MEDIATRACNET
The Nigerian public should beware of the activities of a hacking group perpetrating cyber-espionage in the African telecoms space, the Nigerian Communications Commission (NCC) has warned.
The NCC’s Director of Public Affairs, Ikechukwu Adinde, who disclosed this on Monday in Abuja said the warning was in keeping with the Commission’s commitment to continuously keep stakeholders in the country’s telecoms sector informed, educated and protected.
“An Iranian hacking group known as Lyceum (also known as Hexane, Siamesekitten, or Spirlin) has been reported to target telecoms.
“It also targets Internet Service Providers (ISPs) and Ministries of Foreign Affairs (MFAs) in Africa.
“This is with the upgraded malware in a recent politically-motivated attacks oriented in cyberespionage.
“Information about this cyber-attack is contained in the latest advisory issued by the Nigerian Computer Emergency Response Team (ngCERT) rating the probability and damage level of the new malware as high,” Adinde added.
Quoting an advisory report, Adinde said: “The hacking group is known to be focused on infiltrating the networks of telecoms companies and ISPs”, adding that between July and October, 2021, Lyceum was implicated in attacks against ISPs and telecoms organisations in Israel, Morocco, Tunisia, and Saudi Arabia.
Also, the group was linked to the Advanced Persistent Threat (APT) campaigns that hit Middle Eastern oil and gas companies in the past.
“Now, the group appears to have expanded its focus to the technology sector. In addition, the APT is responsible for a campaign against an unnamed African government’s Ministry of Foreign Affairs.
“By the attackers’ mode of operation, Lyceum’s initial onslaught vectors include credential stuffing and brute-force attacks.
“So, once a victim’s system is compromised, the attackers conduct surveillance on specific targets.
“In that mode, Lyceum will attempt to deploy two different kinds of malwares: Shark and Milan (known together as James),” he said.
The NCC spokesperson further explained that both malwares were backdoors, Shark, a 32-bit executable written in C# and .NET.
“They generate a configuration file for domain name system (DNS) tunneling or Hypertext Transfer Protocol (HTTP) C2 communications.
“However, Milan – a 32-bit Remote Access Trojan (RAT) retrieves data,” he said.
He said both malwares were able to communicate with the group’s command-and-control (C2) servers.
Adide said the APT maintained a C2 server network that connect to the group’s backdoors, consisting of over 20 domains.
“These include six that were previously not associated with the threat actors. According to reports, individual accounts at companies of interest were usually targeted.
”Once these accounts were breached, they would be used as a springboard to launch spear-phishing attacks against high-profile executives in any organization.”
Adinde said reports also suggested that not only do these attackers seek out data on subscribers and connected third-party companies, once compromised, threat actors or their sponsors can also use these industries conduct surveillance on individuals of interest.”
To guard against these kinds of threats, the NCC re-echoed ngCERT reports that multiply layers of security, in addition to constant network monitoring required by telecom companies and ISPs alike to stave off potential attacks.
He specifically advised telecom consumers and the general public to ensure the consistent use of firewalls, (software, hardware and cloud firewalls).
Adinde said individuals should enable a Web Application Firewall to help detect and prevent attacks coming from web applications by inspecting HTTP traffic.
“Install Up-to-date antivirus programmes to help detect and prevent a wide range of malware, trojans, and viruses, which APT hackers will use to exploit your system.
“Implement the use of Intrusion Prevention Systems that monitors your network. Create a secure sandboxing environment that allows you to open and run untrusted programs or codes without risking harm to your operating system.
“Ensure the use of Virtual Private Network (VPN) to prevent an easy opportunity for APT hackers to gain initial access to your company’s network. Enable spam and malware protection for your email applications, and educate your employees on how to identify potentially malicious emails,” he said.
Adide further urged that, for further technical assistance, individuals should contact, ” ngCERT on incident@cert.gov.ng.”
“The NCC reiterates its commitment to active surveillance and monitoring of cyber activities in the sector.
”It will always keep stakeholders in Nigeria’s telecommunications sector updated on potential threats within the cyber space to ensure the networks that deliver essential services are safe and that telecom consumers are protected from being victims of cyber-attacks,” he said. (NAN)