A Step to Doom the Entertainment Industry and Defence Apt-8
APT 8! This is a serious bummer for everyone, especially those who make a living out of social media, because it attacks the entertaining industries.
Threat Sector
APT 8's target's both an organization and an individual and their domains were Cyber industries, media and entertainment, aerospace and construction.
APT 8
APT 8 is involves in cyberattacks to achieve Intellectual Property Theft. Similar to APT 7 it steals data from different companies and organizations that shares cyber field. To add furthermore into the mist, these attacks are done by a group of freelancers abode with the Chinese government.
The attacks done on the entertainment industries had made a great impact in terms of money. Countries like India, Japan, Germany, U.K., are few of many countries which sees major flow of money through entertainment and these countries had been the targeted ones.
Attack Vectors
To condemn the targeted companies, The spear phishing e-mails attacks are used, implied with malicious threats and links. The other method were to find the vulnerability present in the web server with internet and exploit them.
To further extend, the actors attacks an individual by sending phishing links in chats, messages and email.
Associated Malware
HASH, GOLFPRO, SAFEPUTT, FLYZAP
Hash
A software malware found in payment ecosystem services. It was exploited on an individual through phishing.
The Breakthrough
There's no major weak slot, but once a user allows to exploit them it becomes a major vulnerability.
To find these sorts of minor weakness, the organization started Name-That-Hash group with ethical hackers over the globe.
GolfPro
It was a malware found in an antivirus software. A deep cover-up was done to protect the vulnerability it created, since that all of its information were archived and found none to zero regarding this.
Additional Info..,
When the attackers target their goal, they find a dead-end in some cases which has a better firewall. APT-RPM, is a part of the firewall, a library file software used to control the flow of software packages.
In search of a bug, they found a minor one in the back end of this software.
APT-GET, a package handling utility in command line interface. The back end of the user is considered to use other tools in the library file.
They discovered and exploited the bug, from where they created a passage to deploy the Malware which reaches the front end of the software to steal the Intellectual Property.
Comments