Posts

Showing posts from June, 2021

Initial Infiltration of Construction and Engineering APT-6 & APT-7

Image
Both APT 6 & APT 7 are so similar but with the slightest differences. They both steal something that's not the same yet similar. Construction, Aerospace, Engineering and defense industrial estate are targets of APT 7. For APT 6, they share the same domain but with additional targets, Transportation, construction and materials. The attacked areas are also similar, as in The APT 6's goal is to heist a data, whereas the APT 7 steals intellectual property.                 Credits: Kaspersky If you are new to this post and not aware of about what APT is check out our first blog listed under APT which will provide you more insights. Advanced Persistent Thread-6 Anonymity FBI alert The backdoor RAT Prevention techniques Anonymity   The cybersecurity elite group confirmed that their digital signatures were so unique, meaning this APT-6 digital signature were entirely new. Zscalar who actually informed FBI saying that many organiz...

Telecommunication Attack on U.S and South East Asia APT-5

Image
APT-5 is a frequent active threat, since 2007. They target countries which has telecommunication, defense, tech-firm which supports high-tech manufacturing, like US and along with major Asian and European countries.     Major Target Areas Wireless communications are said to be the most attacked division, but other divisions like grid area communication, regional telecom provider, Asian-based communication, satellite communications, military applications are also equally targeted.   APT 5 The goal is simple yet lethal, it simply makes modification into the files and leaves less traceable track. The fact that it becomes lethal is, when it was done in satellite communications and military software programs, the images taken for confidential proprietary is exposed. Regardless of the operating system, even the embedded operating systems that are connected with an IP is vulnerable. This happens, when the computer files are introduced with the keylogger enabled Malware used to s...