Remove researchers-perform-an-analysis-on-chinese-malware-used-against-russian-government
article thumbnail

Researchers Perform An Analysis on Chinese Malware Used Against Russian Government

Hacker Combat

Security researchers from the threat hunting and intelligence company Group-IB have revealed that in 2020, at least two espionage groups from China targeted the Russian Federal authorities. According to Group-IB, “Chinese APTs are one of the most numerous and aggressive hacker communities.”

article thumbnail

Dark Pink APT Group Strikes Government Entities in South Asian Countries

Security Boulevard

Executive Summary In February 2023, EclecticIQ researchers identified multiple KamiKakaBot malwares which are very likely used to target government entities in ASEAN (Association of Southeast Asian Nations) countries. Dark Pink is an Advanced Persistent Threat (APT) group active in the ASEAN region.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Mustang Panda APT Group Uses European Commission-Themed Lure to Deliver PlugX Malware

Security Boulevard

EXECUTIVE SUMMARY Since at least 2019, the Mustang Panda threat actor group has targeted government and public sector organizations across Asia and Europe [3] with long-term cyberespionage campaigns in line with strategic interests of the Chinese government. This switch increases the evasion against anti-malware solutions [2].

Malware 80
article thumbnail

APT trends report Q3 2022

SecureList

For more than five years, the Global Research and Analysis Team (GReAT) at Kaspersky has been publishing quarterly summaries of advanced persistent threat (APT) activity. You can read our public report on Andariel’s use of DTrack and Maui here. DTrack is a backdoor used by subsets of the Lazarus group.

Malware 140
article thumbnail

IT threat evolution Q3 2023

SecureList

Targeted attacks Unknown threat actor targets power generator with DroxiDat and Cobalt Strike Earlier this year, we reported on a new variant of SystemBC called DroxiDat that was deployed against a critical infrastructure target in South Africa. This proxy-capable backdoor was deployed alongside Cobalt Strike beacons.

Malware 92
article thumbnail

Trellix Sees Advanced Persistent Threat Actors and Ransomware Groups Focus on Financial Services in Third Quarter of 2021

CyberSecurity Insiders

.–( BUSINESS WIRE )–Today, Trellix released its Advanced Threat Research Report: January 2022 , examining cybercriminal behavior and activity related to cyber threats in the third quarter of 2021. As the impact of ransomware to systems essential to our daily lives – fuel, grain, food supply and beyond – escalates, the U.S.

article thumbnail

APT trends report Q1 2022

SecureList

For five years, the Global Research and Analysis Team (GReAT) at Kaspersky has been publishing quarterly summaries of advanced persistent threat (APT) activity. The use of certain languages does not necessarily indicate a specific geographic relation but rather points to the languages that the developers behind these APT artefacts use.

Malware 132