APT HOME  ALERTS  GROUP  ARTICLES  BLOG | 2025(65)  2024(215)


DATE NAME INFO CATEGORY SUB
28.5.24 Swan Vector APT campaign A newly APT campaign, dubbed “Swan Vector” has been targeting East Asian nations, particularly Japan and Taiwan.

ALERTS

APT
27.5.24 Russia-Linked Hackers Target Tajikistan Government with Weaponized Word Documents The Russia-aligned threat actor known as TAG-110 has been observed conducting a spear-phishing campaign targeting Tajikistan using macro-enabled Word templates APT The Hacker News
24.5.24 Operation Sindoor – Anatomy of a Digital Siege Overview Seqrite Labs, India’s largest Malware Analysis lab, has identified multiple cyber events linked to Operation Sindoor, involving state-sponsored APT activity and coordinated hacktivist operations. Observed tactics included spear phishing, deployment of malicious scripts, website defacements, and unauthorized data.. APT blog Seqrite
24.5.24 Earth Ammit Disrupts Drone Supply Chains Through Coordinated Multi-Wave Attacks in Taiwan Trend™ Research discusses the evolving tradecraft of threat actor Earth Ammit, proven by the advanced toolset used in its TIDRONE and VENOM campaigns that targeted the drone supply chain. APT blog Trend Micro
24.5.24 Earth Ammit Disrupts Drone Supply Chains Through Coordinated Multi-Wave Attacks in Taiwan In July 2024, we disclosed the TIDRONE campaign, in which threat actors targeted Taiwan’s military and satellite industries. During our investigation, we discovered that multiple compromised entities were using the same enterprise resource planning (ERP) software. APT blog Trend Micro
24.5.24 Iranian Cyber Actors Impersonate Model Agency in Suspected Espionage Operation Unit 42 recently identified suspected covert Iranian infrastructure impersonating a German model agency. This infrastructure hosted a fraudulent website designed to mimic the authentic agency’s branding and content. APT blog Palo Alto
24.5.24 The who, where, and how of APT attacks in Q4 2024–Q1 2025 An overview of the activities of selected APT groups investigated and analyzed by ESET Research in Q4 2024 and Q1 2025 APT blog Eset
24.5.24 ESET APT Activity Report Q4 2024–Q1 2025 An overview of the activities of selected APT groups investigated and analyzed by ESET Research in Q4 2024 and Q1 2025 APT blog Eset
22.5.24 Russian Hackers Exploit Email and VPN Vulnerabilities to Spy on Ukraine Aid Logistics Russian cyber threat actors have been attributed to a state-sponsored campaign targeting Western logistics entities and technology companies since 2022. The APT The Hacker News
20.5.24 South Asian Ministries Hit by SideWinder APT Using Old Office Flaws and Custom Malware High-level government institutions in Sri Lanka, Bangladesh, and Pakistan have emerged as the target of a new campaign orchestrated by a threat actor known as APT The Hacker News
22.5.24 SideWinder APT using old Office Vulnerabilities A new cyber-espionage campaign by APT group SideWinder has been targeting high-profile government institutions in Bangladesh, Pakistan, and Sri Lanka. The attackers leverage spear-phishing lures paired with geofenced payloads to ensure that only victims in specific countries receives the malicious content. To activate the infection process and deploy the StealerBot malware a combined exploitation of old vulnerabilities (CVE-2017-0199 and CVE-2017-11882) takes place. ALERTS APT
22.5.24 Russian Hackers Exploit Email and VPN Vulnerabilities to Spy on Ukraine Aid Logistics Russian cyber threat actors have been attributed to a state-sponsored campaign targeting Western logistics entities and technology companies since 2022. The APT The Hacker News
20.5.24 South Asian Ministries Hit by SideWinder APT Using Old Office Flaws and Custom Malware High-level government institutions in Sri Lanka, Bangladesh, and Pakistan have emerged as the target of a new campaign orchestrated by a threat actor known as APT The Hacker News
18.5.24 Government webmail hacked via XSS bugs in global spy campaign Hackers are running a worldwide cyberespionage campaign dubbed 'RoundPress,' leveraging zero-day and n-day flaws in webmail servers to steal email from high-value government organizations. APT BleepingComputer
17.5.24 North Korea ramps up cyberspying in Ukraine to assess war risk The state-backed North Korean threat group Konni (Opal Sleet, TA406) was observed targeting Ukrainian government entities in intelligence collection operations. APT BleepingComputer
17.5.24 APT GROUP123 Group123 is a North Korean state-sponsored advanced persistent threat (APT) group active since at least 2012. APT blog Cyfirma
17.5.24 APT PROFILE : Transparent Tribe aka APT36 APT36, also known as Transparent Tribe, is a Pakistan-based advanced persistent threat (APT) group active since at least 2013. APT blog Cyfirma
17.5.24 Earth Ammit Disrupts Drone Supply Chains Through Coordinated Multi-Wave Attacks in Taiwan Trend™ Research discusses the evolving tradecraft of threat actor Earth Ammit, proven by the advanced toolset used in its TIDRONE and VENOM campaigns that targeted the drone supply chain. APT blog Trend Micro
17.5.24 Iranian Cyber Actors Impersonate Model Agency in Suspected Espionage Operation Unit 42 recently identified suspected covert Iranian infrastructure impersonating a German model agency. This infrastructure hosted a fraudulent website designed to mimic the authentic agency’s branding and content. APT blog Palo Alto
15.5.24 Russia-Linked APT28 Exploited MDaemon Zero-Day to Hack Government Webmail Servers A Russia-linked threat actor has been attributed to a cyber espionage operation targeting webmail servers such as Roundcube, Horde, MDaemon, and Zimbra via APT

The Hacker News

14.5.24 Earth Ammit Disrupts Drone Supply Chains Through Coordinated Multi-Wave Attacks in Taiwan Trend™ Research discusses the evolving tradecraft of threat actor Earth Ammit, proven by the advanced toolset used in its TIDRONE and VENOM campaigns that targeted the drone supply chain. APT Trend Micro
14.5.24 Earth Ammit Breached Drone Supply Chains via ERP in VENOM, TIDRONE Campaigns A cyber espionage group known as Earth Ammit has been linked to two related but distinct campaigns from 2023 to 2024 targeting various entities in Taiwan and APT The Hacker News
14.5.24 China-Linked APTs Exploit SAP CVE-2025-31324 to Breach 581 Critical Systems Worldwide A recently disclosed critical security flaw impacting SAP NetWeaver is being exploited by multiple China-nexus nation-state actors to target critical infrastructure APT The Hacker News
13.5.24 North Korean Konni APT Targets Ukraine with Malware to track Russian Invasion Progress The North Korea-linked threat actor known as Konni APT has been attributed to a phishing campaign targeting government entities in Ukraine, indicating the threat APT

The Hacker News

10.5.24 OtterCookie v4 Adds VM Detection and Chrome, MetaMask Credential Theft Capabilities The North Korean threat actors behind the Contagious Interview campaign have been observed using updated versions of a cross-platform malware called APT The Hacker News
9.5.24 Earth Kasha threat actor targets Taiwan and Japan in a recent campaign As recently reported by the researchers from Trend Micro, Earth Kasha threat group continues to target users in Taiwan and Japan. The attackers leverage a dropper malware dubbed RoamingMouse that comes in the form of a macro-enabled MS Excel file.

ALERTS

APT
8.5.24 Earth Kasha Updates TTPs in Latest Campaign Targeting Taiwan and Japan This blog discusses the latest modifications observed in Earth Kasha’s TTPs from their latest campaign detected in March 2025 targeting Taiwan and Japan. APT Trend Micro
2.5.24 ClickFix social engineering tactic being used by various APT groups ClickFix has gained traction in targeted espionage operations across multiple APT groups from North Korea, Iran, and Russia. This is a social engineering tactic where malicious websites impersonate legitimate software or document sharing platforms.

ALERTS

APT
2.5.24 Iranian threat actor targeted critical Middle Eastern infrastructure Researchers at Fortinet have recently published their investigation into an Iranian threat actor's attack against critical infrastructure in the Middle East.

ALERTS

APT
2.5.24 France ties Russian APT28 hackers to 12 cyberattacks on French orgs Today, the French foreign ministry blamed the APT28 hacking group linked to Russia's military intelligence service (GRU) for targeting or breaching a dozen French entities over the last four years. APT BleepingComputer
30.4.25 Chinese Hackers Abuse IPv6 SLAAC for AitM Attacks via Spellbinder Lateral Movement Tool A China-aligned advanced persistent threat (APT) group called TheWizards has been linked to a lateral movement tool called Spellbinder that can facilitate APT The Hacker News
29.4.25 Multi-Stage malware campaign targeting South Korean entities linked to Konni APT A sophisticated multi-stage malware campaign potentially linked to the North Korean Konni APT group has been observed targeting entities primarily in South Korea. The attack begins with a ZIP file containing a disguised .lnk shortcut which executes an obfuscated PowerShell script designed to download and run additional malicious payloads.

ALERTS

APT
29.4.25 Earth Kurma APT Campaign Targets Southeast Asian Government, Telecom Sectors An APT group dubbed Earth Kurma is actively targeting government and telecommunications organizations in Southeast Asia using advanced malware, rootkits, and trusted cloud services to conduct cyberespionage. APT blog Trend Micro
28.4.25 SentinelOne Uncovers Chinese Espionage Campaign Targeting Its Infrastructure and Clients Cybersecurity company SentinelOne has revealed that a China-nexus threat cluster dubbed PurpleHaze conducted reconnaissance attempts against its infrastructure APT The Hacker News
28.4.25 Earth Kurma Targets Southeast Asia With Rootkits and Cloud-Based Data Theft Tools Government and telecommunications sectors in Southeast Asia have become the target of a "sophisticated" campaign undertaken by a new advanced persistent APT The Hacker News
27.4.25 Storm-1977 Hits Education Clouds with AzureChecker, Deploys 200+ Crypto Mining Containers Microsoft has revealed that a threat actor it tracks as Storm-1977 has conducted password spraying attacks against cloud tenants in the education sector over the APT The Hacker News
27.4.25 FBI seeks help to unmask Salt Typhoon hackers behind telecom breaches The FBI has asked the public for information on Chinese Salt Typhoon hackers behind widespread breaches of telecommunications providers in the United States and worldwide. APT

BleepingComputer

27.4.25 Hackers abuse OAuth 2.0 workflows to hijack Microsoft 365 accounts In a recent espionage campaign, the infamous North Korean threat group Lazarus targeted multiple organizations in the software, IT, finance, and telecommunications sectors in South Korea. APT BleepingComputer
26.4.25 Lazarus hackers breach six companies in watering hole attacks In a recent espionage campaign, the infamous North Korean threat group Lazarus targeted multiple organizations in the software, IT, finance, and telecommunications sectors in South Korea. APT

BleepingComputer

25.4.25 False Face: Unit 42 Demonstrates the Alarming Ease of Synthetic Identity Creation Evidence suggests that North Korean IT workers are using real-time deepfake technology to infiltrate organizations through remote work positions, which poses significant security, legal and compliance risks. The detection strategies we outline in this report provide security and HR teams with practical guidance to strengthen their hiring processes against this threat. APT blog Palo Alto
25.4.25 Contagious Interview (DPRK) Launches a New Campaign Creating Three Front Companies to Deliver a Trio of Malware: BeaverTail, InvisibleFerret, and OtterCookie Silent Push Threat Analysts have uncovered three cryptocurrency companies that are actually fronts for the North Korean advanced persistent threat (APT) group Contagious Interview: BlockNovas LLC, Angeloper Agency, and SoftGlide LLC. APT blog Silent Push
25.4.25 SK Telecom warns customer USIM data exposed in malware attack South Korea's largest mobile operator, SK Telecom, is warning that a malware infection allowed threat actors to access sensitive USIM-related information for customers. APT

BleepingComputer

25.4.25 North Korean Hackers Spread Malware via Fake Crypto Firms and Job Interview Lures North Korea-linked threat actors behind the Contagious Interview have set up front companies as a way to distribute malware during the fake hiring process. "In this APT The Hacker News
24.4.25 Lazarus Hits 6 South Korean Firms via Cross EX, Innorix Zero-Day and ThreatNeedle Malware At least six organizations in South Korea have been targeted by the prolific North Korea-linked Lazarus Group as part of a campaign dubbed Operation SyncHole . APT The Hacker News
24.4.25 DPRK Hackers Steal $137M from TRON Users in Single-Day Phishing Attack Multiple threat activity clusters with ties to North Korea (aka Democratic People's Republic of Korea or DPRK) have been linked to attacks targeting organizations and APT The Hacker News
24.4.25 Billbug APT continues campaigns in Southeast Asia The Billbug espionage group (aka Lotus Blossom, Lotus Panda, Bronze Elgin) compromised multiple organizations in a single Southeast Asian country during an intrusion campaign that ran between August 2024 and February 2025.

ALERTS

APT
23.4.25 Iran-Linked Hackers Target Israel with MURKYTOUR Malware via Fake Job Campaign The Iran-nexus threat actor known as UNC2428 has been observed delivering a backdoor known as MURKYTOUR as part of a job-themed social engineering APT The Hacker News
22.4.25 Microsoft Secures MSA Signing with Azure Confidential VMs Following Storm-0558 Breach Microsoft on Monday announced that it has moved the Microsoft Account (MSA) signing service to Azure confidential virtual machines (VMs) and that it's also in the process of migrating the Entra ID signing service as well. APT APT
22.4.25 Lotus Panda Hacks SE Asian Governments With Browser Stealers and Sideloaded Malware The China-linked cyber espionage group tracked as Lotus Panda has been attributed to a campaign that compromised multiple organizations in an unnamed APT APT
22.4.25 Kimsuky Exploits BlueKeep RDP Vulnerability to Breach Systems in South Korea and Japan Cybersecurity researchers have flagged a new malicious campaign related to the North Korean state-sponsored threat actor known as Kimsuky that exploits a now- APT APT
22.4.25 Hackers Abuse Russian Bulletproof Host Proton66 for Global Attacks and Malware Delivery Cybersecurity researchers have disclosed a surge in "mass scanning, credential brute-forcing, and exploitation attempts" originating from IP addresses associated APT APT
21.4.25 State-sponsored hackers embrace ClickFix social engineering tactic ClickFix attacks are being increasingly adopted by threat actors of all levels, with researchers now seeing multiple advanced persistent threat (APT) groups from North Korea, Iran, and Russia utilizing the tactic to breach networks. APT APT
21.4.25 APT29 Deploys GRAPELOADER Malware Targeting European Diplomats Through Wine-Tasting Lures The Russian state-sponsored threat actor known as APT29 has been linked to an advanced phishing campaign that's targeting diplomatic entities across Europe with APT APT
20.4.25 Midnight Blizzard deploys new GrapeLoader malware in embassy phishing Russian state-sponsored espionage group Midnight Blizzard is behind a new spear-phishing campaign targeting diplomatic entities in Europe, including embassies. APT APT
19.4.25 Ghost in the Router: China-Nexus Espionage Actor UNC3886 Targets Juniper Routers We discovered China-nexus threat actors deployed custom backdoors on Juniper Networks’ Junos OS routers. APT blog APT blog
19.4.25 Unmasking APT29: The Sophisticated Phishing Campaign Targeting European Diplomacy Executive Summary Check Point Research has been observing a sophisticated phishing campaign conducted by Advanced ... APT blog APT blog
19.4.25 APT PROFILE – EARTH ESTRIES Earth Estries is a Chinese Advanced Persistent Threat (APT) group that has gained prominence for its sophisticated cyber espionage activities targeting critical infrastructure and APT blog APT blog
19.4.25 Cyber Espionage Among Allies: Strategic Posturing in an Era of Trade Tensions Executive Summary In the past decade, a pattern of cyber operations and espionage between the United States and its allies has emerged, complicating relationships traditionally APT blog APT blog
19.4.25 Slow Pisces Targets Developers With Coding Challenges and Introduces New Customized Python Malware Slow Pisces (aka Jade Sleet, TraderTraitor, PUKCHONG) is a North Korean state-sponsored threat group primarily focused on generating revenue for the DPRK regime, typically by targeting large organizations in the cryptocurrency sector. This article analyzes their campaign that we believe is connected to recent cryptocurrency heists. APT blog APT blog
19.4.25 Renewed APT29 Phishing Campaign Against European Diplomats Check Point Research has been tracking an advanced phishing campaign conducted by APT29, a Russia linked threat group, which is targeting diplomatic entities across Europe. APT blog APT blog
18.4.25 A recent campaign attributed to the Fritillary APT group A new malicious campaign targeting diplomatic entities in Europe has been attributed to the cyberespionage group called Fritillary (aka Midnight Blizzard, APT29). According to a recent research by Checkpoint, the attackers have been leveraging a new custom malware loader dubbed GrapeLoader as well as an updated variant of the WineLoader backdoor.

ALERTS

APT
18.4.25 A recent campaign attributed to the Fritillary APT group A new malicious campaign targeting diplomatic entities in Europe has been attributed to the cyberespionage group called Fritillary (aka Midnight Blizzard, APT29). According to a recent research by Checkpoint, the attackers have been leveraging a new custom malware loader dubbed GrapeLoader as well as an updated variant of the WineLoader backdoor. APT APT
18.4.25 Mustang Panda Targets Myanmar With StarProxy, EDR Bypass, and TONESHELL Updates The China-linked threat actor known as Mustang Panda has been attributed to a cyber attack targeting an unspecified organization in Myanmar with previously APT APT
15.4.25 Crypto Developers Targeted by Python Malware Disguised as Coding Challenges The North Korea-linked threat actor assessed to be behind the massive Bybit hack in February 2025 has been linked to a malicious campaign that targets developers APT APT
12.4.25 Goodbye HTA, Hello MSI: New TTPs and Clusters of an APT driven by Multi-Platform Attacks Seqrite Labs APT team has uncovered new tactics of Pakistan-linked SideCopy APT deployed since the last week of December 2024. The group has expanded its scope of targeting beyond Indian government, defence, maritime sectors, and university students to now. APT blog APT blog
12.4.25 Kimsuky: A Continuous Threat to South Korea with Deceptive Tactics Kimsuky: A Continuous Threat to South Korea with Deceptive Tactics Contents Introduction Infection Chain Initial Findings Campaign 1 Looking into PDF document. Campaign 2 Looking into PDF document. Technical Analysis Campaign 1 & 2 Conclusion Seqrite Protection MITRE ATT&CK... APT blog APT blog
9.4.25 Springtail APT group targets South Korean government entities The Springtail (aka Kimsuky) APT group recently engaged in campaigns targeting South Korean government entities. The campaigns leveraged government-themed messaging (one being tax related and another regarding a policy on the topic of sex offenders) to distribute malicious LNK files as malspam attachments. ALERTS ALERTS
5.4.25 North Korean IT worker army expands operations in Europe ​North Korea's IT workers have expanded operations beyond the United States and are now increasingly targeting organizations across Europe. APT APT
4.4.25 North Korean hackers adopt ClickFix attacks to target crypto firms The notorious North Korean Lazarus hacking group has reportedly adopted 'ClickFix' tactics to deploy malware targeting job seekers in the cryptocurrency industry, particularly centralized finance (CeFi). APT APT
4.4.25 Lazarus Group Targets Job Seekers With ClickFix Tactic to Deploy GolangGhost Malware The North Korean threat actors behind Contagious Interview have adopted the increasingly popular ClickFix social engineering tactic to lure job seekers in the APT APT
2.4.25 FIN7 Deploys Anubis Backdoor to Hijack Windows Systems via Compromised SharePoint Sites The financially motivated threat actor known as FIN7 has been linked to a Python-based backdoor called Anubis (not to be confused with an Android banking trojan APT APT
1.4.25 China-Linked Earth Alux Uses VARGEIT and COBEACON in Multi-Stage Cyber Intrusions Cybersecurity researchers have shed light on a new China-linked threat actor called Earth Alux that has targeted various key sectors such as government, APT APT

29.3.25

FamousSparrow resurfaces to spy on targets in the US, Latin America Once thought to be dormant, the China-aligned group has also been observed using the privately-sold ShadowPad backdoor for the first time APT blog APT blog

29.3.25

You will always remember this as the day you finally caught FamousSparrow ESET researchers uncover the toolset used by the FamousSparrow APT group, including two undocumented versions of the group’s signature backdoor, SparrowDoor APT blog APT blog

27.3.25

APT36 Spoofs India Post Website to Infect Windows and Android Users with Malware An advanced persistent threat (APT) group with ties to Pakistan has been attributed to the creation of a fake website masquerading as India's public sector postal system as part of a campaign designed to infect both Windows and APT APT

27.3.25

New SparrowDoor Backdoor Variants Found in Attacks on U.S. and Mexican Organizations The Chinese threat actor known as FamousSparrow has been linked to a cyber attack targeting a trade group in the United States and a research institute in APT APT

23.3.25

US removes sanctions against Tornado Cash crypto mixer The U.S. Department of Treasury announced today that it has removed sanctions against the Tornado Cash cryptocurrency mixer, which North Korean Lazarus hackers used to launder hundreds of millions stolen in multiple crypto heists. APT APT

27.3.25

APT36 TURNING AID INTO ATTACK TURNING AID INTO ATTACK: EXPLOITATION OF PAKISTAN’S YOUTH LAPTOP SCHEME TO TARGET INDIA BLOG BLOG

22.3.25

Recent UAT-5918 APT malicious activities targeting entities in Taiwan Researchers from Cisco Talos have reported a long-lasting campaign targeting entities in Taiwan and attributed to the UAT-5918 APT. The attackers are known to obtain access to the targeted environments usually via vulnerability exploitation. ALERTS ALERTS

21.3.25

China-Linked APT Aquatic Panda: 10-Month Campaign, 7 Global Targets, 5 Malware Families The China-linked advanced persistent threat (APT) group. known as Aquatic Panda has been linked to a "global espionage campaign" that took place in 2022 targeting APT APT

20.3.25

OKX suspends DEX aggregator after Lazarus hackers try to launder funds OKX Web3 has decided to suspend its DEX aggregator services to implement security upgrades following reports of abuse by the notorious North Korean Lazarus hackers, who recently conducted a $1.5 billion crypto heist. APT APT

19.3.25

Unpatched Windows Zero-Day Flaw Exploited by 11 State-Sponsored Threat Groups Since 2017 An unpatched security flaw impacting Microsoft Windows has been exploited by 11 state-sponsored groups from China, Iran, North Korea, and Russia as part of data theft, espionage, and financially motivated campaigns that date back to 2017. APT APT

15.3.25

Chinese cyberspies backdoor Juniper routers for stealthy access Chinese hackers are deploying custom backdoors on Juniper Networks Junos OS MX routers that have reached end-of-life (EoL) and no longer receive security updates. APT APT

15.3.25

North Korean Lazarus hackers infect hundreds via npm packages Six malicious packages have been identified on npm (Node package manager) linked to the notorious North Korean hacking group Lazarus. APT APT
13.3.25 Blind Eagle malicious .url files variant Blind Eagle (aka APT-C-36), is a threat actor group that engages in both espionage and cyber-crime. ALERTS ALERTS
13.3.25 Leafperforator APT conducts attacks on maritime sector A new malicious campaign targeting the maritime and nuclear energy sector across South and Southeast Asia, the Middle East, and Africa has been attributed to the Leafperforator (also known as SideWinder) APT group. ALERTS ALERTS
13.3.25 North Korea's ScarCruft Deploys KoSpy Malware, Spying on Android Users via Fake Utility Apps The North Korea-linked threat actor known as ScarCruft is said to have been behind a never-before-seen Android surveillance tool named KoSpy targeting APT APT
13.3.25 Chinese Hackers Breach Juniper Networks Routers With Custom Backdoors and Rootkits The China-nexus cyber espionage group tracked as UNC3886 has been observed targeting end-of-life MX routers from Juniper Networks as part of a campaign APT APT
12.3.25 Blind Eagle: Blind Eagle: …And Justice for All APT APT
12.3.25 Blind Eagle Hacks Colombian Institutions Using NTLM Flaw, RATs and GitHub-Based Attacks The threat actor known as Blind Eagle has been linked to a series of ongoing campaigns targeting Colombian institutions and government entities since APT APT
11.3.25 SideWinder APT Targets Maritime, Nuclear, and IT Sectors Across Asia, Middle East, and Africa Maritime and logistics companies in South and Southeast Asia, the Middle East, and Africa have become the target of an advanced persistent threat (APT) group APT APT
11.3.25 SideWinder SideWinder targets the maritime and nuclear sectors with an updated toolset APT APT
8.3.25 Silk Typhoon hackers now target IT supply chains to breach networks Microsoft warns that Chinese cyber-espionage threat group 'Silk Typhoon' has shifted its tactics, now targeting remote management tools and cloud services in supply chain attacks that give them access to downstream customers. APT APT
8.3.25 US charges Chinese hackers linked to critical infrastructure breaches The US Justice Department has charged Chinese state security officers along with APT27 and i-Soon hackers for network breaches and cyberattacks that have targeted victims globally since 2011. APT APT
8.3.25 FIN7, FIN8, and Others Use Ragnar Loader for Persistent Access and Ransomware Operations Threat hunters have shed light on a "sophisticated and evolving malware toolkit" called Ragnar Loader that's used by various cybercrime and ransomware groups APT APT
6.3.25 China-Linked Silk Typhoon Expands Cyber Attacks to IT Supply Chains for Initial Access The China-linked threat actor behind the zero-day exploitation of security flaws in Microsoft Exchange servers in January 2021 has shifted its tactics to target the information technology (IT) supply chain as a means to obtain initial access to APT APT
6.3.25 Chinese APT Lotus Panda Targets Governments With New Sagerunex Backdoor Variants The threat actor known as Lotus Panda has been observed targeting government, manufacturing, telecommunications, and media sectors in the Philippines, APT APT
5.3.25 Suspected Iranian Hackers Used Compromised Indian Firm's Email to Target U.A.E. Aviation Sector Threat hunters are calling attention to a new highly-targeted phishing campaign that singled out "fewer than five" entities in the United Arab Emirates (U.A.E.) to APT APT
1.3.25 Silent Killers: Unmasking a Large-Scale Legacy Driver Exploitation Campaign While the abuse of vulnerable drivers has been around for a while, those that can terminate arbitrary processes have drawn increasing attention in recent years. APT blog APT blog
1.3.25 Lotus Blossom espionage group targets multiple industries with different versions of Sagerunex and hacking tools Lotus Blossom espionage group targets multiple industries with different versions of Sagerunex and hacking tools APT blog APT blog
1.3.25 Sellers can get scammed too, and Joe goes off on a rant about imposter syndrome Joe has some advice for anyone experiencing self doubt or wondering about their next career move. Plus, catch up on the latest Talos research on scams targeting sellers, and the Lotus Blossom espionage group. APT blog APT blog
1.3.25 Billbug (aka Lotus Blossom) threat group uses Sagerunex malware to target numerous victims The Billbug (aka Lotus Blossom) threat group has been observed leveraging Sagerunex malware, along with other hacking tools, to target numerous victims across industries. ALERTS ALERTS
28.2.25 Angry Likho Angry Likho: Old beasts in a new forest APT APT
27.2.25 Vedalia APT group phishing campaign delivers RokRat malware across Asia phishing campaign by the North Korean-linked threat actor Vedalia (also known as APT37, RedEyes and ScarCruft) has been reported delivering fileless RokRat malware. The campaign targets government and corporate entities across South Korea and Asia. ALERTS ALERTS
27.2.25 Silver Fox APT Uses Winos 4.0 Malware in Cyber Attacks Against Taiwanese Organizations A new campaign is targeting companies in Taiwan with malware known as Winos 4.0 as part of phishing emails masquerading as the country's National Taxation APT APT

22.2.25

Chinese-Speaking Group Manipulates SEO with BadIIS This blog post details our analysis of an SEO manipulation campaign targeting Asia. We also share recommendations that can help enterprises proactively secure their environment. APT blog APT blog

22.2.25

Earth Preta Mixes Legitimate and Malicious Components to Sidestep Detection Our Threat Hunting team discusses Earth Preta’s latest technique, in which the APT group leverages MAVInject and Setup Factory to deploy payloads, and maintain control over compromised systems. APT blog APT blog

22.2.25

PlushDaemon compromises supply chain of Korean VPN service

ESET researchers have discovered a supply-chain attack against a VPN provider in South Korea by a new China-aligned APT group we have named PlushDaemon

APT blog

APT blog

22.2.25

Weathering the storm: In the midst of a Typhoon

Cisco Talos has been closely monitoring reports of widespread intrusion activity against several major U.S. telecommunications companies, by a threat actor dubbed Salt Typhoon. This blog highlights our observations on this campaign and identifies recommendations for detection and prevention.

APT blog

APT blog

22.2.25 Data Leak Exposes TopSec's Role in China's Censorship-as-a-Service Operations An analysis of a data leak from a Chinese cybersecurity company TopSec has revealed that it likely offers censorship-as-a-service solutions to prospective APT APT
22.2.25 North Korean Hackers Target Freelance Developers in Job Scam to Deploy Malware Freelance software developers are the target of an ongoing campaign that leverages job interview-themed lures to deliver cross-platform malware families known as BeaverTail and InvisibleFerret. The activity, linked to North Korea, has APT APT
22.2.25 Chinese Hackers Exploit MAVInject.exe to Evade Detection in Targeted Cyber Attacks The Chinese state-sponsored threat actor known as Mustang Panda has been observed employing a novel technique to evade detection and maintain control APT APT
22.2.25 Earth Preta Earth Preta Mixes Legitimate and Malicious Components to Sidestep Detection APT APT
18.02.25 Recent RedCurl (aka EarthKapre) APT activity RedCurl (also known as EarthKapre) is a threat group known for conducting espionage and data exfiltration activities. The recently observed campaign attributed to this threat actor has been leveraging legitimate Adobe executable (ADNotificationManager.exe) to sideload malicious binaries. The infection chain has been initiated via crafted PDF malspam leading to ZIP compressed .img binaries. ALERTS ALERTS
11.02.25 Trojanized KMS activation tools leveraged in latest Sandworm APT campaigns According to the latest report published by EclecticIQ researchers, Sandworm APT (aka APT44, UAC-0145) has been recently engaged in espionage activities against users in Ukraine. The attackers have been leveraging trojanized Microsoft Key Management Service (KMS) activator tools and fake update installers in efforts aimed at distribution of a new BackOrder loader variant. ALERTS ALERTS
5.2.25 Silent Lynx Silent Lynx APT Targets Various Entities Across Kyrgyzstan & Neighbouring Nations APT APT

19.1.25

US cracks down on North Korean IT worker army with more sanctions The U.S. Treasury Department has sanctioned a network of individuals and front companies linked to North Korea's Ministry of National Defense that have generated revenue via illegal remote IT work schemes. APT APT

18.1.25

U.S. Sanctions Chinese Cybersecurity Firm Over Treasury Hack Tied to Silk Typhoon The U.S. Treasury Department's Office of Foreign Assets Control (OFAC) has imposed sanctions against a Chinese cybersecurity company and a Shanghai- APT APT

18.1.25

U.S. Sanctions North Korean IT Worker Network Supporting WMD Programs The U.S. Treasury Department's Office of Foreign Assets Control (OFAC) sanctioned two individuals and four entities for their alleged involvement in illicit APT APT

18.1.25

Recent malicious activities of the Fireant APT group Fireant (aka RedDelta, Mustang Panda) advanced persistent threat (APT) group has been targeting Mongolia, Taiwan, Myanmar, Vietnam, and Cambodia in recent campaign spreading an updated variant of the PlugX backdoor. ALERTS ALERTS

16.1.25

Lazarus Group Targets Web3 Developers with Fake LinkedIn Profiles in Operation 99 The North Korea-linked Lazarus Group has been attributed to a new cyber attack campaign dubbed Operation 99 that targeted software developers looking for APT APT

16.1.25

North Korean IT Worker Fraud Linked to 2016 Crowdfunding Scam and Fake Domains Cybersecurity researchers have identified infrastructure links between the North Korean threat actors behind the fraudulent IT worker schemes and a 2016 crowdfunding scam. The new evidence suggests that Pyongyang-based APT APT

12.1.25

MirrorFace hackers targeting Japanese govt, politicians since 2019 The National Police Agency (NPA) and the Cabinet Cyber Security Center in Japan have linked a cyber-espionage campaign targeting the country to the Chinese state-backed "MirrorFace" hacking group. APT APT

12.1.25

US Treasury hack linked to Silk Typhoon Chinese state hackers ​Chinese state-backed hackers, tracked as Silk Typhoon, have been linked to the U.S. Office of Foreign Assets Control (OFAC) hack in early December. APT APT

11.1.25

APT groups are increasingly deploying ransomware – and that’s bad news for everyone The blurring of lines between cybercrime and state-sponsored attacks underscores the increasingly fluid and multifaceted nature of today’s cyberthreats APT blog APT blog

4.1.25

U.S. Treasury Sanctions Beijing Cybersecurity Firm for State-Backed Hacking Campaigns The U.S. Treasury Department's Office of Foreign Assets Control (OFAC) on Friday issued sanctions against a Beijing-based cybersecurity company known as APT APT

3.1.25

US sanctions Chinese company linked to Flax Typhoon hackers ​The U.S. Treasury Department has sanctioned Beijing-based cybersecurity company Integrity Tech (also known as Yongxin Zhicheng) for its involvement in cyberattacks attributed to the Chinese state-sponsored Flax Typhoon hacking group. APT APT