All the latest UK technology news, reviews and analysis


Nap Trojan uncovered copying New York Times attack methods

06 Feb 2013
Concept image representing virus malware

Security firm FireEye has discovered new malware operating in the wild that boasts similar security-bypassing capabilities to the tools used to attack The New York Times.

FireEye warned that the malware, dubbed Nap Trojan, was using advanced techniques to bypass traditional security tools and this increases the likelihood other firms could see their defences bypassed.

"Nap is yet another piece of malicious software that is being used by attackers in order to compromise PCs and then use them as the base from which to launch attacks," FireEye product manager and architect, Jason Steer, told V3.

"By infecting and then cycling through thousands of infected machines in a very short timeframe, hackers can evade detection; indeed many of the traditional security systems used today are unable to deal with this kind of attack."

Steer said Nap is particularly dangerous as it shares several common traits with the malware used in a recent attack on the New York Times.

"In that breach, the attacker used thousands of university computers as front-end agents, rotating the attack between these machines in order to avoid suspicion" Said Steer.

"Nap also employs extended 'sleep' calls, a classic evasion tactic used by malware writers to help avoid analysis detection by security tools.  Effectively this means the malware remains dormant for extended times, this could be 30 minutes or more, making it difficult to predict what it is actually going to do on a victim's PC."

The New York Times revealed it was the target of a prolonged cyber campaign originating from China at the end of January.

The Chinese hackers reportedly mounted the attack as "payback" for a series of articles the paper published about the nation's prime minister Wen Jiabao.

  • Comment  
  • Tweet  
  • Google plus  
  • Facebook  
  • LinkedIn  
  • Stumble Upon  
Alastair Stevenson
About

Alastair has worked as a reporter covering security and mobile issues at V3 since March 2012. Before entering the field of journalism Alastair had worked in numerous industries as both a freelance copy writer and artist.

View Alastair's Google+ profile

More on Security
What do you think?
blog comments powered by Disqus
Poll

BYOD vs CYOD vs BYOC poll

Which approach is your firm taking to managing employees' mobile devices?
21%
13%
4%
22%
29%
11%

Popular Threads

Powered by Disqus
Sony Xperia Z2 Tablet powered by Android KitKat 4.4

Sony Xperia Z2 Tablet video

We take a look at the lightweight, waterproof tablet

Updating your subscription status Loading
Newsletters

Get the latest news (daily or weekly) direct to your inbox with V3 newsletters.

newsletter sign-up button
hpv33

Data protection: the key challenges

Deduplication is a foundational technology for efficient backup and recovery

rdc2

iPad makes its mark in the enterprise

The iPad can become a supercharged unified communications endpoint, allowing users to enhance their productivity

Software Development Engineer

Develop: Customise: Configure. Maximise your technical...

MS Dynamics Solution Architect

Background Rapha creates the finest cycling clothing...

Senior PHP (JavaScript / node.js developer)

Senior PHP (JavaScript / node.js developer) Assertis...

Senior Technical IT Engineer / System Administrator / Support Analyst

EVAK Technologies Ltd is an IT Services and Consultancy...
To send to more than one email address, simply separate each address with a comma.