Posts

Showing posts with the label Chinese

Telecommunication Attack on U.S and South East Asia APT-5

Image
APT-5 is a frequent active threat, since 2007. They target countries which has telecommunication, defense, tech-firm which supports high-tech manufacturing, like US and along with major Asian and European countries.     Major Target Areas Wireless communications are said to be the most attacked division, but other divisions like grid area communication, regional telecom provider, Asian-based communication, satellite communications, military applications are also equally targeted.   APT 5 The goal is simple yet lethal, it simply makes modification into the files and leaves less traceable track. The fact that it becomes lethal is, when it was done in satellite communications and military software programs, the images taken for confidential proprietary is exposed. Regardless of the operating system, even the embedded operating systems that are connected with an IP is vulnerable. This happens, when the computer files are introduced with the keylogger enabled Malware used to s...

The programmable keylogger APT-4

Image
Keylogger/Keystroke Every key we press on an electronic device emits certain frequency and this is termed as DTMF(Dual Tone Multi Frequency) . This tone can be easily detected using some common apps available on play store/App Store today. But, it can also be heard and find the exact key not by only practice but in a perfect silence condition. This consumes time and at least requires 2-3 years of patience.      But this can also be achieved through scripting. Yes!! You read that right. By using some advanced frameworks that were available between 2010-2013, hackers developed some keylogger for the systems targeting defense, aerospace and commercial industries and this was later named as APT-4.  Curious to know how APT-1 , APT-2 and APT-3 . Check out our blogs for cool stuffs.    APT-4(Advanced Persistent Threat) Unlike APT-2 and APT-3 , this was suspected from China and its main target to steal information from computer, possible by creating backdoors. S...

The precedence of Cyberwar from China APT-3

Image
Yet another Chinese APT, it seems like china is getting ready with cyberwarfare . Like APT-1 and APT-2 this thread also started with phishing email, but it targets were limited to public, defense, private, Supply chain sectors, Non-profit, Biotechnology, Construction, Education and Energy. In 2013 Chinese based thread actors thought of creating threads for stealing information using Java, Adobe and Internet Explorer ( default browser for XP and 2007 ). Bug Hunters who were really working hard found various enumeration techniques to exploit java with minimum user interferences. This was bad news for the thread actors. So they planned to espionage and steal information from the above sectors using Adobe and Internet Explorer.      Numerous mails to employees were drafted and sent to the Defense and Aerospace Industry.  Some sample e-mails are shown below Sample-1: Save between $200-450 by purchasing an Apple Certified Refurbished iMac through this link. Refurbished ...