APT Blog News(46)  -    2024  2023  2022  2021  2020  2019  2018

APT blog  Attack blog  BigBrother blog  BotNet blog  Cyber blog  Cryptocurrency blog  Exploit blog  Hacking blog  ICS blog  Incident blog  IoT blog  Malware blog  OS Blog  Phishing blog  Ransom blog  Safety blog  Security blog  Social blog  Spam blog  Vulnerebility blog

DATE

NAME

Info

CATEG.

WEB

2.11.24

CloudScout: Evasive Panda scouting cloud services ESET researchers discovered a previously undocumented toolset used by Evasive Panda to access and retrieve data from cloud services APT blog

Eset

2.11.24

Separating the bee from the panda: CeranaKeeper making a beeline for Thailand ESET Research details the tools and activities of a new China-aligned threat actor, CeranaKeeper, focusing on massive data exfiltration in Southeast Asia APT blog

Eset

2.11.24

Separating the bee from the panda: CeranaKeeper making a beeline for Thailand ESET Research details the tools and activities of a new China-aligned threat actor, CeranaKeeper, focusing on massive data exfiltration in Southeast Asia APT blog

Eset

21.9.24

The Iranian Cyber CapabilityIn this blog, we will provide an overview of the Iranian threat landscape and discuss the tools, tactics and techniques used by these groups.APT blogTrelix

14.9.24

CUCKOO SPEAR Part 1: Analyzing NOOPDOOR from an IR PerspectiveIn this report, Cybereason confirms the ties between Cuckoo Spear and APT10 Intrusion Set by tying multiple incidents together and disclosing new information about this group’s new arsenal and techniquesAPT blogCybereason

14.9.24

Chinese APT Abuses VSCode to Target Government in AsiaUnit 42 researchers recently found that Stately Taurus abused the popular Visual Studio Code software in espionage operations targeting government entities in Southeast Asia. Stately Taurus is a Chinese advanced persistent threat (APT) group that carries out cyberespionage attacks. APT blogPalo Alto

14.9.24

Targeted Iranian Attacks Against Iraqi Government InfrastructureCheck Point Research discovered a new set of malware called Veaty and Spearal that was used in attacks against different Iraqi entities including government networks.APT blogCheckpoint

14.9.24

DragonRank, a Chinese-speaking SEO manipulator service providerCisco Talos is disclosing a new threat called “DragonRank” that primarily targets countries in Asia and a few in Europe, operating PlugX and BadIIS for search engine optimization (SEO) rank manipulationAPT blog

Cisco Blog

31.8.24

Threat Actors Target the Middle East Using Fake Palo Alto GlobalProtect ToolThreat actors are targeting users in the Middle East by distributing sophisticated malware disguised as the Palo Alto GlobalProtect tool.APT blog

Trend Micro

10.8.24

Fighting Ursa Luring Targets With Car for SaleA Russian threat actor we track as Fighting Ursa advertised a car for sale as a lure to distribute HeadLace backdoor malware. The campaign likely targeted diplomats and began as early as March 2024. Fighting Ursa (aka APT28, Fancy Bear and Sofacy) has been associated with Russian military intelligence and classified as an advanced persistent threat (APT).APT blog

Palo Alto

3.8.24

APT41 likely compromised Taiwanese government-affiliated research institute with ShadowPad and Cobalt StrikeShadowPad, widely considered the successor of PlugX, is a modular remote access trojan (RAT) only seen sold to Chinese hacking groups.APT blogCisco Blog

13.7.24

Cracking Cobalt Strike: Taking Down Malicious Cybercriminal Infrastructure with Threat IntelligenceTrellix and global law enforcement dismantle malicious Cobalt Strike infrastructure, enhancing cybersecurity and protecting critical sectors. Learn about our fight against cybercrime.APT blogTrelix
29.6.24Behind the Great Wall: Void Arachne Targets Chinese-Speaking Users With the Winos 4.0 C&C FrameworkWe recently discovered a new threat actor group that we dubbed Void Arachne. This group targets Chinese-speaking users with malicious Windows Installer (MSI) files in a recent campaign. These MSI files contain legitimate software installer files for AI software and other popular software but are bundled with malicious Winos payloads. APT blogTrend Micro
15.6.24ESET Research Podcast: APT Activity Report Q4 2023–Q1 2024The I-SOON data leak confirms that this contractor is involved in cyberespionage for China, while Iran-aligned groups step up aggressive tactics following the Hamas-led attack on Israel in 2023APT blogEset
8.6.24Router Roulette: Cybercriminals and Nation-States Sharing Compromised NetworksCybercriminals and Advanced Persistent Threat (APT) actors share a common interest in proxy anonymization layers and Virtual Private Network (VPN) nodes to hide traces of their presence and make detection of malicious activities more difficult. This shared interest results in malicious internet traffic blending financial and espionage motives. APT blogTrend Micro

1.6.24

LilacSquid: The stealthy trilogy of PurpleInk, InkBox and InkLoaderCisco Talos is disclosing a new suspected data theft campaign, active since at least 2021, we attribute to an advanced persistent threat actor (APT) we’re calling “LilacSquid.” Multiple TTPs utilized in this campaign bear some overlap with North Korean APT groups.APT blogCisco Blog

25.5.24

Operation Diplomatic Specter: An Active Chinese Cyberespionage Campaign Leverages Rare Tool Set to Target Governmental Entities in the Middle East, Africa and AsiaA Chinese advanced persistent threat (APT) group has been conducting an ongoing campaign, which we call Operation Diplomatic Specter. This campaign has been targeting political entities in the Middle East, Africa and Asia since at least late 2022. APT blogPalo Alto

25.5.24

BAD KARMA, NO JUSTICE: VOID MANTICORE DESTRUCTIVE ACTIVITIES IN ISRAELVoid Manticore is an Iranian threat actor affiliated with the Ministry of Intelligence and Security (MOIS). They carry out destructive wiping attacks combined with influence operations.APT blogCheckpoint

25.5.24

SHARP DRAGON EXPANDS TOWARDS AFRICA AND THE CARIBBEANSharp Dragon’s (Formerly referred to as Sharp Panda) operations continue, expanding their focus now to new regions – Africa and the Caribbean.APT blogCheckpoint

18.5.24

The who, where, and how of APT attacks – Week in security with Tony AnscombeThis week, ESET experts released several research publications that shine the spotlight on a number of notable campaigns and broader developments on the threat landscapeAPT blogEset

18.5.24

To the Moon and back(doors): Lunar landing in diplomatic missionsESET researchers provide technical analysis of the Lunar toolset, likely used by the Turla APT group, that infiltrated a European ministry of foreign affairsAPT blogEset

18.5.24

ESET APT Activity Report Q4 2023–Q1 2024An overview of the activities of selected APT groups investigated and analyzed by ESET Research in Q4 2023 and Q1 2024APT blogEset
4.5.24Muddled Libra’s Evolution to the CloudUnit 42 researchers have discovered that the Muddled Libra group now actively targets software-as-a-service (SaaS) applications and cloud service provider (CSP) environments. APT blogPalo Alto
4.5.24James Nutland studies what makes threat actors tick, growing our understanding of the current APT landscapeNutland says he goes into every engagement or new project with a completely open mind and a blank slate — using his background investigating terror operations to find out as much as he can about a particular adversary’s operation.APT blogCisco Blog
13.4.24Muddled Libra’s Evolution to the CloudUnit 42 researchers have discovered that the Muddled Libra group now actively targets software-as-a-service (SaaS) applications and cloud service provider (CSP) environments. APT blogPalo Alto
23.3.24New details on TinyTurla’s post-compromise activity reveal full kill chainWe now have new information on the entire kill chain this actor uses, including the tactics, techniques and procedures (TTPs) utilized to steal valuable information from their victims and propagate through their infected enterprises.APT blogCisco Blog
9.3.24Threat Group Assessment: Muddled Libra (Updated)Muddled Libra stands at the intersection of devious social engineering and nimble technology adaptation. With an intimate knowledge of enterprise information technology, this threat group presents a significant risk even to organizations with well-developed legacy cyber defenses. APT blogPalo Alto
9.3.24APT attacks taking aim at Tibetans – Week in security with Tony AnscombeEvasive Panda has been spotted targeting Tibetans in several countries and territories with payloads that included a previously undocumented backdoor ESET has named NightdoorAPT blogEset
9.3.24Evasive Panda leverages Monlam Festival to target TibetansESET researchers uncover strategic web compromise and supply-chain attacks targeting TibetansAPT blogEset
25.2.24Data From Chinese Security Services Company i-Soon Linked to Previous Chinese APT CampaignsOn Feb. 16, 2024, someone uploaded data to GitHub that included possible internal company communications, sales-related materials and product manuals belonging to the Chinese IT security services company i-Soon, also known as Anxun Information Technology.APT blogPalo Alto
25.2.24TinyTurla-NG in-depth tooling and command and control analysisCisco Talos, in cooperation with CERT.NGO, has discovered new malicious components used by the Turla APT. New findings from Talos illustrate the inner workings of the command and control (C2) scripts deployed on the compromised WordPress servers utilized in the compromise we previously disclosed.APT blogCisco Blog
18.2.24Threat Brief: Attacks on Critical Infrastructure Attributed to Insidious Taurus (Volt Typhoon)Insidious Taurus (aka Volt Typhoon) is identified by U.S. government agencies and international government partners as People’s Republic of China (PRC) state-sponsored cyber actors.APT blogPalo Alto
18.2.24TinyTurla Next Generation - Turla APT spies on Polish NGOsThis new backdoor we’re calling “TinyTurla-NG” (TTNG) is similar to Turla’s previously disclosed implant, TinyTurla, in coding style and functionality implementation.APT blogCisco Blog
4.2.24VajraSpy: A Patchwork of espionage appsESET researchers discovered several Android apps carrying VajraSpy, a RAT used by the Patchwork APT groupAPT blogEset
4.2.24Blackwood hijacks software updates to deploy NSPX30 – Week in security with Tony AnscombeThe previously unknown threat actor used the implant to target Chinese and Japanese companies, as well as individuals in China, Japan, and the UKAPT blogEset
4.2.24NSPX30: A sophisticated AitM-enabled implant evolving since 2005ESET researchers have discovered NSPX30, a sophisticated implant used by a new China-aligned APT group we have named BlackwoodAPT blogEset