Home Security Chinese group claimed to have hacked Cambodian poll bodies
Chinese group claimed to have hacked Cambodian poll bodies Pixabay

Security firm FireEye claims it has found files that prove a group known as TEMP.Periscope, which it claims is of Chinese origin, has compromised a number of Cambodian entities which are connected to that country's electoral system.

In a blog post, the company said that included among the entities compromised were the Cambodian body overseeing elections and opposition figures. Cambodia is scheduled to hold parliamentary elections on 29 July.

Researchers Scott Henderson, Steve Miller, Dan Perez, Marcin Siedlarz, Ben Wilson and Ben Read wrote that the activity observed was an indication that TEMP.Periscope had a number of intrusion tools and targeted many different victims "which is in line with typical Chinese-based APT efforts".

"We expect this activity to provide the Chinese government with widespread visibility into Cambodian elections and government operations," they said. "Additionally, this group is clearly able to run several large-scale intrusions concurrently across a wide range of victim types."

In 2017, FireEye was in the news when one of its staff, Adi Peretz, was compromised by a group called HackTheAnalyst and corporate documents about him posted on the Web. The company, however, denied it had been hacked.

Despite the apparent sophistication of TEMP.Periscope — FireEye also mentioned that it had attacked a defence industrial base in the US, a chemical company in Europe and engineering and maritime entities in the US — the security firm said that it had discovered the current activity through unsecured sites on the Internet.

"FireEye analysed files on three open indexes believed to be controlled by TEMP.Periscope, which yielded insight into the group's objectives, operational tactics, and a significant amount of technical attribution/validation," the researchers wrote.

They said they had found three command and control servers and analysis of logs showed that the following had been compromised:

  • National Election Commission, Ministry of the Interior, Ministry of Foreign Affairs and International Cooperation, Cambodian Senate, Ministry of Economics and Finance.
  • Member of Parliament representing Cambodia National Rescue Party.
  • Multiple Cambodians advocating human rights and democracy who have written critically of the current ruling party.
  • Two Cambodian diplomats serving overseas.
  • Multiple Cambodian media entities.

"Our analysis of the servers and surrounding data in this latest campaign bolsters our previous assessment that TEMP.Periscope is likely Chinese in origin," the researchers wrote. "Data from a control panel access log indicates that operators are based in China and are operating on computers with Chinese language settings.

"A log on the server revealed IP addresses that had been used to log in to the software used to communicate with malware on victim machines. One of the IP addresses,, is located in Hainan, China. Other addresses belong to virtual private servers, but artefacts indicate that the computers used to log in all cases are configured with Chinese language settings."


With 4 keynotes + 33 talks + 10 in-depth workshops from world-class speakers, YOW! is your chance to learn more about the latest software trends, practices and technologies and interact with many of the people who created them.

Speakers this year include Anita Sengupta (Rocket Scientist and Sr. VP Engineering at Hyperloop One), Brendan Gregg (Sr. Performance Architect Netflix), Jessica Kerr (Developer, Speaker, Writer and Lead Engineer at Atomist) and Kent Beck (Author Extreme Programming, Test Driven Development).

YOW! 2018 is a great place to network with the best and brightest software developers in Australia. You’ll be amazed by the great ideas (and perhaps great talent) you’ll take back to the office!

Register now for YOW! Conference

· Sydney 29-30 November
· Brisbane 3-4 December
· Melbourne 6-7 December

Register now for YOW! Workshops

· Sydney 27-28 November
· Melbourne 4-5 December



Australia is a cyber espionage hot spot.

As we automate, script and move to the cloud, more and more businesses are reliant on infrastructure that has the high potential to be exposed to risk.

It only takes one awry email to expose an accounts’ payable process, and for cyber attackers to cost a business thousands of dollars.

In the free white paper ‘6 Steps to Improve your Business Cyber Security’ you’ll learn some simple steps you should be taking to prevent devastating and malicious cyber attacks from destroying your business.

Cyber security can no longer be ignored, in this white paper you’ll learn:

· How does business security get breached?
· What can it cost to get it wrong?
· 6 actionable tips


Sam Varghese

website statistics

Sam Varghese has been writing for iTWire since 2006, a year after the sitecame into existence. For nearly a decade thereafter, he wrote mostly about free and open source software, based on his own use of this genre of software. Since May 2016, he has been writing across many areas of technology. He has been a journalist for nearly 40 years in India (Indian Express and Deccan Herald), the UAE (Khaleej Times) and Australia (Daily Commercial News (now defunct) and The Age). His personal blog is titled Irregular Expression.


Popular News




Sponsored News