Classified documents relating to the missing Malaysian Airlines Flight MH370 were stolen using a carefully-crafted spear-phishing attack, targeting 30 government officials just one day after the disappearance of the still-missing aircraft.
The Malaysian Star claims that the attack targeted officials with a PDF document which appeared to be a news report about Flight MH370, and was sent to a group of investigators. Around 30 computers were infected by the malware.
âWe received reports from the administrators of the agencies telling us that their network was congested with e-mail going out of their servers,â CyberSecurity Malaysia chief exec Dr Amirudin Abdul Wahab said.
Flight MH370: âConfidential dataâ
âThose e-mail contained confidential data from the officialsâ computers, including the minutes of meetings and classified documents. Some of these were related to the Flight MH370 investigation.â
Business Insider says that the attack occurred one day after the Boeing 777 went missing, and took the form of an .exe file disguised as a PDF (a common office file format).
Itâs unclear who the attacker – or attackers – were, but information from infected computers was transmitted to an IP address in China. Officials in Malaysia blocked the transmission, The Star said.
âVery sophisticated attackâ
Department of Civil Aviation, the National Security Council and Malaysia Airlines were among those targeted by the hacker, the Telegraph reports. The infected machines were shut down, but âsignificant amountsâ of information on Flight MH370 had been stolen.
âThis was well-crafted malware that antivirus programs couldnât detect. It was a very sophisticated attack,â Amirudin said.
CyberSecurity Malaysia suspects the motivation may have been curiosity about supposedly âsecretâ information held by the Malaysian government on Flight MH370.
âAt that time, there were some people accusing the Government of not releasing crucial information,â Amirudin said.âBut everything on the investigation had been disclosed.â
The post Flight MH370 – did cyber attack steal its secret? appeared first on We Live Security.