Security firm ESET discovered the malware, now called ACAD/Medre.A, around February and noted it was “military-grade.” The worm attacks AutoCad, a popular piece of software used by architects and engineers to draw up blue prints and other infrastructure plans. It targets computers running the Windows operating system to steal and e-mail out AutoCad “drawings.” These drawings are then received by an e-mail that ESET found to be based in China.
Industrial cyber-espionage is now entering the Efficiency stage. Malware makers know exactly what, when, and why they want to steal.
tags: s-curve, system, maturity, efficiency, control, detection, security, business