| 
			 Cybersecurity firm FireEye Inc, which disclosed the operation on 
			Monday, said that since the middle of last year, the group has 
			attacked email accounts at more than 100 firms, most of them 
			pharmaceutical and healthcare companies. 
 Victims also include firms in other sectors, as well as corporate 
			advisors including investment bankers, attorneys and investor 
			relations firms, according to FireEye.
 
 The cybersecurity firm declined to identify the victims. It said it 
			did not know whether any trades were actually made based on the 
			stolen data.
 
 Still, FireEye Threat Intelligence Manager Jen Weedon said the 
			hackers only targeted people with access to highly insider data that 
			could be used to profit on trades before that data was made public.
 
 They sought data that included drafts of U.S. Securities and 
			Exchange Commission filings, documents on merger activity, 
			discussions of legal cases, board planning documents and medical 
			research results, she said.
 
			  
			 
			"They are pursuing sensitive information that would give them 
			privileged insight into stock market dynamics," Weedon said.
 The victims ranged from small to large cap corporations. Most are in 
			the United States and trade on the New York Stock Exchange or Nasdaq, 
			she said.
 
 An FBI spokesman declined comment on the group, which FireEye said 
			it reported to the bureau.
 
 The security firm designated it as FIN4 because it is number 4 among 
			the large, advanced financially motivated groups tracked by FireEye.
 
 The hackers don't infect the PCs of their victims. Instead they 
			steal passwords to email accounts, then use them to access those 
			accounts via the Internet, according to FireEye.
 
 They expand their networks by posing as users of compromised 
			accounts, sending phishing emails to associates, Weedon said.
 
			
            [to top of second column] | 
            
			 
			FireEye has not identified the hackers or located them because they 
			hide their tracks using Tor, a service for making the location of 
			Internet users anonymous.
 FireEye said it believes they are most likely based in the United 
			States, or maybe Western Europe, based on the language they use in 
			their phishing emails, Weedon said.
 
			She said the firm is confident that FIN4 is not from China, based on 
			the content of their phishing emails and their other techniques.
 Researchers often look to China when assessing blame for 
			economically motivated cyber espionage. The United States has 
			accused the Chinese government of encouraging hackers to steal 
			corporate secrets, allegations that Beijing has denied, causing 
			tension between the two countries.
 
 Weedon suspects the hackers were trained at Western investment 
			banks, giving them the know-how to identify their targets and draft 
			convincing phishing emails.
 
 "They are applying their knowledge of how the investment banking 
			community works," Weedon said.
 
 (Editing by Eric Walsh)
 
			[© 2014 Thomson Reuters. All rights 
				reserved.] Copyright 2014 Reuters. All rights reserved. This material may not be published, 
			broadcast, rewritten or redistributed. 
			
			 |