Posts

Initial Infiltration of Construction and Engineering APT-6 & APT-7

Image
Both APT 6 & APT 7 are so similar but with the slightest differences. They both steal something that's not the same yet similar. Construction, Aerospace, Engineering and defense industrial estate are targets of APT 7. For APT 6, they share the same domain but with additional targets, Transportation, construction and materials. The attacked areas are also similar, as in The APT 6's goal is to heist a data, whereas the APT 7 steals intellectual property.                 Credits: Kaspersky If you are new to this post and not aware of about what APT is check out our first blog listed under APT which will provide you more insights. Advanced Persistent Thread-6 Anonymity FBI alert The backdoor RAT Prevention techniques Anonymity   The cybersecurity elite group confirmed that their digital signatures were so unique, meaning this APT-6 digital signature were entirely new. Zscalar who actually informed FBI saying that many organiz...

Telecommunication Attack on U.S and South East Asia APT-5

Image
APT-5 is a frequent active threat, since 2007. They target countries which has telecommunication, defense, tech-firm which supports high-tech manufacturing, like US and along with major Asian and European countries.     Major Target Areas Wireless communications are said to be the most attacked division, but other divisions like grid area communication, regional telecom provider, Asian-based communication, satellite communications, military applications are also equally targeted.   APT 5 The goal is simple yet lethal, it simply makes modification into the files and leaves less traceable track. The fact that it becomes lethal is, when it was done in satellite communications and military software programs, the images taken for confidential proprietary is exposed. Regardless of the operating system, even the embedded operating systems that are connected with an IP is vulnerable. This happens, when the computer files are introduced with the keylogger enabled Malware used to s...

The programmable keylogger APT-4

Image
Keylogger/Keystroke Every key we press on an electronic device emits certain frequency and this is termed as DTMF(Dual Tone Multi Frequency) . This tone can be easily detected using some common apps available on play store/App Store today. But, it can also be heard and find the exact key not by only practice but in a perfect silence condition. This consumes time and at least requires 2-3 years of patience.      But this can also be achieved through scripting. Yes!! You read that right. By using some advanced frameworks that were available between 2010-2013, hackers developed some keylogger for the systems targeting defense, aerospace and commercial industries and this was later named as APT-4.  Curious to know how APT-1 , APT-2 and APT-3 . Check out our blogs for cool stuffs.    APT-4(Advanced Persistent Threat) Unlike APT-2 and APT-3 , this was suspected from China and its main target to steal information from computer, possible by creating backdoors. S...

The precedence of Cyberwar from China APT-3

Image
Yet another Chinese APT, it seems like china is getting ready with cyberwarfare . Like APT-1 and APT-2 this thread also started with phishing email, but it targets were limited to public, defense, private, Supply chain sectors, Non-profit, Biotechnology, Construction, Education and Energy. In 2013 Chinese based thread actors thought of creating threads for stealing information using Java, Adobe and Internet Explorer ( default browser for XP and 2007 ). Bug Hunters who were really working hard found various enumeration techniques to exploit java with minimum user interferences. This was bad news for the thread actors. So they planned to espionage and steal information from the above sectors using Adobe and Internet Explorer.      Numerous mails to employees were drafted and sent to the Defense and Aerospace Industry.  Some sample e-mails are shown below Sample-1: Save between $200-450 by purchasing an Apple Certified Refurbished iMac through this link. Refurbished ...

The precedence of Cyberwar from China APT-2

Image
Welcome to the Cyber precedence of China Part-2, Today we are just curious to learn about how APT-2 attack was successfully conducted by targeting Military and Defense network. APT-2 doesn't damage any property instead it was stealing all the information from the unencrypted web and network interface. If you are curious to know about APT-1 and what APT does, check our first previous blog. APT-2 Consists of two main Malwares MOOSE WARP                                                                                                                                            ...

The precedence of Cyberwar from China APT-1

Image
APT,  Advanced Persistent Threat , is usually a state/nation sponsored threat or sometimes a private consultancy service provoke this threat, targeting individual users(high profiles) or preferably a country. They sneak into our system via the network. These threads remain in our system for years, possibly decades too. The main aim of APT is to get all the information from the target without the user knowledge. Even the latest firewall/antivirus would fail to prevent this attack. The main drawback of all the APT's/threat is they require user interaction in order to gain access to our system. This is mostly done through phishing attacks.       Phishing : A threat actor gathers the target's information using publicly disclosed, social media or through breached websites. Threat agents use this information to obtain your PID like email, phone number, Date of birth, Location, Address, your interests, The ads you clicked online and so on. Keeping this details th...

Conflict Minerals

Image
Before stepping into our topic I want to thank each and every niche readers and commenters of this blog. We etched our first achievement. Yes, this is our 25th post and will be continuing our journey till the knowledge well dries. On this special day we have decided to add an announcements page in our blog, so, stay tuned for the updates.                                               Conflict Minerals Every electronic users in the world is a killer. Even you and me. Do you accept? Let our blog elaborates the deepest cries made by the African people and refugees.        Think twice before purchasing an electronic gadget. They can unwittingly kill 4 children's education. If we value our children's future then why can't we value them?? Minerals like Tantalum, Tin and Tungsten are mined by individual miners without using any prevention m...