Researchers at Censys have identified 5,219 devices that are vulnerable to attacks from Iranian Advanced Persistent Threat (APT) groups, with a significant number located in the United States. This exposure raises concerns about the potential for targeted cyber operations against various sectors, especially given the geopolitical tensions involving Iran. The findings suggest that organizations should assess their security postures and take proactive measures to mitigate risks associated with these vulnerabilities. The presence of such a large number of exposed devices indicates a broader issue of inadequate cybersecurity practices that could lead to severe consequences if exploited. Companies and users need to be vigilant and enhance their defenses against these potential threats.
Articles tagged "APT"
Found 43 articles
The Russian cyber espionage group known as Fancy Bear is reportedly continuing its global attacks, targeting various organizations around the world. Experts warn that while victims may not possess the same level of technical sophistication as the attackers, they must take proactive steps to protect themselves. Essential measures include regularly patching software vulnerabilities and implementing zero trust security models to enhance defenses. The ongoing activity of Fancy Bear underscores the need for organizations, regardless of size or technical expertise, to prioritize cybersecurity practices to mitigate risks. As these attacks evolve, awareness and preparedness are crucial for safeguarding sensitive data and systems.
Hackread – Cybersecurity News, Data Breaches, AI and More
A dark web marketplace called Threat Market is advertising a massive haul of Lockheed Martin data, claiming to have 375 terabytes of sensitive information. The alleged source of this leak is a group identifying itself as 'APT Iran.' If true, this could pose serious risks not only to Lockheed Martin but also to national security, given the company's role in defense contracts. The asking price for this data is a staggering $600 million, raising concerns about the potential for misuse. This incident underscores the ongoing threat posed by malicious actors targeting major corporations and government contractors, highlighting the need for enhanced cybersecurity measures across the industry.
Security Affairs
A Russian-linked hacking group known as TA446 is actively targeting iPhone users through a new phishing campaign that employs the DarkSword iOS exploit kit. These attacks involve sending malicious emails designed to compromise iOS devices, putting users' personal information at risk. The group, also referred to as SEABORGIUM and ColdRiver, has been noted for its sophisticated tactics in the past. This wave of phishing emphasizes the increasing dangers that smartphone users face, especially as attackers refine their methods to bypass security measures. As these campaigns evolve, it’s crucial for iPhone users to remain vigilant about suspicious emails and links.
Security Affairs
CVE-2025-66376A Russian advanced persistent threat (APT) group has been exploiting a critical cross-site scripting (XSS) vulnerability in Zimbra, identified as CVE-2025-66376, with a severity score of 7.2. The attackers are sending HTML emails that contain insufficiently sanitized scripts, which execute when opened by users. This campaign specifically targets individuals in Ukraine, highlighting the ongoing cyber conflict in the region. The exploitation of this vulnerability could allow attackers to compromise user accounts and access sensitive information. Organizations using Zimbra should be particularly vigilant and take immediate action to secure their systems.
Security Affairs
Since 2020, a Chinese-linked hacking group known as CL-STA-1087 has been targeting military organizations in Southeast Asia. This group has utilized two types of malware, named AppleChris and MemFun, to carry out its espionage activities. The group's operations show a calculated approach, focusing on gathering specific intelligence rather than conducting widespread attacks. This ongoing campaign raises concerns about the security of military data in the region and highlights the risks posed by state-sponsored cyber espionage. The implications of such targeted attacks could undermine national security and diplomatic relations in Southeast Asia.
Iranian state-sponsored hackers are reportedly collaborating with real cybercriminal groups to enhance their cyberattacks. This partnership marks a shift from the previous strategy where Iranian advanced persistent threat (APT) groups masqueraded as criminal entities. By aligning with actual criminals, these APTs aim to bolster their capabilities and expand their reach in the cyber realm. This development raises concerns about the potential for more sophisticated and damaging attacks on various targets, including businesses and government entities. The implications of this collaboration could lead to an increase in cybercrime and state-sponsored attacks, posing a significant risk to cybersecurity efforts globally.
North Korean advanced persistent threats (APTs) are increasingly using artificial intelligence to enhance their scams targeting IT workers. These scams, which have been around for a while, are now more sophisticated thanks to AI tools that assist in tasks like creating convincing fake identities and automating email communications. By employing these technologies, attackers can effectively impersonate legitimate contacts and manipulate potential victims into providing sensitive information or financial resources. This evolution in tactics raises concerns for companies and individuals in the tech sector, as it becomes harder to distinguish between real and fraudulent communications. Organizations should be vigilant and implement stronger verification processes to protect against these AI-driven scams.
Securelist
The report details the vulnerabilities and exploits identified during the fourth quarter of 2025, with a focus on their impact on various systems and the rising use of command-and-control (C2) frameworks in advanced persistent threat (APT) attacks. Researchers noted an increase in published vulnerabilities, which could affect numerous organizations and users relying on these systems. The report emphasizes the importance of timely patching and updating to mitigate risks associated with these vulnerabilities. As APT groups increasingly employ sophisticated C2 frameworks, organizations must enhance their security measures to protect against potential breaches. This summary of findings is crucial for cybersecurity professionals aiming to stay ahead of evolving threats and safeguard their networks.
Security Affairs
A newly identified hacking group, suspected to be linked to Russian intelligence, has launched attacks against various Ukrainian sectors, including defense, government, and energy. This group is using a malware called CANFAIL, which was uncovered by researchers from Google Threat Intelligence Group. The targeting of critical infrastructure and military entities raises significant concerns about national security and the ongoing conflict in the region. As these attacks could disrupt essential services and information systems, the situation highlights the need for enhanced cybersecurity measures among the affected organizations. This incident is part of a broader pattern of cyber warfare tactics being employed against Ukraine.
Security Affairs
A Chinese cyber espionage group known as UNC3886 has been targeting Singapore's telecommunications sector, according to a report from the Cyber Security Agency of Singapore (CSA). Since July 2025, the group has executed a campaign aimed at all four major telecom companies in the country. In response, the CSA and the Infocomm Media Development Authority (IMDA) initiated Operation CYBER GUARDIAN to bolster defenses and protect sensitive information within the telecom industry. This incident raises concerns about the potential for data breaches and the implications for national security, given the critical role that telecommunications play in modern infrastructure. The situation underscores the need for ongoing vigilance and enhanced cybersecurity measures within essential sectors.
SCM feed for Latest
Researchers from SafeBreach have reported that an Iranian hacking group known as Infy APT has adapted its tactics by using Telegram for command and control (C2) operations. This shift comes after a period of internet restrictions imposed by the Iranian government, which has since ended, allowing the group to re-establish its online presence. The use of Telegram for C2 indicates a strategic change, making it easier for attackers to communicate and coordinate their activities while potentially evading detection. This development is concerning for organizations that may be targeted by these tactics, as it suggests a more sophisticated approach to cyber espionage and attacks. Keeping an eye on these evolving methods is crucial for cybersecurity professionals in order to protect sensitive information.
A recent report from Palo Alto Networks reveals that a cyberspy group has successfully targeted governments and critical infrastructure across 37 countries. While the specific origin of these attacks hasn't been confirmed, there are strong indications pointing to China as the likely source. The affected entities include various government agencies and critical infrastructure sectors, which raises significant concerns about national security and the potential for disruption in essential services. The scale of the operation suggests a sophisticated level of planning and execution, highlighting the ongoing risks that nation-states pose in the cyber realm. This incident serves as a reminder for organizations worldwide to bolster their cybersecurity defenses and remain vigilant against such threats.
SCM feed for Latest
A new cyber threat known as the PeckBirdy framework has been linked to advanced persistent threats (APTs) associated with China. This framework is particularly targeting gambling and government entities, utilizing JScript and living-off-the-land binaries (LOLBins) to execute attacks across various environments. The implications of these attacks are significant, as they could compromise sensitive information and disrupt operations within the affected sectors. Organizations in the gambling and government sectors should be vigilant and strengthen their security measures to prevent potential breaches. Researchers are continuing to monitor the situation for further developments and potential mitigation strategies.
Infosecurity Magazine
The PeckBirdy command-and-control framework has been identified as a tool used by cyber attackers targeting gambling and government sectors across Asia since 2023. Researchers have linked this framework to advanced persistent threats (APTs) that are aligned with Chinese interests, indicating a strategic focus on these industries. The attacks suggest a concerted effort to gather intelligence or disrupt operations within these sectors. As these attacks are ongoing, they pose a significant risk to the affected organizations, potentially leading to data breaches or operational disruptions. The implications of these cyber campaigns highlight the need for enhanced security measures in vulnerable industries.