SoatDev IT Consulting
SoatDev IT Consulting
  • About us
  • Expertise
  • Services
  • How it works
  • Contact Us
  • News
  • November 7, 2023
  • Rss Fetcher

Kaspersky researchers have discovered a persistent campaign compromising a specific type of secure USB drive, used to provide encryption for safe data storage. Dubbed ‘TetrisPhantom,’ this espionage effort targets government entities in the Asia-Pacific region (APAC) and shows no discernible overlap with any known threat actor. These and other findings are detailed in Kaspersky’s new quarterly APT threat landscape report.
 Uncovering Espionage Campaign
In early 2023, Kaspersky’s Global Research and Analysis team uncovered a long-running espionage campaign operated by a previously unknown actor. The attacker covertly spied on and harvested sensitive data from APAC government entities by exploiting a particular type of secure USB drive, protected by hardware encryption to ensure the secure storage and transfer of data between computer systems. These secure USB drives are employed by government organisations worldwide, implying that more entities might potentially fall prey to similar techniques.
Discovery of Malicious Modules
The campaign comprises various malicious modules, through which the actor can gain extensive control over the victim’s device. This allows them to execute commands, collect files and information from compromised machines, and transfer them to other machines using the same or different secure USB drives as carriers. Additionally, the APT is proficient in executing other malicious files on the infected systems.
High-Level Sophistication in Government Attacks
Kaspersky researchers report there are a limited number of victims, highlighting the highly targeted nature of the attack. “Our investigation reveals a high-level of sophistication, including virtualisation-based software obfuscation, low-level communication with the USB drive using direct SCSI commands, and self-replication through connected secure USBs.
These operations were conducted by a highly skilled and resourceful threat actor, with a keen interest in espionage activities within sensitive and safeguarded government networks,” comments Noushin Shabab, senior security researcher at Kaspersky’s Global Research and Analysis Team (GReAT).
Kaspersky researchers have not observed any overlaps with any existing threat actor, but with this attack campaign still ongoing, experts continue to track its progress, and expect to see more sophisticated attacks from them in the future. To learn more about APT threat landscape in Q3 2023, visit Securelist.com.
How to Avoid Falling Victim to Targeted Attacks
In order to avoid falling victim to a targeted attack by a known or unknown threat actor, Kaspersky researchers recommend implementing the following measures:

Regularly update your operating system, applications, and antivirus software to patch any known vulnerabilities.
Be cautious of emails, messages, or calls asking for sensitive information. Verify the sender’s identity before sharing any personal details or clicking at suspicious links.
Provide your SOC team with access to the latest threat intelligence (TI). The Kaspersky Threat Intelligence Portal is a single point of access for the company’s TI, providing cyberattack data and insights gathered by Kaspersky spanning over 20 years.
Upskill your cybersecurity team to tackle the latest targeted threats with Kaspersky online training developed by GReAT experts
For endpoint level detection, investigation, and timely remediation of incidents, implement EDR solutions such as Kaspersky Endpoint Detection and Response.

 

Previous Post
Next Post

Recent Posts

  • OpenAI reportedly ‘recalibrating’ compensation in response to Meta hires
  • Trump says he’s found a buyer for TikTok
  • With ‘F1’, Apple finally has a theatrical hit
  • ‘We are the media now’: why Tesla’s robotaxis were dominated by Elon Musk superfans
  • Zooming in on a fractalish plot

Categories

  • Industry News
  • Programming
  • RSS Fetched Articles
  • Uncategorized

Archives

  • June 2025
  • May 2025
  • April 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • September 2024
  • August 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • March 2024
  • February 2024
  • January 2024
  • December 2023
  • November 2023
  • October 2023
  • September 2023
  • August 2023
  • July 2023
  • June 2023
  • May 2023
  • April 2023

Tap into the power of Microservices, MVC Architecture, Cloud, Containers, UML, and Scrum methodologies to bolster your project planning, execution, and application development processes.

Solutions

  • IT Consultation
  • Agile Transformation
  • Software Development
  • DevOps & CI/CD

Regions Covered

  • Montreal
  • New York
  • Paris
  • Mauritius
  • Abidjan
  • Dakar

Subscribe to Newsletter

Join our monthly newsletter subscribers to get the latest news and insights.

© Copyright 2023. All Rights Reserved by Soatdev IT Consulting Inc.