed to sneak into the system. They then used ETERNALBLUE, one of the Shadow Brokers exploits, and also used Reply to steal users' credentials.
This type of attack is not new. They already did something similar last year in the United States. And in 2014 some similar actions were detected in luxury hotels. So the hackers seem to be clear on who they are targeting.
Facebook makes Russian users and propaganda pages public
Facebook makes Russian users and propaganda pages public. Find out more about the new measure that the social network has taken.
New wave of malware attacks expands in the Middle East
New wave of malware attacks expands in the Middle East. Find out more about these new malware attacks in Palestine and the Middle East.
Facebook deletes hundreds of Russian pages and accounts
Facebook deletes hundreds of Russian pages and accounts. Find out more about this removal of accounts on the social network.