Sunday, June 7, 03:51
Home security The Avivore hacking team uses the "island hopping" technique and targets companies

The Avivore hacking team uses the "island hopping" technique and targets companies

AvivoreAccording to one security company, there are many groups hackers which are very dangerous and we ignore them. Often when we hear of major attacks on multinationals in the Europe and America, our mind goes to well-known hackers, such as China's APT10 team. However, this is not always the case. Context researchers have identified an unknown group, which they named Avivore.

According to researchers, this group is enough "Smart" to cover its tracks effectively. The company believes the team attacks 2015. However, most of them attacks have been noticed in the last year.

Researchers now believe that Avivore was hiding behind the recent airline attacks Airbus. Initially, the attacks were linked to the APT10 team and the state team security of China (JSSD).

The hacking team used Airbus partners such as Rolls-Royce and Expleo to influence the airline.

This reflects her strategy used by Avivore. Hackers are using it 'Island hopping' technique. According to this technique, hackers target a large company indirectly, through its weaker and less protected partners. However, they choose key partners rather than companies that could be easily replaced.

One of the Context researchers said: “They are Companies targeting, they are the only ones who could supply a specific one product, so they just can't be replaced by anyone else. "

This technique makes it very difficult to deal with attacks.

Avivore hackers were presented as legitimate users to invade networks of suppliers. They mainly used VPNs and other tools for remote access. Hackers could thus bypass them systems security of the largest target company and at the same time cover their tracks.

Researchers believe the group aims at intellectual property of its victims. Its goal is not only for airlines, but also for military equipment companies, automakers, energy industries and many more.

The attacks on these entities did a lot researchers connect them to the APT10 and JSSD groups. However, AVIVORE uses different tools and different tactics.

"There is definitely a resemblance to the types of industries and technologies they are targeting, and it would be reasonable to assume that these groups have the same motivation," said the Context researcher "but we cannot say for sure."

Whoever is behind the attacks, the only sure thing is that companies need to take more security measures and take care of the safety of their key suppliers and partners.


Please enter your comment!
Please enter your name here

Absent Mia
Absent Mia
Being your self, in a world that constantly tries to change you, is your greatest achievement


Lyrics from AI technology or from people: Can you tell them apart?

While a large percentage of people can recognize when they are talking on a chatbot instead of a human operator, it seems that this is not the case ...

Technology and children: When are they ready for safe use?

Today's children and teens use various messaging apps and social media to ...

Call of Duty Black Ops Cold War: The first video leaked

The first video from the gameplay of Call of Duty 2020, which is rumored to be called Black Ops Cold War, has just been revealed.

Elon Musk: "It's time to break up Amazon"

Elon Musk intensifies the fight with Jeff Bezos with a new tweet: The General Manager of Tesla Inc., Elon Musk, said ...

Attack on America's 5G towers on Saturday!

Protests over 5G connectivity are scheduled to take place over the weekend, according to NATE. According to a recommendation that was identified ...

Windows 10 Updates: You can block them with Wu10Man!

Microsoft launched the Windows 10 update in May 2020, so it will be available on your computer soon ....

ECh0raix Ransomware: New campaign targets QNAP NAS devices!

Malicious agents behind eCh0raix Ransomware have launched a new campaign targeting QNAP NAS devices. ECh0raix was observed ...

Mac: How to change the storage location of your screenshots?

When you take screenshots on your Mac device using the Shift-Command-3 shortcut to take a screenshot of the entire computer screen or Shift-Command-4 ...

Malware USBCulprit: Aims devices that are not connected to a network

Did you think that devices without any connection to a local or other network (air-gapped devices) are safe? Think again! The USBCulprit malware that ...

Free Microsoft Teams: You can finally create meetings!

Users of the free version of Microsoft Teams can now create video meetings. The change, identified by ...