Skip to main content

Morpho is a hacking group that trades in intellectual property

exploit
Image used with permission by copyright holder
Companies around the world are investing enormous amounts of time and money to combat the efforts of hackers. However, a new report suggests that the hackers themselves are just as committed to forward progress, albeit while pushing in the opposite direction.

A group called Morpho is apparently targeting the intellectual property of major companies, with a view to selling the purloined trade secrets on the black market. Using sophisticated techniques that can prey on computers running various operating systems, the organization has already attacked businesses in the fields of law, pharmaceuticals and tech, according to a report from the New York Times.

It’s thought that Morpho is the group that hit Microsoft, Apple, Twitter and Facebook in 2013, but the scope of their exploits is difficult to pin down. The group is as secretive as you might expect, and some companies who have been targeted — particularly those from the world of technology — might want to keep any breach quiet, both for public relations purposes and so as not to put themselves forward as an easy target.

The information on Morpho comes from a broader report on hacking set to be released by Symantec tomorrow. It’s thought that at least 49 organizations spread across 20 different countries have already been attacked by the group.

While hacking was once thought to be a simple matter of stolen passwords perpetrated by individuals, it’s clear that times have changed. Groups like Morpho are approaching hacking as a business, and profits from past hacks allow them to take on bigger and bigger targets.

Now, the responsibility falls to those on the other side of the equation to find a way to combat such threats. Sadly, the problem of cybercrime only looks set to get worse in years to come.

Editors' Recommendations

Brad Jones
Brad is an English-born writer currently splitting his time between Edinburgh and Pennsylvania. You can find him on Twitter…
Hacking-as-a-service lets hackers steal your data for just $10
A depiction of a hacker breaking into a system via the use of code.

A new (and cheap) service that offers hackers a straightforward method to set up a base where they manage and perform their cyber crimes has been discovered -- and it’s gaining traction.

As reported by Bleeping Computer, security researchers unearthed a program called Dark Utilities, effectively providing a command and control (C2) center.

Read more
Destructive hacking group REvil could be back from the dead
Person typing on a computer keyboard.

There was a period in 2021 when the computing world was gripped by fear of a dizzyingly effective hacking group fittingly named REvil -- until its website was seized by the FBI and its members arrested by Russia’s security services, that is. Yet like a malevolent curse that just can’t be dispelled, it now seems the group’s websites are back online. Has the group returned to spread discord and wreak havoc once again?

In case you missed them the first time around, REvil came to global attention by hacking into various high-profile targets, pilfering secret documents, then threatening their release unless a ransom was paid. In a notable case, the group stole and published files from Apple supplier Quanta Computer, including some that spilled the beans on unreleased product designs.

Read more
Experts found a record number of zero-day hacks in 2021
A digital depiction of a laptop being hacked by a hacker.

Google has published the 2021 review of Project Zero, revealing a record amount of zero-days exploits (labeled as “one of the most advanced attack methods”) exhibited by some of the world’s largest technology companies.

Project Zero is an initiative started by Google in 2014 aimed at detailing security defects known as zero-day exploits. These vulnerabilities are dangerous as they essentially remain undetected unless a mitigation system has been implemented, thus leaving systems, databases, and the like completely exposed to hackers.

Read more