Categories: Security

Luxury Hotel Wi-Fi Hacked To Target Business Executives

High-powered executives staying in luxury foreign hotels are being targeted by a new security threat which looks to spy into their devices, a report has revealed.

Following a four year-long investigation, web security firm Kaspersky has revealed that the “Darkhotel” APT (Advanced Persistent Threat) is able to spy into the devices of business leaders, attacking them as they try to connect to a compromised hotel Wi-Fi network.

Upon connecting, the threat tricks the user into downloading a backdoor masquerading as a legitimate software update, which infects the device with Darkhotel.

This spying software then hunts through the victim’s cached passwords, login credentials and steals keystrokes entered on the device, with the aim of accessing the intellectual property of the business entities the user represents.

Targeted

Darkhotel has already infected networks at luxury hotels around the world, meaning that thousands of users could have potentially been compromised and had their details stolen, with Kaspersky saying that travellers to the APAC (Asia-Pacific) region are particularly at risk.

The firm says that the highest volume of offensive activity on hotel networks started in August 2010 and continued through 2013, although it is also investigating some 2014 hotel network events. Much of the threats appears to have come from Japan, Taiwan, China, Russia and South Korea, although these countries are typically high distributors of malware.

The threat appears to be a highly-selective spear-phishing tool, as Kaspersky researchers visiting the infected hotels with so-called honeypot devices, designed to try and lure out attackers, remained unaffected.

Among the victims identified by Kaspersky were executives from the private equity, pharmaceutical and electronics manufacturing industries. Worryingly, however, the attackers were also able to infect figures from law enforcement, military services and non-governmental organisations.

Victims also often continued to be hacked after they had left the infected hotel, with the attackers keeping up their efforts as their targets travelled around the world.

“The mix of both targeted and indiscriminate attacks is becoming more and more common in the APT scene, where targeted attacks are used to compromise high profile victims, and botnet-style operations are used for mass surveillance or performing other tasks such as DDoSing hostile parties or simply upgrading interesting victims to more sophisticated espionage tools” said Kurt Baumgartner, Principal Security Researcher at Kaspersky Labs.

APT threats often go undetected by many users due to the complex methods, often implemented covertly over long periods of time, used by hackers to get devices infected. For this reason, they are a perfect way for cybercriminals to attack large businesses or organisations such as government bodies.

What do you know about Internet security? Find out with our quiz!

Mike Moore

Michael Moore joined TechWeek Europe in January 2014 as a trainee before graduating to Reporter later that year. He covers a wide range of topics, including but not limited to mobile devices, wearable tech, the Internet of Things, and financial technology.

Recent Posts

US Urges No AI Control Of Nuclear Weapons

No skynet please. After the US, UK and France pledge human only control of nuclear…

59 mins ago

LastPass Separates From Parent After Security Incidents

New chapter for LastPass as it becomes an independent company to focus on cybersecurity, after…

3 hours ago

US To Ban Huawei, ZTE From Certifying Wireless Kit

US FCC seeks to ban Chinese telecom firms at centre of national security concerns from…

7 hours ago

Anthropic Launches Enterprise-Focused Claude, Plus iPhone App

Two updates to Anthropic's AI chatbot Claude sees arrival of a new business-focused plan, as…

9 hours ago

TikTok Viewed As Chinese Influence Tool By Most Americans – Poll

Most people in the United States view TikTok as a Chinese influence tool a poll…

23 hours ago