The official blog F-Secure anti-virus experts of the company decided to publish a few copies of the documents that were used by hackers in recent attacks APT (Advanced persistent threat – the constant threat of increased complexity). All the published data, according to analysts, they were received anonymously in this connection, information about the attackers not to.
Note that the APT attack – a task the hacker attack, which is often carried out by using fake e-mails. In many of these letters have malicious attachments in a variety of documents which, in turn, may contain reliable information. The aim is to convince the victim that the letter now.
In addition, for APT attacks are characteristic features such as an attack by a group, allocate roles, carefully masking the presence of, adapt to countermeasures, meticulous collection of data on the victim. In most cases, if the APT attacks were repulsed, hackers improve their tactics and back.
“It was so interesting to study these documents. They often can extend the representation of the investigators of the attackers and victims “, – emphasized in the F-Secure.
The experts also noted that all documents contain the demonstrated vulnerability, as well as installed on the victim’s system when viewing the backdoor.