Vietnam.vn - Nền tảng quảng bá Việt Nam

Kaspersky detects cyberattack targeting industrial organizations

Attackers use legitimate cloud services to manage malware and deploy complex, multi-stage attacks to bypass intrusion detection systems. This allows them to spread malware on victims’ networks, install remote control tools, take control of devices, and steal and delete confidential information.

Báo Sài Gòn Giải phóngBáo Sài Gòn Giải phóng20/03/2025

Kaspersky dubbed the campaign SalmonSlalom to describe how cybercriminals skillfully evaded network defenses.
Kaspersky dubbed the campaign SalmonSlalom to describe how cybercriminals skillfully evaded network defenses.

Kaspersky ICS CERT experts have discovered a cyberattack campaign targeting industrial organizations in the Asia-Pacific (APAC) region. The campaign targets government agencies and heavy industrial organizations in many countries in the Asia-Pacific (APAC) region, including Taiwan (China), Malaysia, China, Japan, Thailand, South Korea, Singapore, the Philippines and Vietnam.

Hackers use a compressed file containing malicious code, disguised as a tax-related document, to spread it through phishing campaigns on emails and messaging apps like WeChat and Telegram. After a complex multi-layered malware installation process is installed on the system, cybercriminals will proceed to install a backdoor called FatalRAT.

While the campaign shares some similarities with previous attacks using open-source remote access malware (RATs) such as Gh0st RAT, SimayRAT, Zegost, and FatalRAT, experts have noticed significant changes in tactics, techniques, and methods of operation, all of which have been tailored to target Chinese-speaking organizations and agencies.

Kaspersky photo 1 - Kaspersky discovered a new attack on industrial organizations in APAC.jpg

Kaspersky dubbed the campaign SalmonSlalom to describe how cybercriminals skillfully evaded network defenses with sophisticated tactics and constantly changing methods, similar to salmon swimming through a rapid, arduous journey that requires endurance and ingenuity to overcome obstacles.

To proactively protect heavy industrial organizations from this attack campaign, Kaspersky recommends the following measures:

- Always enable and require two-factor authentication (2FA) when logging into administrative accounts and web interfaces of security solutions.

- Install the latest versions of centralized security solutions across the system, and regularly update anti-virus databases and program modules.

- Update information about the latest threats (for example, from Kaspersky Security Network) for groups of systems that are not restricted from using cloud security services by law.

- Deploy security monitoring systems (SIEM) such as Kaspersky Unified Monitoring and Analysis Platform…

“Cybercriminals use relatively simple techniques to achieve their goals, even in operational technology (OT) environments. This campaign is a warning to heavy industry organizations in the APAC region that malicious actors are capable of remotely penetrating OT systems. Organizations need to raise awareness of these threats, strengthen their defenses, and proactively respond to protect assets and data from cyberattacks,” said Evgeny Goncharov, Head of Kaspersky ICS CERT.


Comment (0)

No data
No data

Same category

Southeast Asian fans react when Vietnam team defeats Cambodia
The sacred circle of life
Tombs in Hue
Discover the picturesque Mui Treo in Quang Tri

Same author

Heritage

Figure

Business

No videos available

News

Political System

Local

Product