NetTraveler
Active
 
Cyberespionage toolkit
2013
 
Windows
2004
 
101-500
TOP TARGETED COUNTRIES:
Mongolia, India, Russia. In total, infections were identified in 40 countries.
  • Social engineering
  • Watering hole attacks
  • Exploits
  • Cyberespionage
  • Data theft
  • The crew behind NetTraveler specifically targets Tibetan/Uyghur activists.
  • NetTraveler infects high-profile targets: space exploration, nanotechnology, energy production, nuclear power, lasers, medicine and communications.
  • More than 22 gigabytes of stolen data is stored on NetTraveler’s C&C servers.
  • Office and Java exploits were used.
  • Activists
  • Energy, oil and gas companies
  • Academia/Research
  • Private companies
  • Government entities
  • Diplomatic organizations/embassies
  • Military
  • Based on collected intelligence, we estimate the group contains about 50 individuals, most of whom are native Chinese speakers and have a working knowledge of English.
The blog post and research paper are available at Securelist.com (blog post #1, blog post #2)