Wipro Data Breach Attackers Were Active Since 2015, Security Researchers Claim

The attackers were found to have used remote access tool ScreenConnect to compromise employee machines within Wipro.

Advertisement
By Jagmeet Singh | Updated: 2 May 2019 14:47 IST
Highlights
  • Flashpoint researchers have analysed the recent Wipro attack
  • The researchers claimed many legitimate security applications were abused
  • Wipro attackers had allegedly reused most of the infrastructure

Wipro hasn't yet revealed the specifics around the phishing campaign that took place last month

Wipro last month revealed an advanced phishing campaign that had targeted some of its employee accounts. While the IT giant didn't detail the infiltration, researchers at business risk intelligence firm Flashpoint have now claimed that the hackers were active in the shadows for some time. The researchers also discovered that many legitimate security applications were abused during the phishing campaign. The attackers were also found to have used remote access tool ScreenConnect to allegedly compromise employee machines within Wipro. Cyber-security blog KrebsOnSecurity first reported the data breach impacting the network of Wipro last month. The company itself confirmed the attack at a later stage.

Flashpoint researchers Jason Reaves, Joshua Platt, and Allison Nixon in a detailed blog post have pointed out that the Wipro breach reported last month impacted many legitimate security applications. During initial research, it has been found that the attackers could be linked to older malicious activities from 2017 and even possibly 2015, and had reused most of the infrastructure of previous attacks for their current ones.

Advertisement

The attackers used ScreenConnect on the machines they comprised within Wipro, while some of the domains used during the attack were hosting Powerkatz and Powersploit scripts, the researchers noted.

"Dozens of Wipro employees were victims of phishing attacks, and the threat actors gained access to more than 100 Wipro computer systems," the researchers said in the blog post. "The ultimate aim of the group behind the Wipro attack appears to be gift-card fraud."

Advertisement

The Flashpoint researchers also underlined that through the analysis of the indicators of compromise (IOCs), a half-dozen of the malicious domains were hosting templates consistent with credential phishing attempts. Those templates are claimed to have helped attackers access encrypted email by exploiting the usernames and passwords of the affected machines.

Wipro hasn't yet divulged the technologies behind the phishing campaign. However, at the time of investing the campaigns internally, the Flashpoint analysts found evidence of attempts to spread malware called Imminent Monitor. A Word document containing and message and attachment matching the name structure of a campaign back in 2017 was also spotted by the analysts.

Advertisement

"The document contained a URL that redirected to a file hosted at flexmail[.]tv, which appeared to have been used multiple times to deliver documents and payloads in other campaigns," the researchers explained. "The email header, meanwhile, revealed an IP address, 123.242.230[.]14, that showed multiple malware samples communicating to it that were identified as the Netwire remote access Trojan."

In an email interview with Threatpost, Reaves and Platt said that the main takeaway was the actors behind the Wipro breach were not new and had been operating under the radar for some time -- much longer, in fact, than the 2019-2018 recent events suggests. The researchers also claimed that their research suggested that attack wasn't particularly "advanced", which is unlike what Wipro mentioned in its public release last month, since the actors involved apparently had a "strong understanding of corporate relationships and environments" and had "considerable" infrastructure to attack.

Advertisement

KrebsOnSecurity in its blog post last month had said the systems at Wipro were being used to target at least a dozen customer systems. "We detected a potentially abnormal activity in a few employee accounts on our network due to an advanced phishing campaign," Wipro had said in an emailed statement to the media while publicly announcing the attack.

 

Get your daily dose of tech news, reviews, and insights, in under 80 characters on Gadgets 360 Turbo. Connect with fellow tech lovers on our Forum. Follow us on X, Facebook, WhatsApp, Threads and Google News for instant updates. Catch all the action on our YouTube channel.

Further reading: Wipro
Advertisement

Related Stories

Popular Mobile Brands
  1. Poco M8s 5G Debuts Globally With 7,000mAh Battery: See Price, Features
  2. Oppo Find X9 Ultra With 200-Megapixel Periscope Camera Launched Globally
  3. Vivo X300 FE Roundup: Expected Price in India, Specifications
  4. Oppo Find X9s Pro Launched With 200-Megapixel Cameras: See Price, Features
  5. Motorola Edge 70 Fusion Review
  6. Redmi K90 Max Debuts With Active Cooling Fan, 8,550mAh Battery: See Price
  7. OnePlus Ace 6 Ultra's Key Specifications Surface via Geekbench Listing
  8. Vivo Y6t Launched With 6,500mAh Battery, Snapdragon 4 Gen 2 SoC
  9. These Vivo Smartphones Will Cost More in India Due to the Latest Price Hike
  1. NASA Shuts Down Voyager 1 Instrument to Extend Mission Life in Deep Space
  2. Oppo Enco Clip 2 With Open-Ear Design, Up to 40 Hours Total Battery Life Launched Alongside Oppo Watch X3 Mini
  3. Vivo Y6t Launched With 6,500mAh Battery, Snapdragon 4 Gen 2 SoC: Price, Specifications
  4. OCBC Partners Lion Global Investors and DigiFT to Launch Tokenised Gold Fund With GOLDX Token
  5. Oppo Pad 5 Pro Launched With 13,380mAh Battery, Snapdragon 8 Elite Gen 5 SoC Alongside Oppo Pad Mini: Price, Features
  6. Redmi K90 Max Launched With Dimensity 9500 SoC, 8,550mAh Battery and Active Cooling Fan: Price, Specifications
  7. Oppo Find X9 Ultra Launched With Snapdragon 8 Elite Gen 5 SoC, 200-Megapixel Periscope Camera: Price, Specifications
  8. Oppo Find X9s Pro Launched With 200-Megapixel Cameras, 7,025mAh Battery: Price, Specifications
  9. OnePlus Ace 6 Ultra Geekbench Listing Reveals MediaTek Dimensity 9500 Chip, 16GB RAM
  10. Motorola Edge 70 Pro+ Leaked Renders Hint at Design, Five Colour Options
Download Our Apps
Available in Hindi
© Copyright Red Pixels Ventures Limited 2026. All rights reserved.