Wipro Data Breach Attackers Were Active Since 2015, Security Researchers Claim

The attackers were found to have used remote access tool ScreenConnect to compromise employee machines within Wipro.

Advertisement
By Jagmeet Singh | Updated: 2 May 2019 14:47 IST
Highlights
  • Flashpoint researchers have analysed the recent Wipro attack
  • The researchers claimed many legitimate security applications were abused
  • Wipro attackers had allegedly reused most of the infrastructure

Wipro hasn't yet revealed the specifics around the phishing campaign that took place last month

Wipro last month revealed an advanced phishing campaign that had targeted some of its employee accounts. While the IT giant didn't detail the infiltration, researchers at business risk intelligence firm Flashpoint have now claimed that the hackers were active in the shadows for some time. The researchers also discovered that many legitimate security applications were abused during the phishing campaign. The attackers were also found to have used remote access tool ScreenConnect to allegedly compromise employee machines within Wipro. Cyber-security blog KrebsOnSecurity first reported the data breach impacting the network of Wipro last month. The company itself confirmed the attack at a later stage.

Flashpoint researchers Jason Reaves, Joshua Platt, and Allison Nixon in a detailed blog post have pointed out that the Wipro breach reported last month impacted many legitimate security applications. During initial research, it has been found that the attackers could be linked to older malicious activities from 2017 and even possibly 2015, and had reused most of the infrastructure of previous attacks for their current ones.

The attackers used ScreenConnect on the machines they comprised within Wipro, while some of the domains used during the attack were hosting Powerkatz and Powersploit scripts, the researchers noted.

Advertisement

"Dozens of Wipro employees were victims of phishing attacks, and the threat actors gained access to more than 100 Wipro computer systems," the researchers said in the blog post. "The ultimate aim of the group behind the Wipro attack appears to be gift-card fraud."

Advertisement

The Flashpoint researchers also underlined that through the analysis of the indicators of compromise (IOCs), a half-dozen of the malicious domains were hosting templates consistent with credential phishing attempts. Those templates are claimed to have helped attackers access encrypted email by exploiting the usernames and passwords of the affected machines.

Wipro hasn't yet divulged the technologies behind the phishing campaign. However, at the time of investing the campaigns internally, the Flashpoint analysts found evidence of attempts to spread malware called Imminent Monitor. A Word document containing and message and attachment matching the name structure of a campaign back in 2017 was also spotted by the analysts.

Advertisement

"The document contained a URL that redirected to a file hosted at flexmail[.]tv, which appeared to have been used multiple times to deliver documents and payloads in other campaigns," the researchers explained. "The email header, meanwhile, revealed an IP address, 123.242.230[.]14, that showed multiple malware samples communicating to it that were identified as the Netwire remote access Trojan."

In an email interview with Threatpost, Reaves and Platt said that the main takeaway was the actors behind the Wipro breach were not new and had been operating under the radar for some time -- much longer, in fact, than the 2019-2018 recent events suggests. The researchers also claimed that their research suggested that attack wasn't particularly "advanced", which is unlike what Wipro mentioned in its public release last month, since the actors involved apparently had a "strong understanding of corporate relationships and environments" and had "considerable" infrastructure to attack.

Advertisement

KrebsOnSecurity in its blog post last month had said the systems at Wipro were being used to target at least a dozen customer systems. "We detected a potentially abnormal activity in a few employee accounts on our network due to an advanced phishing campaign," Wipro had said in an emailed statement to the media while publicly announcing the attack.

 

Get your daily dose of tech news, reviews, and insights, in under 80 characters on Gadgets 360 Turbo. Connect with fellow tech lovers on our Forum. Follow us on X, Facebook, WhatsApp, Threads and Google News for instant updates. Catch all the action on our YouTube channel.

Further reading: Wipro
Advertisement

Related Stories

Popular Mobile Brands
  1. Samsung Galaxy S26+ Reportedly Listed for Sale Online Ahead of Launch
  2. Poco X8 Pro Spotted on Geekbench With This Dimensity 8000 Series Chipset
  3. Vivo X300 FE Reportedly Bags IMDA and TUV Certifications Ahead of Launch
  4. Apple to Reportedly Launch Low-Cost MacBook in 'Playful Colors' in March
  5. Xiaomi Civi 6 Could Launch in China Soon With Customisable AI Shortcut Key
  6. Xiaomi 17 Series Leak Hints at Imminent Launch Ahead of MWC at These Prices
  1. Sony Could Reportedly Delay PS6 to as Late as 2029 Due to RAM Shortage
  2. iPhone 18 Series to Drop SIM Card Slot in Europe to Make Room for Slightly Larger Battery: Report
  3. Poco X8 Pro Spotted on Geekbench With MediaTek Dimensity 8500 Ultra SoC, Android 16
  4. Xiaomi 17, Xiaomi 17 Ultra Global Price Details, Launch Date and Colour Options Leaked
  5. X Building Smart 'Cashtags' to Let Users Check Cryptocurrency Prices in Real-Time
  6. Samsung Galaxy A27 5G Listing on IMEI Database Suggests a Galaxy A26 Successor Is on the Way
  7. Anthropic Inaugurates First Indian Office in Bengaluru, Starts Hiring Local Talent
  8. Apple Tipped to Adopt Samsung's Privacy Display Technology for MacBook Models by 2029
  9. Oppo Find X10 Series Tipped to Launch in H2 2026 With Built-In Magnets for Wireless Charging
  10. AMD and TCS to Co-Develop Helios AI Data Centre Architecture, Deliver 200MW Data Centre Blueprint
Gadgets 360 is available in
Download Our Apps
Available in Hindi
© Copyright Red Pixels Ventures Limited 2026. All rights reserved.