U.S. firm finds malware targeting visitors to Afghan government websites

U.S. firm finds malware targeting visitors to Afghan government websites

A magnifying glass is held in front of a computer screen in this picture illustration taken in Berlin May 21, 2013.

Credit: Reuters/Pawel Kopczynski

WASHINGTON (Reuters) – Malicious software likely linked to China is being used to infect visitors to a wide range of official Afghan government websites, U.S. cybersecurity researchers say.

 

ThreatConnect, a Virginia-based cybersecurity firm, said its researchers last week found a corrupted JavaScript file that is being used to host content on “gov.af” websites, and there are no antivirus protections available for the malware.

Rich Barger, chief intelligence officer of ThreatConnect, told Reuters his company was confident the new campaign, “Operation Poisoned Helmand,” was linked to the “Poisoned Hurricane” campaign detected this summer by another security firm, FireEye, that linked it to Chinese intelligence.

He said the latest attack was very recent and one timestamp associated with the Java file was from Dec. 16, the same day Chinese Prime Minister Li Keqiang visited Kazakhstan to meet with Afghanistan‘s chief executive officer, Abdullah Abdullah.

China is seeking to take a more active role in Afghanistan as the United States and NATO reduce their military presence.

“We found continued activity from Chinese specific actors that have used the Afghan government infrastructure as an attack platform,” Barger said, noting that Chinese intelligence could use the malware to reach a wide array of global targets checking trusted Afghan government sites for information.

Barger said the attack was a variant of what he called a typical “watering-hole” attack in which the attackers infect a large number of victims, and then follow up with the most “promising” hits to extract data.

He said researchers this summer saw a malicious Java file on the website of the Greek embassy in Beijing while a high-level delegation led by Keqiang was visiting Greek Prime Minister Antonis Samaras in Athens.

The two events were not directly related, Barger said, and additional research was needed into the status of ministerial and official government websites on or around the dates of notable Chinese delegations and or bilateral meetings.

The malware was found on a variety of Afghan government websites, including the ministries of justice, foreign affairs, education, commerce and industry, finance and women’s affairs, according to ThreatConnect, which was formerly known as CyberSquared.

The report emerged as the United States sought help from China, Japan, South Korea and Russia in combating cyber attacks such as the one Washington on Friday accused North Korea of carrying out against Sony Pictures.

(This version of the story was officially corrected by ThreatConnect to change the meeting location in paragraph four to Kazakhstan not Afghanistan.)

 

(Reporting by Andrea Shalal; Editing by Gunna Dickson and Eric Walsh)

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.