Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Things Get Ugly When Hackers Turn on Each Other [VIDEO]

b2ap3_thumbnail_hacker_vs_hacker_400.jpgNormally in cybersecurity, we hear about hacking attacks and immediately sympathize with the victim. It’s usually an individual or a business that suffers the most; yet, a recent trend is showing that hackers are lashing out at one another in response to certain threats. In response to a hack from the cyberespionage group Naikon, another group, Hellsing, retaliated with their own attack.

It might seem like a classic case of good ol’ revenge, but the researchers at Kaspersky Labs seem to think it hints toward a new trend in the world of cybercrime. They are calling it the advanced persistent threat (APT) wars, in which two major threats duke it out for supremacy over their target.

The attack in question was initiated on April 15, 2015, when Naikon targeted the smaller threat, Hellsing, with a spear phishing attack. Hellsing, however, didn’t respond well to the attack, and instead turned their own malware against Naikon. Naikon responded by posing as a member of a foreign government. As you might imagine, this back-and-forth action continued with both parties, ultimately resulting in Hellsing sending a password-protected message containing a backdoor specially made to target Naikon.

Commenting on the behavior of these two entities, Costin Daiu, Director of the Global Research and Analyst Team of Kaspersky Labs, reports:

The targeting of the Naikon group by Hellsing, in some sort of a vengeful vampire-hunting -- "Empire Strikes Back" style, is fascinating. In the past, we've seen APT groups accidentally hitting each other while stealing address books from victims and then mass-mailing everyone on each of these lists. However, considering the targeting and origin of the attack, it seems more likely that this is an example of a deliberate APT-on-APT attack.

These two threats going after each other tooth and claw was likely in the interest of gathering information; something which advanced persistent threats are known for. It’s an interesting exchange of blows, almost like they’re trying to outsmart each other. It’s the classic example of who can gain advantage of vital information that can be leveraged for greater profits.

Will the future see a world in which cybercriminals scramble for power, only to fall from grace and be lost to the ages, like the remains of an empire spreading itself too thin? Only time can tell. In the meantime, not even other hackers are safe from advanced persistent threats that lurk on the Internet. As a business owner and end user, the last thing you want to do is get caught between two wild hacking animals vying for a scrap of meat. Be sure to keep your machines up to date with the latest patches and upgrades that will minimize the possibility of a hacking attack.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, 05 February 2026

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support Privacy IT Services Google Email Workplace Tips Computer Phishing Collaboration Hosted Solutions Workplace Strategy Users Ransomware Small Business Mobile Device Microsoft Backup Productivity Managed Service Quick Tips Passwords Saving Money Communication Cybersecurity Smartphone Data Backup Android AI Data Recovery Upgrade Disaster Recovery VoIP Business Management Smartphones Mobile Devices communications Windows Browser Social Media Microsoft Office Managed IT Services Network Current Events Tech Term Remote Internet of Things Information Holiday Artificial Intelligence Facebook Automation Miscellaneous Cloud Computing Covid-19 Training Gadgets Server Managed Service Provider Remote Work Compliance IT Support Outsourced IT Employee/Employer Relationship Encryption Spam Office Windows 10 Government Data Management Business Continuity Blockchain Windows 10 Bandwidth Business Technology Virtualization Wi-Fi Data Security Two-factor Authentication Mobile Office Vendor Apps BYOD Mobile Device Management Chrome Gmail Budget WiFi Apple Tip of the week App Managed Services Employer-Employee Relationship Voice over Internet Protocol Networking BDR Information Technology Avoiding Downtime Marketing Office 365 HIPAA Applications Access Control Conferencing Computing How To Hacker Risk Management Website Router Analytics Office Tips Augmented Reality Virtual Private Network Storage Password Health Help Desk Bring Your Own Device 2FA Big Data Retail Healthcare Operating System Managed IT Services Computers Free Resource Project Management Windows 7 Patch Management Save Money Remote Monitoring End of Support Microsoft 365 Vulnerability Vendor Management Solutions Physical Security Firewall Display Printer Paperless Office Infrastructure The Internet of Things Windows 11 Monitoring Social Document Management Excel Going Green Remote Workers Telephone Scam Data loss Customer Service Cybercrime Cooperation Data Privacy Cryptocurrency Wireless Technology Images 101 Robot Telephone System Cost Management Multi-Factor Authentication Virtual Desktop Mobility Data storage LiFi Word IT Management Meetings Outlook VPN Employees Money Modem Humor Integration User Tip Processor Computer Repair Mobile Security Safety Sports Mouse Holidays Smart Technology Data Storage Machine Learning Administration Supply Chain Saving Time Video Conferencing Managed Services Provider Virtual Machines Professional Services Managed IT Service Maintenance Downloads Customer Relationship Management Antivirus Settings Printing Wireless Licensing iPhone Content Filtering Entertainment Hacking Presentation YouTube Vulnerabilities Data Analysis Star Wars How To Microsoft Excel Supply Chain Management FinTech Term Google Apps Gamification 5G Notifications Staff Travel Social Networking Legislation IP Address Google Docs IT Assessment Unified Communications IT Maintenance Experience Business Intelligence Value Techology Fileless Malware Running Cable Google Maps Flexibility Bitcoin Organization Google Wallet Shortcuts Content Wearable Technology Unified Threat Management Motherboard Digital Security Cameras Comparison Smart Devices Recovery Ransmoware Health IT Vendors Memory Unified Threat Management Directions Laptop Assessment Permissions Remote Working Hard Drives Windows 8 Domains Drones Data Breach Google Play Be Proactive Videos Network Congestion Specifications Electronic Health Records Workforce Threats Wasting Time User Error Microchip Halloween Internet Exlporer Fraud Refrigeration Public Speaking Trend Micro Security Cameras Workplace Strategies Username Point of Sale Black Friday Lithium-ion battery Software as a Service Meta Amazon Managing Costs Entrepreneur Scary Stories Database Hacks eCommerce SSID Network Management Fun Tech Support IT Technicians Cookies Monitors Cyber Monday Surveillance Deep Learning Virtual Assistant Outsource IT Proxy Server Environment Virtual Machine Media Tactics Hotspot Undo Reviews Education Medical IT Websites Mirgation Nanotechnology Development Transportation Small Businesses Mobile Computing Displays Hypervisor SharePoint Addiction Electronic Medical Records Language Chatbots Shopping Optimization PowerPoint Management Search Lenovo Screen Reader Writing Distributed Denial of Service Application Best Practice Employer/Employee Relationships Outsourcing Buisness Navigation Service Level Agreement Virtual Reality Computing Infrastructure PCI DSS Private Cloud Identity Gig Economy IBM Legal IT solutions Workplace Server Management Superfish Bookmark Identity Theft Smart Tech Internet Service Provider Business Growth Teamwork Hiring/Firing Evernote Paperless Download Twitter Alerts Regulations Compliance Error Memes Co-managed IT Cortana Browsers Connectivity Social Engineering Break Fix Net Neutrality Alt Codes SQL Server Technology Care Financial Data Competition History Downtime Business Communications Upload Remote Computing Smartwatch Multi-Factor Security IT Hosted Solution Scams Social Network Hybrid Work Azure Tablet IoT Dark Web Procurement Typing Telework Cyber security Tech Human Resources Trends Alert File Sharing Regulations CES Dark Data Google Calendar Google Drive Communitications User Cables Managed IT Customer Resource management Knowledge

Blog Archive