July 26, 2016 By Douglas Bonderud 2 min read

Industrial espionage is alive and well in the cloud age. In some cases, corporations leave themselves inherently vulnerable to such attacks. In other cases, as Softpedia noted, they may be targeted by ancient password stealers hosted on compromised web servers.

Either way, company secrets are at risk. Whether breaches originate from served-up server attacks or C-suite missteps, organizations must be cognizant of their intellectual risk.

Old Tricks Still Effective

While sophisticated cybercrime techniques are emerging as malicious actors improve their craft, it’s often more effective for cybercriminals to use existing, proven tools. That’s the case with McAfee’s latest find, a compromised web server running the ISR Stealer package, itself a modified Hackhound infostealer module that made its debut in 2009.

Thanks to some sloppy work by cybercriminals, McAfee’s teams discovered the command-and-control (C&C) server’s ZIP installation package, uncovered its source code and found that the industrial espionage campaign wasn’t ancient history — it actually started in January 2016, targeting machinery manufacturing companies.

Attackers used spear phishing emails containing malicious attachments to spread the malware, which could lift passwords from IE, Chrome, Firefox, Opera, Safari, Yahoo, MSN and other programs. The malware would then send password data to the C&C server via an HTTP request.

While there’s no data on how many companies were compromised or what information was stolen, the compromised web server makes it clear: Age doesn’t matter if users can be convinced to open malicious attachments.

The New Face of Industrial Espionage

Of course, fighting off old industrial espionage tricks is only half the battle. As noted by The Recorder, companies now struggle with bring-your-own-cloud (BYOC) scenarios.

In one example, an organization encouraged an employee to create a Box storage account that pushed copies of all files saved to the company laptop to the cloud. When the employee changed jobs, the original employer made no effort to disable the account or restrict access. In turn, the employee shared confidential pricing information with a competitor at the new job.

According to SC Magazine, there are also concerns around new apps such as “Pokemon Go.” Alexander Gorokhov, formerly a major-general in the Russian Federal Security Service, said that mobile apps may pose a serious threat to national security as “highly effective” cyber espionage tools.

New Challenges in the Age of Cloud

Put simply, industrial espionage is on the way up in the age of cloud computing. Compromised web servers running ancient malware offer near-limitless access if attackers can get their foot in the door. Meanwhile, new challenges such as BYOC and mobile games represent a shift to dynamic and constantly evolving threats to intellectual property.

While there’s no surefire way to secure networks, oversight must be the backbone of IT. Email attachments are always suspect. New apps must be limited in scope and access, and cloud services can’t be ignored simply because they’re easy or off-site. IP is valuable, so cybercriminals won’t limit themselves to a single threat vector.

More from

What does resilience in the cyber world look like in 2025 and beyond?

6 min read -  Back in 2021, we ran a series called “A Journey in Organizational Resilience.” These issues of this series remain applicable today and, in many cases, are more important than ever, given the rapid changes of the last few years. But the term "resilience" can be difficult to define, and when we define it, we may limit its scope, missing the big picture.In the age of generative artificial intelligence (gen AI), the prevalence of breach data from infostealers and the near-constant…

Airplane cybersecurity: Past, present, future

4 min read - With most aviation processes now digitized, airlines and the aviation industry as a whole must prioritize cybersecurity. If a cyber criminal launches an attack that affects a system involved in aviation — either an airline’s system or a third-party vendor — the entire process, from safety to passenger comfort, may be impacted.To improve security in the aviation industry, the FAA recently proposed new rules to tighten cybersecurity on airplanes. These rules would “protect the equipment, systems and networks of transport…

Protecting your digital assets from non-human identity attacks

4 min read - Untethered data accessibility and workflow automation are now foundational elements of most digital infrastructures. With the right applications and protocols in place, businesses no longer need to feel restricted by their lack of manpower or technical capabilities — machines are now filling those gaps.The use of non-human identities (NHIs) to power business-critical applications — especially those used in cloud computing environments or when facilitating service-to-service connections — has opened the doors for seamless operational efficiency. Unfortunately, these doors aren’t the…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today