Posts

Showing posts with the label China

Weaponizing Historical Malware for Bio-Warfare APT-9

Image
Advancing till APT9 made us to think why emergent and emerging nations are allegedly suspecting china for the cyberattack. To suspect China, those nations require additional information. As of now, the world powers says that all command and control are located in China, and also they are the one to introduce the concept of APT(Advanced Persistent Threat). APT9 APT9 targets biotechnology and pharmaceutical industry. They gained initial access through spearfishing mails and acting as a trusted party between the industry. APT 9 uses some malwares which were already used by the APT1, APT4 and APT5 threat groups. They modified it in accordance to their needs, so that antivirus engine can't detect those threats as their hash value are modified. Most of the RAT's and backdoors used in this attack are already been used by other threat groups in China, so this is also suspected to be originated from China. Source: ITW Malwares Used HomeUnix, FunRun, Zxshell, Gh0st( Apt1 ), Sogu( Apt3...

A Step to Doom the Entertainment Industry and Defence Apt-8

Image
APT 8! This is a serious bummer for everyone, especially those who make a living out of social media, because it attacks the entertaining industries. Threat Sector APT 8's target's both an organization and an individual and their domains were Cyber industries, media and entertainment, aerospace and construction. APT 8 APT 8 is involves in cyberattacks to achieve Intellectual Property Theft. Similar to APT 7 it steals data from different companies and organizations that shares cyber field. To add furthermore into the mist, these attacks are done by a group of freelancers abode with the Chinese government. The attacks done on the entertainment industries had made a great impact in terms of money. Countries like India, Japan, Germany, U.K., are few of many countries which sees major flow of money through entertainment and these countries had been the targeted ones.   Attack Vectors To condemn the targeted companies, The spear phishing e-mails attacks are used, implied with malicio...

Initial Infiltration of Construction and Engineering APT-6 & APT-7

Image
Both APT 6 & APT 7 are so similar but with the slightest differences. They both steal something that's not the same yet similar. Construction, Aerospace, Engineering and defense industrial estate are targets of APT 7. For APT 6, they share the same domain but with additional targets, Transportation, construction and materials. The attacked areas are also similar, as in The APT 6's goal is to heist a data, whereas the APT 7 steals intellectual property.                 Credits: Kaspersky If you are new to this post and not aware of about what APT is check out our first blog listed under APT which will provide you more insights. Advanced Persistent Thread-6 Anonymity FBI alert The backdoor RAT Prevention techniques Anonymity   The cybersecurity elite group confirmed that their digital signatures were so unique, meaning this APT-6 digital signature were entirely new. Zscalar who actually informed FBI saying that many organiz...

The precedence of Cyberwar from China APT-2

Image
Welcome to the Cyber precedence of China Part-2, Today we are just curious to learn about how APT-2 attack was successfully conducted by targeting Military and Defense network. APT-2 doesn't damage any property instead it was stealing all the information from the unencrypted web and network interface. If you are curious to know about APT-1 and what APT does, check our first previous blog. APT-2 Consists of two main Malwares MOOSE WARP                                                                                                                                            ...

The precedence of Cyberwar from China APT-1

Image
APT,  Advanced Persistent Threat , is usually a state/nation sponsored threat or sometimes a private consultancy service provoke this threat, targeting individual users(high profiles) or preferably a country. They sneak into our system via the network. These threads remain in our system for years, possibly decades too. The main aim of APT is to get all the information from the target without the user knowledge. Even the latest firewall/antivirus would fail to prevent this attack. The main drawback of all the APT's/threat is they require user interaction in order to gain access to our system. This is mostly done through phishing attacks.       Phishing : A threat actor gathers the target's information using publicly disclosed, social media or through breached websites. Threat agents use this information to obtain your PID like email, phone number, Date of birth, Location, Address, your interests, The ads you clicked online and so on. Keeping this details th...

Conflict Minerals

Image
Before stepping into our topic I want to thank each and every niche readers and commenters of this blog. We etched our first achievement. Yes, this is our 25th post and will be continuing our journey till the knowledge well dries. On this special day we have decided to add an announcements page in our blog, so, stay tuned for the updates.                                               Conflict Minerals Every electronic users in the world is a killer. Even you and me. Do you accept? Let our blog elaborates the deepest cries made by the African people and refugees.        Think twice before purchasing an electronic gadget. They can unwittingly kill 4 children's education. If we value our children's future then why can't we value them?? Minerals like Tantalum, Tin and Tungsten are mined by individual miners without using any prevention m...