DarkHotel

Description

(SecurityWeek) The activities of the DarkHotel advanced persistent threat (APT) actor came to light in November 2014, when Kaspersky published a report detailing a sophisticated cyberespionage campaign targeting business travelers in the Asia-Pacific region. The group has been around for nearly a decade and some researchers believe its members are Korean speakers.

The attackers targeted their victims using several methods, including through their hotel’s Wi-Fi, zero-day exploits and peer-to-peer (P2P) file sharing websites. Nearly one year later, the threat group was observed using new attack techniques and an exploit leaked from Italian spyware maker Hacking Team.

DarkHotel victims have been spotted in several countries, including North Korea, Russia, South Korea, Japan, Bangladesh, Thailand, Taiwan, China, the United States, India, Mozambique, Indonesia and Germany. Up until recently, the attacks appeared to focus on company executives, researchers and development personnel from sectors such as defense industrial base, military, energy, government, NGOs, electronics manufacturing, pharmaceutical, and medical.

In more recent DarkHotel attacks it has dubbed “Inexsmar,” security firm Bitdefender said the hackers targeted political figures, and they appeared to be using some new methods.

Names

NameName-Giver
DarkHotelKaspersky
APT-C-06Qihoo 360
SIG25NSA
DubniumMicrosoft
Fallout TeamFireEye
Shadow CraneCrowdStrike
CTG-1948SecureWorks
Tungsten BridgeSecureWorks
ATK 52Thales
HigaisaTencent
T-APT-02Tencent
Luder?
Zigzag HailMicrosoft
TieOnJoe?
Purple PygmyPWC

Country

State-sponsored

Motivation

  • Information theft and espionage

First Seen

2007

Observed Sectors

Observed Countries

Tools

Operations

Information

Mitre Attack

Other Information

Uuid

142dc639-1360-4a2d-a839-11e62ca724e4

Last Card Change

2025-06-28