Posts

Showing posts with the label cyber espionage

Weaponizing Historical Malware for Bio-Warfare APT-9

Image
Advancing till APT9 made us to think why emergent and emerging nations are allegedly suspecting china for the cyberattack. To suspect China, those nations require additional information. As of now, the world powers says that all command and control are located in China, and also they are the one to introduce the concept of APT(Advanced Persistent Threat). APT9 APT9 targets biotechnology and pharmaceutical industry. They gained initial access through spearfishing mails and acting as a trusted party between the industry. APT 9 uses some malwares which were already used by the APT1, APT4 and APT5 threat groups. They modified it in accordance to their needs, so that antivirus engine can't detect those threats as their hash value are modified. Most of the RAT's and backdoors used in this attack are already been used by other threat groups in China, so this is also suspected to be originated from China. Source: ITW Malwares Used HomeUnix, FunRun, Zxshell, Gh0st( Apt1 ), Sogu( Apt3...

A Step to Doom the Entertainment Industry and Defence Apt-8

Image
APT 8! This is a serious bummer for everyone, especially those who make a living out of social media, because it attacks the entertaining industries. Threat Sector APT 8's target's both an organization and an individual and their domains were Cyber industries, media and entertainment, aerospace and construction. APT 8 APT 8 is involves in cyberattacks to achieve Intellectual Property Theft. Similar to APT 7 it steals data from different companies and organizations that shares cyber field. To add furthermore into the mist, these attacks are done by a group of freelancers abode with the Chinese government. The attacks done on the entertainment industries had made a great impact in terms of money. Countries like India, Japan, Germany, U.K., are few of many countries which sees major flow of money through entertainment and these countries had been the targeted ones.   Attack Vectors To condemn the targeted companies, The spear phishing e-mails attacks are used, implied with malicio...

The programmable keylogger APT-4

Image
Keylogger/Keystroke Every key we press on an electronic device emits certain frequency and this is termed as DTMF(Dual Tone Multi Frequency) . This tone can be easily detected using some common apps available on play store/App Store today. But, it can also be heard and find the exact key not by only practice but in a perfect silence condition. This consumes time and at least requires 2-3 years of patience.      But this can also be achieved through scripting. Yes!! You read that right. By using some advanced frameworks that were available between 2010-2013, hackers developed some keylogger for the systems targeting defense, aerospace and commercial industries and this was later named as APT-4.  Curious to know how APT-1 , APT-2 and APT-3 . Check out our blogs for cool stuffs.    APT-4(Advanced Persistent Threat) Unlike APT-2 and APT-3 , this was suspected from China and its main target to steal information from computer, possible by creating backdoors. S...