Never mind Russia: Turkey and Vietnam are Microsoft's new state-backed hacker threats du jour
It isn't just the big dogs preparing to bite, warns Redmond
Iran, Turkey and both North and South Korea are bases for nation-state cyber attacks, Microsoft has claimed – as well as old favourite Russia.
While more than half of cyberattacks spotted by Redmond came from Russia, of more interest to the wider world is information from the US megacorp's annual Digital Defence Report about lesser-known nation state cyber-attackers.
"After Russia, the largest volume of attacks we observed came from North Korea, Iran and China; South Korea, Turkey (a new entrant to our reporting) and Vietnam were also active but represent much less volume," said MS in a post announcing its findings.
While the usual suspects of Russia, China and North Korea are highlighted in the report, Vietnam's APT32 was highlighted by Microsoft's infosec people for targeting "human rights and civil organisations."
The Vietnam-linked group has a track record of not only spying on these but also "foreign corporations with a vested interest in Vietnam's manufacturing, consumer products, and hospitality sectors", according to Thailand's CERT.
"In the last year, espionage, and more specifically, intelligence collection, has been a far more common goal than destructive attacks," said Microsoft in its report, focusing on state threats to cyber security in general rather than Vietnam specifically. "While nations other than Iran mostly refrained from destructive attacks, they did continue to compromise victims that would be prime candidates for destructive attacks if tensions increased to the point where governments made strategic decisions to escalate cyber warfare."
Alongside Vietnam as a newer entrant to the ranks of state-backed threats was Turkey, singled out for hacking Middle Eastern and Balkans telcos. Threat group UNC1326 (aka SeaTurtle) was previously reported on in depth by Cisco Talos in 2019, which pointed out that SeaTurtle was targeting "national security organisations in the Middle East and North Africa" that wanted to gain "persistent access to sensitive networks and systems."
- Iranian state-backed hackers posed as flirty Scouser called Marcy to target workers in defence and aerospace
- Somebody's Russian to meddle with UK coronavirus vaccine efforts, but GCHQ won't take it lying down
- UK and chums call out Chinese Ministry of State Security for Hafnium Microsoft Exchange Server attacks
- Vietnam reveals state-run Alibaba-and-Amazon alternative, aims it at the EU
Microsoft said SeaTurtle was "most heavily focused on countries of strategic interest to Turkey including Armenia, Cyprus, Greece, Iraq, and Syria," scanning for exploitable remote code vulnerabilities in its targets' networks.
Aside from the state-backed threats, the Microsoft report noted that ransomware criminals were most likely to target retail, financial services, government and healthcare orgs, with the US being their number one target nation. The next unluckiest countries as far as ransomware was concerned were China, Japan, Germany and the United Arab Emirates.
"Fewer than 20 per cent of our customers are using strong authentication features like multifactor authentication," groaned Redmond in its closing remarks, noting that offering MFA "for free" wasn't spurring companies and other organisations into enabling it.
If they did, Microsoft thinks its security customers would "be protected from over 99 per cent of the attacks we see today." Something worth thinking about next time your users are moaning about password policies. ®
- Internet Explorer
- Microsoft 365
- Microsoft Build
- Microsoft Edge
- Microsoft Office
- Microsoft Surface
- Microsoft Teams
- Office 365
- Patch Tuesday
- SQL Server
- Visual Studio
- Visual Studio Code
- Windows 10
- Windows 11
- Windows 7
- Windows 8
- Windows Server
- Windows Server 2003
- Windows Server 2008
- Windows Server 2012
- Windows Server 2013
- Windows Server 2016
- Windows XP
- Xbox 360