• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite
Home  /  Malware  /  KKNPP Attack: Tracking the DTrack!
KKNPP Attack: Tracking the DTrack!
01 November 2019

KKNPP Attack: Tracking the DTrack!

Written by Seqrite
Seqrite
Malware

The recent cyber-attack on Kudankulam Nuclear Power Plant (KKNPP) has been confirmed by the officials and yet again security of critical infrastructure has become the talk of the cyber world. The officials mentioned that there is no damage to control systems of the plant as the core processing controls are truly air gapped, which is a standard security practice used to physically isolate critical infrastructure from unsecured networks like the Internet or local area networks in order to make it a lot harder to breach the walls of any establishment.

Reports indicate the occurrence of malware with a specific pattern wherein hackers are abusing and imitating applications of well-known brands to launch malware into enterprise systems.

Backdoor.DTrack: Initial Analysis

Our team of experts at Quick Heal Security Labs are investigating on the modus operandi of this malware. The malware works by resolving code belonging to Application Programming Interfaces and starts to gather system information. Known as Backdoor.Dtrack, this malware includes hardcoded internal network credentials of enterprises. By the end, the malware collects network information, running process list and browser history, dropping itself into the local drive of the affected computer.

Typically, malware of such nature are determined to be Advanced Persistent Threats or APTs focusing on being undetected for as long as possible in order to steal maximum sensitive business information.

From the information available and the initial research carried out by Quick Heal Security Labs, the contentious malware DTrack or ATMDTrack samples have historically known to also imitate Quick Heal’s Safe Banking application icon and file information to make it appear legitimate in some of the attacks.

Does Quick Heal & Seqrite protect me from DTrack, though?

Quick Heal and Seqrite products are already protecting against the known variants of DTrack. We strongly recommend you to keep your security products updated and follow best security practices for optimum defense against the latest and evolving threats.

At Quick Heal Technologies, we are deeply committed to secure and safeguard our customers by providing the best-in-breed  protection against known and advanced cyberthreats.

As, further investigations are under way, we will keep you posted on the latest findings on Backdoor.DTrack.

 Previous PostRenewed interests in excelling Security Operation Centres?
Next Post  Attacker uses tricky technique of Excel 4.0 in Malspam campaign
Seqrite

About Seqrite

Follow us for the latest updates and insights related to security for enterprise networks. Subscribe to our newsletter to stay...

Articles by Seqrite »

Related Posts

  • SnakeKeylogger: A Multistage Info Stealer Malware Campaign

    March 25, 2025
  • SVC New Stealer on the Horizon

    March 21, 2025
  • 5th January and The Tale of Joshi Virus: India’s First Global Computer Virus

    December 26, 2024
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (322) cyber security (31) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data privacy (11) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (107) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies