• Home
  • About Us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms & Conditions
Flyy Tech
  • Home
  • Apple
  • Applications
    • Computers
    • Laptop
    • Microsoft
  • Security
  • Smartphone
  • Gaming
  • Entertainment
    • Literature
    • Cooking
    • Fitness
    • lifestyle
    • Music
    • Nature
    • Podcasts
    • Travel
    • Vlogs
  • Camera
  • Audio
No Result
View All Result
  • Home
  • Apple
  • Applications
    • Computers
    • Laptop
    • Microsoft
  • Security
  • Smartphone
  • Gaming
  • Entertainment
    • Literature
    • Cooking
    • Fitness
    • lifestyle
    • Music
    • Nature
    • Podcasts
    • Travel
    • Vlogs
  • Camera
  • Audio
No Result
View All Result
Flyy Tech
No Result
View All Result

State-Backed APT Group Activity Continuing Apace

flyytech by flyytech
November 16, 2022
Home Security
Share on FacebookShare on Twitter


High levels of advanced persistent threat (APT) group activity from Russia, China, Iran and North Korea has continued since the Russian invasion of Ukraine, according to the ESET APT Activity Report T2 2022.

ESET researchers analyzed cyber activities of many of these groups, which are usually operated by a nation-state or by state-sponsored actors, during the period May to August 2022. Their activities are generally undertaken for the purposes of harvesting sensitive data from governments, high-profile individuals or strategic companies.

Jean-Ian Boutin, director of ESET Threat Research told Infosecurity that while APT groups in the four countries are continuing to be highly active, there have been no signs of coordination between these regions.

“We have not seen signs of collaboration between groups that have a different country alignment. They sometimes target the same organizations, but we have no evidence that they are collaborating. We believe that in those cases, they have similar goals and thus, overlapping targets,” he commented.

Russia

Unsurprisingly, Russia-aligned APT groups were particularly active in targeting Ukraine over the four-month period. One of the most “continuously active” was Gamaredon, which the report noted has been prominent in targeting Ukrainian government entities throughout 2022. This group “constantly modifies its tools to evade detection mechanisms,” said the report, and has recently started to use a third-party service, ip-api.com, for resolving IP addresses of its C&C servers instead of regular DNS.

Other Russian APT groups highlighted for their role in targeting Ukraine over this period included Sandworm, Gamaredon, InvisiMole, Callista and Turla. Sandworm, which ESET linked to an attempt to deploy a new version of Industroyer malware against high-voltage electrical substation in Ukraine in April 2022, has since used the ArguePatch loader to launch payloads like CaddyWiper. This has impacted at least three Ukrainian organizations, two of which were local governments, said the report.

ESET believes Sandworm is using social media platform Telegram to leak information stolen during CaddyWiper campaigns, an approach increasingly being taken by other Russian APT actors.

“We have noticed that in T2 2022, several Russia-aligned groups used the Russian multiplatform messaging service Telegram to access C&C servers or as an instrument to leak information. Threat actors from other regions were also trying to gain access to Ukrainian organizations, both for cyber espionage and intellectual property theft,” commented Boutin.

Despite the continued attacks, speaking exclusively to Infosecurity, Boutin noted “a slow-down in the operations of threat actors targeting Ukrainian organizations.”

He explained: “In the first few months of the war, we were seeing more attacks using various wiper families targeting a wider array of organizations. In the past few months, we saw wiper campaigns as well, but mostly using CaddyWiper and on a much slower cadence than at the beginning of the conflict.”

This slow-down may be partly explained by the resilience of Ukraine’s cyber-defenses, which has been praised by the UK’s National Cyber Security Centre CEO Lindy Cameron.

China

Numerous China-aligned APT groups remained highly active between May and August 2022, according to the study. These include SparklingGoblin, which ESET believe was behind an attack using a Linux version of the SideWalk backdoor against a Hong Kong University in February 2021.

The researchers also attributed SparklingGoblin with an attack on a food manufacturing company in Germany by leveraging a Confluence vulnerability (CVE-2022-026134) and automating the initial compromise. They suspect the same vulnerability helped the group gain access to a Confluence server of an engineering company based in the US.

Additionally, ESET believe a Chinese APT group may have been behind an attack on a US defense contractor, following the compromise of a web-based password management and single sign-on product. However, “we haven’t yet found enough similarities to make a good attribution to a known group.”

The firm suspects CVE-2022-28810 was exploited in this incident, just two days after it was disclosed. This “highlights the necessity of updating internet-facing software as soon as possible,” stated the report.

Iran

The notorious Iranian APT group POLONIUM targeted more than a dozen Israeli organizations in the report’s time frame. The researchers highlighted the espionage group’s continuous adaptions to its custom tools to avoid detection.

Another well-known threat actor, APT3, has targeted various industries in Israel, such as cosmetics retailing, cybersecurity holding companies, electronics manufacturing and legal services. This campaign has been active since at least October 2021, according to the report, and uses different versions of the SponsoredRunner backdoor to target organizations.

Other active Iran-aligned APT groups over this period were Agrius, APT-C-50 and OilRig, with Israeli organizations the most common targets.

North Korea

The most infamous North Korean threat group, Lazarus, has been involved in several spearphishing campaigns using the lure of fake job offers to compromise sensitive industries. One of these targeted an employee of an aerospace company in the Netherlands, resulting in an email with a malicious document attachment. The attackers delivered a user-mode module that gained the ability to read and write kernel memory due to the CVE-2021-21551 vulnerability in a legitimate Dell driver.

Boutin outlined: “The aerospace and defense industry remains of interest to North Korea-aligned groups – Lazarus targeted an employee of an aerospace company in the Netherlands. According to our research, the group abused a vulnerability in a legitimate Dell driver to infiltrate the company, and we believe this to be the first-ever recorded abuse of this vulnerability in the wild.”

In another campaign, an individual in Argentina was targeted with malware disguised as a fake offer at Coinbase, a cryptocurrency exchange. Other North Korea-aligned groups that were active in the four-month period were Kimsuky and Konni.

Final Thoughts

Concluding the report, ESET researchers noted that while APT groups’ attacks are often directed at governmental bodies, “entities and individuals working within other mentioned targeted profiles should also maintain a heightened state of awareness.”

They continued: “Several cases in this report clearly show that acquired technology is not the only type of protection that should be deployed, but that organizations must also increase the overall cybersecurity awareness of their employees. A special area of focus here should be on spearphishing, as this is one of the most used initial compromise vectors seen in the described activities.”

In early November 2022, Microsoft reported a “disturbing” rise in aggressive nation-state cyber activity in the past year.



Source_link

flyytech

flyytech

Next Post
Microsoft Surface Pro 9 (SQ3) review

Microsoft Surface Pro 9 (SQ3) review

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended.

Atomic Heart Gets A Release Date And An Odd New Trailer

Atomic Heart Gets A Release Date And An Odd New Trailer

November 3, 2022
Practical Test & Measurement: The Proof Is in the Testing

Practical Test & Measurement: The Proof Is in the Testing

April 18, 2023

Trending.

Shop now. Pay later. on the App Store

Shop now. Pay later. on the App Store

February 25, 2023
Thermalright Peerless Assassin 120 SE Review: Incredible, Affordable Air Cooling Performance

Thermalright Peerless Assassin 120 SE Review: Incredible, Affordable Air Cooling Performance

September 27, 2022
Volla Phone 22 review

Volla Phone 22 review

March 26, 2023
USIU student team qualifies for Microsoft Imagine Cup World Championship

USIU student team qualifies for Microsoft Imagine Cup World Championship

April 5, 2023
Light Lens Lab 50mm f/2 Review: The Classic Speed Panchro II Reborn

Light Lens Lab 50mm f/2 Review: The Classic Speed Panchro II Reborn

March 22, 2023

Flyy Tech

Welcome to Flyy Tech The goal of Flyy Tech is to give you the absolute best news sources for any topic! Our topics are carefully curated and constantly updated as we know the web moves fast so we try to as well.

Follow Us

Categories

  • Apple
  • Applications
  • Audio
  • Camera
  • Computers
  • Cooking
  • Entertainment
  • Fitness
  • Gaming
  • Laptop
  • lifestyle
  • Literature
  • Microsoft
  • Music
  • Podcasts
  • Review
  • Security
  • Smartphone
  • Travel
  • Uncategorized
  • Vlogs

Site Links

  • Home
  • About Us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms & Conditions

Recent News

Palm-Sized Minisforum EM680 Desktop PC Packs AMD’s Ryzen 7 6800U and USB4

Palm-Sized Minisforum EM680 Desktop PC Packs AMD’s Ryzen 7 6800U and USB4

June 9, 2023
City of Dallas Still Clawing Back Weeks After Cyber Incident

City of Dallas Still Clawing Back Weeks After Cyber Incident

June 9, 2023

Copyright © 2022 Flyytech.com | All Rights Reserved.

No Result
View All Result
  • Home
  • Apple
  • Applications
    • Computers
    • Laptop
    • Microsoft
  • Security
  • Smartphone
  • Gaming
  • Entertainment
    • Literature
    • Cooking
    • Fitness
    • lifestyle
    • Music
    • Nature
    • Podcasts
    • Travel
    • Vlogs

Copyright © 2022 Flyytech.com | All Rights Reserved.

What Are Cookies
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
Cookie SettingsAccept All
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT