Loading...

23 Mar 2026 12:47

Advertising & Marketing

Cisco warns of a hacking campaign targeting the aviation industry

Cisco detected a targeted phishing campaign aimed at the aviation industry for two years, which was potentially organized by cyber threat actor(s) operating out of Nigeria.

The actor(s) have been targeting the aviation industry for the last two years, while managing other campaigns at the same time. Researchers found that they do not seem to be technically sophisticated as they’re using off-the-shelf malware since the beginning of their activities without developing their own malware.

The operators also bought crypters that enable the usage of such malware without being detected. Throughout the years they used several different cryptors, mostly bought on online forums and are believed to have been active since 2013.

The cyber attacks involve emails containing specific lure documents centered around the aviation or cargo industry that purport to be PDF files but link to a VBScript file, which ultimately leads to the delivery of remote access trojans (RATs), leaving organizations vulnerable to an array of security risks.

Actors that perform smaller incidents can keep doing them for a long period of time under the radar. However, their activities can lead to major incidents at large organizations. These are the operators that feed the underground market of credentials and cookies, which can then be used by larger groups on activities.

Commenting on the targeted attacks, Fady Younes, Cybersecurity Director at Cisco Middle East and Africa said: “Many operators can have limited technical knowledge but still be able to operate RATs or information-stealers – posing a significant risk to large corporations given the right conditions. In this case, what appeared to be a simple campaign was, in fact, a continuous operation that has been active for years – targeting a whole industry with commodity malware hidden with different crypters.”

“Even though cybersecurity is not a threat specific to aviation, in the last few years the sector has been at the forefront of several cyber attacks. It is crucial to be careful with weak links that could lead to flawed conclusions. The weak links shouldn’t be discarded — it would be wise to view them as one more piece of information that, together with other links, can yield to a much stronger relationship between two pieces of information,” Younes added.

NULL
(Visited 7 times, 1 visits today)
peri hokiperihokiduta76duta 76ABC1131 - MPO SLOTABC1131 Bandar Slot Togelmix parlay agen slot qrisMPOGALAXYslot thailandAWSBETkincir88ABC1131ABC1131 LOGINhttps://abc1131.hartanzah.com/https://www.abc1131.it.com/aws langkah praktis mahjong rtpaws metode modern mahjong historisaws pendekatan adaptif mahjong risikoaws strategi multiplier olympus dinamisaws transformasi digital mahjong transparanaws data rtp pola harianaws dinamika rtp speed wildbanditoaws rekap rtp variansi sesiaws simulasi rtp perhatian pemainaws vitalitas rtp live serveraws pendekatan sistemik mahjong kombinasiaws perencanaan olympus multiplier konsistenaws strategi rtp teknologi informasiaws studi rtp keputusan sesiaws taktik bertahan mahjong penggunae3 jangan keliru lagi ritme bermain cepat ternyata kurang efektif di mahjong wayse3 kajian slot online mengenai pergerakan mahjong ways dari sudut data permainane3 kelihatan sepele tapi bermain cepat bisa membuat peluang bonus menurune3 kesalahan umum pemain mahjong ways terlalu ngebut saat mengejar bonus Top