Tourists are pictured on the waters off Tumon beach near Hilton Hotel on the island of Guam, a U.S. Pacific Territory, August 11, 2017. REUTERS/Erik De Castro
Your feedback is important to us!
We invite all our readers to share with us their views and comments about this article.
Disclaimer: Comments submitted by third parties on this site are the sole responsibility of the individual(s) whose content is submitted. The Daily Star accepts no responsibility for the content of comment(s), including, without limitation, any error, omission or inaccuracy therein. Please note that your email address will NOT appear on the site.
Alert: If you are facing problems with posting comments, please note that you must verify your email with Disqus prior to posting a comment. follow this link to make sure your account meets the requirements. (http://bit.ly/vDisqus)
A cyberspying group with suspected links to Russian military intelligence was probably behind a campaign targeting hotel guests in eight mostly European countries last month, researchers at security firm FireEye said Friday.The wave of attacks during the first week of July targeted travelers who were staying in several hotel chains in seven countries in Europe and one in the Middle East, it said.Several governments and security research firms have linked APT 28 to the GRU, Russia's military intelligence directorate. In the July attacks, FireEye found spear-phishing emails were used to trick hotel employees to download an infected hotel reservation document, which then installed GAMEFISH malware run remotely from internet sites known to be controlled by APT 28 .
FOLLOW THIS ARTICLE