sb-as logo
Story image

Vietnam CERT plays major part in ASEAN cyber response drill

13 Sep 2017

Vietnam’s Computer Emergency Response Team (VNCERT) conducted a major ASEAN CERT Incident Drill this week, which brought together emergency response teams from five different countries.

This year’s drill involved representatives from different ministries, sectors and localities from Southeast Asia, Australia, China, Japan, India and South Korea.

The drill, titled ‘Prevention of the dangers of lack of authentication and weak access control’, was also used to create scenarios for the various CERTs involved in the processing, investigation, analysis, troubleshooting and incident reporting.

The aim was to strengthen and maintain smooth communication between countries and their responses to network emergencies.

Deputy Minister of Information and Communications, Nguyen Thanh Hung also attended the drill and delivered the opening speech.

He also required the Vietnam CERT and other unity to develop their drill completion capacity and to comply with all international regulations in their common activities.

VNCERT states that Vietnam cyberspace is plagued with incidents. As of September 8 2017, VNCERT has been involved in recording and handling 1762 phishing scams, 4595 malware attacks and 3607 defacement attacks.

In a report by cybersecurity firm FireEye, researchers suspect that cyber espionage actors APT32, also known as OceanLotus Group, were behind many attacks against companies with business interests in Vietnam.

“Since at least 2014, FireEye has observed APT32 targeting foreign corporations with a vested interest in Vietnam’s manufacturing, consumer products, and hospitality sectors,” FireEye researcher Nick Carr says.

One of the suspected attacks was against Vietnamese and foreign-owned corporations in network security, technology infrastructure, banking and media. The attack occurred in 2016.

Between 2016 and 2017, Vietnam-based subsidiaries of US and Phillipine consumer products companies were also targeted.

According to Carr, APT32 actors once used a spear phishing attachment that was called ‘Plans to crackdown on protesters at the Embassy of Vietnam.exe’.

In 2015 and 2016, two Vietnam-based media agencies were also targeted with malware suspected to belong to APT32, and this year the group has used social engineering content to go after Vietnamese targets in Australia.

“APT32 operators appear to be well-resourced and supported as they use a large set of domains and IP addresses as command and control infrastructure,” he says in the blog.

Carr believes that APT32 is a cyber espionage group aligned with Vietnamese government interests.

“Targeting of private sector interests by APT32 is notable and FireEye believes the actor poses significant risk to companies doing business in, or preparing to invest in, the country. While the motivation for each APT32 private sector compromise varied – and in some cases was unknown – the unauthorized access could serve as a platform for law enforcement, intellectual property theft, or anticorruption measures that could ultimately erode the competitive advantage of targeted organizations,” he concludes.

Story image
Pandemic sees organisations of all sizes and industries invest in CTI
There is opportunity for organisations to better manage their cyber-threat intelligence for greater security and threat intelligence effectiveness by adopting the right tools and processes.More
Story image
5G network security a US$9 billion dollar opportunity - report
The cloud-native nature of 5G networks will have a disruptive and positive impact on the cybersecurity industry in the next few years, with 5G network security presenting a US$9 billion enterprise market opportunity by 2025.More
Story image
Attivo Networks expands Active Directory suite for greater protection
"We see Active Directory exploitation used in the majority of ransomware, insider and advanced attacks. We are pleased to now offer our customers early and efficient solutions for preventing the misuse of Active Directory.”More
Story image
Enterprises underutilising security tools, causing teams to burn out
The report unveiled a lack of meaningful ROI metrics when reporting on security progress, as well as disparate opinions on objectives, tool effectiveness and security awareness amongst the organisation between executives and operations on security teams.More
Link image
Virtual demo: Diagnose network cabling problems with the LinkIQ Cable+Network Tester
If you’re finding it difficult to install access points and cabling, or if you can’t pinpoint an issue with a video camera or end user, the LinkIQ Cable+Network Tester could be exactly what you need. Try a free, fully interactive demo now.More
Link image
Webinar: Securing privileged access to stop attackers in their tracks
Thycotic's immersive webinar will demonstrate how attackers acquire passwords on endpoints and access critical cloud applications — without being detected.More