Search company, investor...

Founded Year

2014

Stage

Unattributed VC | Alive

About Nitro Network

Nitro Network operates as a technology company. The company offers a customer identification platform for brick-and-mortar retailers, using proprietary sensor technology to identify customers in real-time without relying on radio frequency identification (RFID), wireless fidelity (WiFi), Bluetooth, or facial recognition technologies. The platform provides retailers with a layer of customer data intelligence previously limited to online e-commerce experiences. Nitro Network was formerly known as Nucleus Vision. It was founded in 2014 and is based in Sunnyvale, California.

Headquarters Location

440 North Wolfe Road

Sunnyvale, California, 94085,

United States

Loading...

Loading...

Latest Nitro Network News

SideWinder APT Spotted Stealing Crypto

Feb 16, 2023

The nation-state threat group has been attacking a wider range of victims and regions than previously thought. PDF Researchers have linked the slippery SideWinder APT to two malicious campaigns — one in 2020 and one in 2021 — that add more volume to an attack spree attributed to the prolific threat actor over the past several years and demonstrate how extensive its arsenal of tactics and tools really is. A report published this week by Group-IB links SideWinder (aka Rattlesnake or T-APT4) to a known 2020 attack on the Maldivian government, as well as a previously unknown series of phishing operations that targeted organizations in Afghanistan, Bhutan, Myanmar, Nepal, and Sri Lanka between June and November 2021. The findings show the group casting a far wider net than previously thought using a trove of tools, including previously unidentified remote access Trojans (RATs), backdoors, reverse shells, and stagers. Researchers' investigation of these attacks also links the group to other known APTs, including Baby Elephant — which may in fact be SideWinder itself — and Donot APT, they said. The report also sheds more light on the geographically dispersed nature of the group's operations, with researchers uncovering IP addresses controlled by SideWinder located in the Netherlands, Germany, France, Moldova, and Russia, the researchers said. SideWinder, active since 2012, was detected by Kaspersky in the first quarter of 2018 and thought to primarily target Pakistani military infrastructure. However, this latest report shows that the target range of the group — widely believed to be associated with Indian espionage interests — is far broader than that. "SideWinder has been systematically attacking government organizations in South and East Asia for espionage purposes for about 10 years," Dmitry Kupin, a senior malware analyst on Group-IB's Threat Intelligence team, wrote in the report. Specifically, researchers identified more than 60 targets — including government bodies, military organizations, law enforcement agencies, central banks, telecoms, media, political organizations, and more — of the newly identified phishing campaign. The targets are located in several countries, including Afghanistan, Bhutan, Myanmar, Nepal, and Sri Lanka. Sophisticated Phishing Resources The phishing attacks — in which SideWinder impersonates known entities in an attempt to lure victims — also demonstrated how vast its phishing infrastructure is, the researchers said. This makes sense, as spear-phishing has long been the group's initial-access method, they said. The phishing findings, which did not confirm whether SideWinder was successful in its attempts to compromise victims, also reveal something previously unknown about the group: an interest in targeting cryptocurrency. In the phishing attacks between June 2021 and November 2021, the group impersonated both the Central Bank of Myanmar, using a website in its arsenal that imitates the financial institution, as well as a contactless Internet of Things (IoT) payment system used in India called Nucleus Vision, also known as Nitro Network. The campaigns also are notable because they demonstrate SideWinder trying to steal cryptocurrency by imitating an Airdrop of NCASH crypto, the researchers said. NCASH is used as a payment means in the Nucleus Vision ecosystem, which retail stores in India have been using, they said. Specifically, researchers uncovered a phishing link related to Airdrop — an Apple technology for sending files via its mobile devices. When users visited the link (http://5[.]2[.]79[. ]135/project/project/index.html) they were asked to register in order to participate in an Airdrop and receive tokens, though it was not specified which ones. By pressing the "Submit details" button, the user activates a script login.php, which researchers believe the group is using to further develop this attack vector. Tools and Telegram Group-IB also discovered a trove of custom tools used by SideWinder, only some of which had been described publicly before, developed in various programming languages including C++, C#, Go, Python (compiled script), and VBScript. Part of that arsenal is the group's newest custom tool, SideWinder.AntiBot.Script, an info-stealer written in Python and used in previously documented phishing attacks against Pakistani organizations. The script can extract a victim's browsing history from Google Chrome, credentials saved in the browser, the list of folders in the directory, as well as meta information and contents of .docx, .pdf, and .txt files. It's a key part of the group's notoriety for conducting "hundreds of espionage operations within a short span of time," Kupin wrote. Another and perhaps the "most interesting finding" regarding SideWinder's tools arsenal were RAT samples that used the Telegram messaging app as a channel for receiving the results of malware commands and thus retrieve data stolen from compromised systems, Kupin noted. This tactic is increasingly becoming a hallmark of many advanced threat actors, he said. How to Stave Off SideWinder The report includes a vast array of indicators of compromise as well as URLs associated with SideWinder attacks. Because like many other APT groups SideWinder relies on targeted spear-phishing as the initial attack vector, it's important for organizations "to set up business email protection solutions that are capable of detonating malicious attachments in an isolated virtual environment," Kupin tells Dark Reading. Enterprises should also do socially engineered penetration tests so employees can quickly recognize phishing emails that reach inboxes, he adds. Organizations at risk from SideWinder also should continuously monitor network activity within the organization's perimeter by employing managed extended detection and response (MXDR) solutions that are regularly updated with fresh network indicators and rules, Kupin says.

Nitro Network Frequently Asked Questions (FAQ)

  • When was Nitro Network founded?

    Nitro Network was founded in 2014.

  • Where is Nitro Network's headquarters?

    Nitro Network's headquarters is located at 440 North Wolfe Road, Sunnyvale.

  • What is Nitro Network's latest funding round?

    Nitro Network's latest funding round is Unattributed VC.

  • Who are the investors of Nitro Network?

    Investors of Nitro Network include Celesta Capital and Plug and Play Ventures.

  • Who are Nitro Network's competitors?

    Competitors of Nitro Network include ID5 and 4 more.

Loading...

Compare Nitro Network to Competitors

N
Nect

Nect develops digital identity technology in information technology (IT). The company offers automated online identification and digital signature services, using artificial intelligence (AI) to verify identities based on identity documents and selfie videos. It offers identification based on AI which allows users to exercise and monitor all transactions and personal information. It primarily serves the insurance, financial, and government sectors. It was founded in 2017 and is based in Hamburg, Germany.

T
Teavaro

Teavaro is a company that focuses on privacy-compliant real-time data activation in the marketing and advertising industry. The company offers services that help businesses build their own identity graphs, manage customer consent, and personalize customer experiences across various touchpoints. These services aim to increase conversion rates, improve the efficiency of media budget use, and enhance advertising effectiveness measurement. It was founded in 2014 and is based in Teddington, England.

N
Network Privacy

Network Privacy specializes in data privacy and security within the technology sector. The company offers solutions that protect personal and corporate data from unauthorized access and management tools for user identities. Its primary offerings include software designed to safeguard online privacy and manage digital identities without using overly technical language. It was founded in 2000 and is based in New York, New York.

fidentity Logo
fidentity

fidentity specializes in digital identification and signature solutions. The company offers services such as identity verification, digital signing, and onboarding process completion, all of which are designed to be user-friendly and compliant with regulatory guidelines. It primarily serves businesses across various industries worldwide that require identification and signing solutions. The company was founded in 2016 and is based in Liebefeld, Switzerland.

Advertima Logo
Advertima

Advertima focuses on in-store retail media solutions, operating within the artificial intelligence and retail domain. The company's main service involves transforming physical grocery stores into retail media channels, using advanced machine learning and three-dimensional computer vision to convert in-store shoppers into relevant retail media audiences. It primarily sells to the retail industry. Advertima was formerly known as Advertima AG. It was founded in 2021 and is based in St. Gallen, Switzerland.

F
Foot Analytics

Foot Analytics provides a business-to-business (B2B) big data and analytics technology start-up. The company helps automotive brands, retailers, large venue operators, building managers, and transport operators measure foot traffic, monitor real-time occupancy, and track visitor behaviors in physical spaces. It serves its services in multiple industries including retail, automotive, transport, and large venues. The company was founded in 2013 and is based in Barcelona, Spain.

Loading...

CBI websites generally use certain cookies to enable better interactions with our sites and services. Use of these cookies, which may be stored on your device, permits us to improve and customize your experience. You can read more about your cookie choices at our privacy policy here. By continuing to use this site you are consenting to these choices.