Articles tagged "APT"

Found 43 articles

Kaspersky's GReAT team has released findings on a sophisticated attack by a group known as Evasive Panda APT. This group employs a technique that poisons DNS requests to deploy a malicious implant called MgBot. The attack chain includes the use of shellcode that is encrypted with DPAPI and RC5, making it harder to detect. This method poses a significant risk as it can compromise systems and networks by redirecting legitimate traffic to malicious sites. Organizations need to be aware of these tactics to prevent potential breaches and protect their infrastructure.

Impact: N/A
Remediation: Organizations should monitor DNS requests for anomalies and implement security measures to detect and block malicious traffic. Regular updates to security software and employee training on phishing and social engineering tactics are also recommended.
Read Original

Researchers at SafeBreach have identified a resurgence of activity from the Iran-linked hacking group known as Infy, or Prince of Persia. This group has been largely inactive for nearly five years, with their last known campaigns taking place in Europe. The renewed activity raises concerns as it indicates that this group remains a persistent threat. Organizations, particularly in sectors that have been targeted previously, should be vigilant and enhance their security measures to defend against potential attacks. The group’s re-emergence serves as a reminder that cyber threats can resurface after periods of silence, and preparedness is key to mitigating risks.

Impact: N/A
Remediation: Organizations should enhance their security measures and remain vigilant against potential attacks.
Read Original

A previously inactive Iranian hacking group known as Infy, or Prince of Persia, has resurfaced with new malware activity after about five years of silence. This group had previously targeted organizations in Sweden, the Netherlands, and Turkey, and recent findings suggest that their current operations are broader and more significant than previously thought. Threat researchers, including Tomer Bar from SafeBreach, have indicated that the scale of Infy's activity was underestimated. This resurgence raises concerns for potential targets, as the group's motives and capabilities could pose risks to various sectors. Organizations should remain vigilant and enhance their security measures to defend against possible intrusions.

Impact: N/A
Remediation: Organizations should enhance their security measures and stay vigilant against potential intrusions.
Read Original

A new advanced persistent threat (APT) group, identified as LongNosedGoblin, has been observed targeting government networks across Southeast Asia and Japan. This group, which appears to have links to China, is using Group Policy to infiltrate these networks, allowing them to gather sensitive information. The attack is particularly concerning because it affects national security and could lead to the compromise of confidential government communications. Researchers believe that this activity underscores the ongoing cyber espionage efforts aimed at government entities in the region, raising alarms about the security posture of these nations. The implications of such breaches could be significant, potentially impacting diplomatic relations and national security strategies.

Impact: Government networks in Southeast Asia and Japan
Remediation: Organizations should review their Group Policy configurations, enhance network monitoring, and implement stricter access controls to mitigate risks.
Read Original

The hacking group known as LongNosedGoblin has been targeting Asian governments by deploying cyberespionage tools on their networks using Group Policy. This method allows them to effectively infiltrate and operate within government systems, raising concerns about national security and data integrity. Researchers have identified this group as a persistent threat, which could compromise sensitive information and disrupt governmental operations. The implications are significant, as such attacks could weaken trust in governmental digital infrastructures and potentially expose critical data to adversaries. As this activity continues, it emphasizes the need for robust cybersecurity measures in governmental organizations to protect against such sophisticated attacks.

Impact: Asian government networks
Remediation: Strengthening cybersecurity protocols, monitoring for unusual network activity, and implementing strict access controls are recommended measures.
Read Original

Kaspersky researchers have reported on the recent activities of the Cloud Atlas advanced persistent threat (APT) group in early 2025. This group has updated their arsenal with new malicious tools, including backdoors known as VBShower, VBCloud, PowerShower, and CloudAtlas. These implants are designed to infiltrate and control targeted systems, which typically include government and corporate networks. The evolving tactics of Cloud Atlas highlight the ongoing risks to organizations, particularly those in sensitive sectors. Companies need to remain vigilant and enhance their cybersecurity measures to defend against these sophisticated threats.

Impact: Government networks, corporate systems
Remediation: Organizations should implement updated security protocols and monitor for signs of intrusion. Regularly patching systems and employing advanced threat detection solutions are recommended.
Read Original

Cisco has disclosed a critical zero-day vulnerability, tracked as CVE-2025-20393, affecting its Secure Email Gateway and Secure Email/Web Manager products. This vulnerability is currently being exploited by a China-linked advanced persistent threat group known as UAT-9686. The attack campaign began on December 10 and targets specific systems, raising significant concerns for organizations relying on these Cisco products. Users and administrators should be particularly vigilant, as this active exploitation could lead to unauthorized access and data breaches. The urgency of addressing this vulnerability cannot be overstated, given its potential impact on email security and the sensitive information handled by these systems.

Impact: Cisco Secure Email Gateway, Cisco Secure Email/Web Manager
Remediation: Organizations should apply available security patches for the affected Cisco products. They should also review their email security configurations and implement additional monitoring for unusual activity related to email traffic. Regular updates and security assessments are recommended to mitigate risks from this vulnerability.
Read Original

Kaspersky's GReAT team has reported an increase in cyberattacks from the ForumTroll APT group, which is specifically targeting Russian political scientists. The attackers are using a tool known as the Tuoni framework to infiltrate their devices. This situation is concerning as it shows a focused attempt to compromise the devices of individuals involved in political research, potentially to gather sensitive information or disrupt their work. The targeting of political scientists indicates a strategic move to influence or monitor political discourse in Russia. These incidents serve as a reminder of the ongoing risks faced by academics and researchers in politically sensitive environments.

Impact: Devices of Russian political scientists, potentially including personal computers and academic networks.
Remediation: N/A
Read Original

Researchers have uncovered a scheme involving the Lazarus APT group, linked to North Korea, utilizing remote IT workers to conduct cyber operations. This highlights the evolving tactics of cybercriminals and the ongoing threat posed by state-sponsored hacking groups. The investigation underscores the importance of vigilance in cybersecurity as these actors adapt to new methods of operation.

Impact: N/A
Remediation: N/A
Read Original

The article reports on a joint investigation revealing a remote IT worker infiltration scheme linked to North Korea's Lazarus Group. This scheme highlights the persistent threat posed by state-sponsored cyber actors, emphasizing the need for heightened awareness and security measures against such infiltration tactics.

Impact: Remote IT workers, organizations employing remote staff, potential victims of Lazarus Group attacks.
Remediation: Organizations should enhance security protocols for remote workers, including robust vetting processes, employee training on cybersecurity awareness, and monitoring for unusual activity.
Read Original

The article discusses the ToddyCat APT attacks that target corporate email systems, highlighting the use of advanced tools like TomBerBil, TCSectorCopy, and XstReader. The severity of these attacks lies in their method of stealing access tokens from Outlook, posing significant risks to corporate security.

Impact: Corporate email systems, Outlook
Remediation: N/A
Read Original

China's state-sponsored hackers, known as 'PlushDaemon', have developed a method to infect routers and hijack software updates, primarily targeting Chinese organizations. This sophisticated approach allows them to operate under the radar, posing a significant threat to cybersecurity within the region.

Impact: Routers and software update systems used by Chinese organizations.
Remediation: Implement network security measures, regularly update router firmware, and monitor for unusual software update behaviors.
Read Original
PreviousPage 3 of 3