Reuters logo
U.S. firm finds malware targeting visitors to Afghan govt websites
December 21, 2014 / 3:07 PM / in 3 years

U.S. firm finds malware targeting visitors to Afghan govt websites

WASHINGTON (Reuters) - Malicious software likely linked to China is being used to infect visitors to a wide range of official Afghan government websites, U.S. cybersecurity researchers say.

ThreatConnect, a Virginia-based cybersecurity firm, said its researchers last week found a corrupted JavaScript file that is being used to host content on “gov.af” websites, and there are no antivirus protections available for the malware.

Rich Barger, chief intelligence officer of ThreatConnect, told Reuters his company was confident the new campaign, “Operation Poisoned Helmand,” was linked to the “Poisoned Hurricane” campaign detected this summer by another security firm, FireEye (FEYE.O), that linked it to Chinese intelligence.

He said the latest attack was very recent and one timestamp associated with the Java file was from Dec. 16, the same day Chinese Prime Minister Li Keqiang visited Afghanistan to meet with Afghanistan’s chief executive officer, Abdullah Abdullah.

China is seeking to take a more active role in Afghanistan as the United States and NATO reduce their military presence.

“We found continued activity from Chinese specific actors that have used the Afghan government infrastructure as an attack platform,” Barger said, noting that Chinese intelligence could use the malware to reach a wide array of global targets checking trusted Afghan government sites for information.

Barger said the attack was a variant of what he called a typical “watering-hole” attack in which the attackers infect a large number of victims, and then follow up with the most “promising” hits to extract data.

He said researchers this summer saw a malicious Java file on the website of the Greek embassy in Beijing while a high-level delegation led by Keqiang was visiting Greek Prime Minister Antonis Samaras in Athens.

The two events were not directly related, Barger said, and additional research was needed into the status of ministerial and official government websites on or around the dates of notable Chinese delegations and or bilateral meetings.

The malware was found on a variety of Afghan government websites, including the ministries of justice, foreign affairs, education, commerce and industry, finance and women’s affairs, according to ThreatConnect, which was formerly known as CyberSquared.

The report emerged as the United States sought help from China, Japan, South Korea and Russia in combating cyber attacks such as the one Washington on Friday accused North Korea of carrying out against Sony Pictures.

Reporting by Andrea Shalal; editing by Gunna Dickson

Our Standards:The Thomson Reuters Trust Principles.
0 : 0
  • narrow-browser-and-phone
  • medium-browser-and-portrait-tablet
  • landscape-tablet
  • medium-wide-browser
  • wide-browser-and-larger
  • medium-browser-and-landscape-tablet
  • medium-wide-browser-and-larger
  • above-phone
  • portrait-tablet-and-above
  • above-portrait-tablet
  • landscape-tablet-and-above
  • landscape-tablet-and-medium-wide-browser
  • portrait-tablet-and-below
  • landscape-tablet-and-below