Home News Most Dangerous APT Hacker Group’s Attacks of the Year

    Most Dangerous APT Hacker Group’s Attacks of the Year

    15
    0


    Most Dangerous APT Hacker Group’s Deadly Cyber Attacks of the Year 2019-2020 – Complete Collection

    The APT superior persistent risk is thought for launching refined assaults to steal delicate, monetary info and keep undetected throughout the infrastructure. On this article, we see an inventory of APT assaults from 2019 to 2021.

    These hacker teams primarily goal enterprises whatever the Trade, their targets embrace authorities, protection, monetary providers, authorized providers, industrial, telecoms, client items and plenty of extra.

    The APT group contains skilled cybercriminals who can bypass safety provisions and trigger as harm and disruption as doable. These APT teams have a selected goal they spend time to detect them and so they exploit them to realize entry.

    Many of the APT teams use customized malware to fly below the radar. The APT assault categorized into totally different phases together with Planning the assault, mapping firm information, avoiding detection and compromising the community.

    Harmful APT Hacker Group Assaults 2019

    January

    February

    March

    April

    Might

    June

    July

    August

    September

    October

    November

    December

    2020 Assault checklist So Far

    January

    February

    March

    1. Mar 30 – The ‘Spy Cloud’ Operation: Geumseong121 group carries out the APT attack disguising the evidence of North Korean defection
    2. Mar 26 –  iOS exploit chain deploys LightSpy feature-rich malware 
    3. Mar 25 – This Is Not a Test: APT41 Initiates Global Intrusion Campaign Using Multiple Exploits 
    4. Mar 24 – WildPressure targets industrial-related entities in the Middle East 
    5. Mar 24 –  Operation Poisoned News: Hong Kong Users Targeted With Mobile Malware via Local News Links 
    6. Mar 19 – Probing Pawn Storm : Cyberespionage Campaign Through Scanning, Credential Phishing and More 
    7. Mar 15 –  APT36 jumps on the coronavirus bandwagon, delivers Crimson RAT 
    8. Mar 12 – Vicious Panda: The COVID Campaign
    9. Mar 12 –Two-tailed scorpion APT-C-23 
    10. Mar 12 – Tracking Turla: New backdoor delivered via Armenian watering holes
    11. Mar 11 – Operation Overtrap Targets Japanese Online Banking Users Via Bottle Exploit Kit and Brand-New Cinobi Banking Trojan 
    12. Mar 10 – WHO’S HACKING THE HACKERS: NO HONOR AMONG THIEVES 
    13. Mar 05 – Dissecting Geost: Exposing the Anatomy of the Android Trojan Targeting Russian Banks 
    14. Mar 05 – Guildma: The Devil drives electric
    15. Mar 03 –  New Perl Botnet (Tuyul) Found with Possible Indonesian Attribution 
    16. Mar 03 – The North Korean Kimsuky APT keeps threatening South Korea evolving its TTPs 
    17. Mar 02 – APT34 (AKA OILRIG, AKA HELIX KITTEN) ATTACKS LEBANON GOVERNMENT ENTITIES WITH MAILDROPPER IMPLANTS 

    April

    1. Apr 29 –  Chinese Influence Operations Evolve in Campaigns Targeting Taiwanese Elections, Hong Kong Protests 
    2. Apr 28 – Outlaw is Back, a New Crypto-Botnet Targets European Organizations
    3. Apr 28 – Grandoreiro: How engorged can an EXE get?
    4. Apr 24 – PoshC2 
    5. Apr 21 –  Evil Eye Threat Actor Resurfaces with iOS Exploit and Updated Implant 
    6. Apr 20 –  WINNTI GROUP: Insights From the Past
    7. Apr 17 – Gamaredon APT Group Use Covid-19 Lure in Campaigns
    8. Apr 16 –  Exposing Modular Adware: How DealPly, IsErIk, and ManageX Persist in Systems
    9. Apr 16 – Giving Fraudsters the Cold Shoulder: Inside the Largest Connected TV Bot Attack 
    10. Apr 16 – Taiwan High-Tech Ecosystem Targeted by Foreign APT Group 
    11. Apr 15 – Nation-state Mobile Malware Targets Syrians with COVID-19 Lures 
    12. Apr 15 – Craft for Resilience: APT Group Chimera
    13. Apr 07 –APTs and COVID-19: How advanced persistent threats use the coronavirus as a lure
    14. Apr 07 –New Ursnif Campaign: A Shift from PowerShell to Mshta 
    15. Apr 07 – Decade of the RATs: Novel APT Attacks Targeting Linux, Windows and Android

    Might

    June

    1. Jun 30 –  StrongPity APT – Revealing Trojanized Tools, Working Hours and Infrastructure 
    2. Jun 29 –  PROMETHIUM extends global reach with StrongPity3 APT 
    3. Jun 26 – WastedLocker: Symantec Identifies Wave of Attacks Against U.S. Organizations 
    4. Jun 25 – A close look at the advanced techniques used in a Malaysian-focused APT campaign 
    5. Jun 24 – BRONZE VINEWOOD Targets Supply Chains
    6. Jun 23 – WastedLocker: A New Ransomware Variant Developed By The Evil Corp Group
    7. Jun 19 – Targeted Attack Leverages India-China Border Dispute to Lure Victims
    8. Jun 18 – Digging up InvisiMole’s hidden arsenal 
    9. Jun 17 –  Operation In(ter)ception: Aerospace and military companies in the crosshairs of cyberspies 
    10. Jun 17 – AcidBox: Rare Malware Repurposing Turla Group Exploit Targeted Russian Organizations 
    11. Jun 17 –  Multi-stage APT attack drops Cobalt Strike using Malleable C2 feature 
    12. Jun 16 – Cobalt: tactics and tools update
    13. Jun 15 –  India: Human Rights Defenders Targeted by a Coordinated Spyware Operation
    14. Jun 11 – New Android Spyware ActionSpy Revealed via Phishing Attacks from Earth Empusa
    15. Jul 11 –  Gamaredon group grows its game
    16. Jun 08 – TA410: The Group Behind LookBack Attacks Against U.S. Utilities Sector Returns with New Malware
    17. Jun 08 – GuLoader? No, CloudEyE 
    18. Jun 03 – New LNK attack tied to Higaisa APT discovered 
    19. Jun 03 –  Cycldek: Bridging the (air) gap

    July

    1. Jul 29 – Operation North Star: A Job Offer That’s Too Good to be True? 
    2. Jul 22 –  OilRig Targets Middle Eastern Telecommunications Organization and Adds Novel C2 Channel with Steganography to Its Inventory 
    3. Jul 22 –MATA: Multi-platform targeted malware framework 
    4. Jul 15 – THE FAKE CISCO: Hunting for backdoors in Counterfeit Cisco devices
    5. Jul 14 –  TURLA / VENOMOUS BEAR UPDATES ITS ARSENAL: “NEWPASS” APPEARS ON THE APT THREAT SCENE 
    6. Jul 14 – Welcome Chat as a secure messaging app? Nothing could be further from the truth 
    7. Jul 12 –  SideWinder 2020 H1 
    8. Jul 09 – Cosmic Lynx: The Rise of Russian BEC 
    9. Jul 09 –More evil: A deep look at Evilnum and its toolset 
    10. Jul 08 –  Copy cat of APT Sidewinder ?
    11. Jul 08 – [proofpoint] TA410: The Group Behind LookBack Attacks Against U.S. Utilities Sector Returns with New Malware 
    12. Jul 08 – Operation ‘Honey Trap’: APT36 Targets Defense Organizations in India
    13. Jul 06 –  North Korean hackers are skimming US and European shoppers 
    14. Jul 01 – [Lookout] Mobile APT Surveillance Campaigns Targeting Uyghurs 
    1. Aug 27 – The Kittens Are Back in Town 3 
    2. Aug 28 – Transparent Tribe: Evolution analysis, part 2
    3. Aug 20 – DEVELOPMENT OF THE ACTIVITY OF THE TA505 CYBERCRIMINAL GROUP
    4. Aug 20 –More Evidence of APT Hackers-for-Hire Used for Industrial Espionage 
    5. Aug 18 – [F-Secure] LAZARUS GROUP CAMPAIGN TARGETING THE CRYPTOCURRENCY VERTICAL 
    6. Aug 13 – [Kaspersky] CactusPete APT group’s updated Bisonal backdoor 
    7. Aug 13 – [ClearSky] Operation ‘Dream Job’ Widespread North Korean Espionage Campaign 
    8. Aug 12 – [Kaspersky] Internet Explorer and Windows zero-day exploits used in Operation PowerFall
    9. Aug 10 – [Seqrite] Gorgon APT targeting MSME sector in India 

    September

    1. Sep 30 – APT‑C‑23 group evolves its Android spyware 
    2. Sep 29 –  Palmerworm: Espionage Gang Targets the Media, Finance, and Other Sectors 
    3. Sep 29 –  ShadowPad: new activity from the Winnti group
    4. Sep 25 –  German-made FinSpy spyware found in Egypt, and Mac and Linux versions revealed 
    5. Sep 25 –APT-C-43 steals Venezuelan military secrets to provide intelligence support for the reactionaries — HpReact campaign
    6. Sep 24 – detecting empires in the cloud 
    7. Sep 23 –Operation SideCopy 
    8. Sep 22 – APT28 Delivers Zebrocy Malware Campaign using NATO Theme as Lure
    9. Sep 17 –  Operation Tibbar 
    10. Sep 08 –TeamTNT activity targets Weave Scope deployments
    11. Sep 03 –  NO REST FOR THE WICKED: EVILNUM UNLEASHES PYVIL RAT 
    12. Sep 01 –Chinese APT TA413 Resumes Targeting of Tibet Following COVID-19 Themed Economic Espionage Campaign Delivering Sepulcher Malware Targeting Europe 

    October

    1. Oct 27 – North Korean Advanced Persistent Threat Focus: Kimsuky
    2. Oct 23 – APT-C-44 NAFox 
    3. Oct 22 – Bitter CHM 
    4. Oct 19 –Operation Earth Kitsune: Tracking SLUB’s Current Operations
    5. Oct 15 – Operation Quicksand – MuddyWater’s Offensive Attack Against Israeli Organizations 
    6. Oct 14 – [MalwareByte] Silent Librarian APT right on schedule for 20/21 academic year 
    7. Oct 13 – [WeiXin] Operation Rubia cordifolia
    8. Oct 07 – [BlackBerry] BlackBerry Uncovers Massive Hack-For-Hire Group Targeting Governments, Businesses, Human Rights Groups and Influential Individuals 
    9. Oct 06 – [Malwarebytes] Release the Kraken: Fileless APT attack abuses Windows Error Reporting service 
    10. Oct 05 – [Kaspersky] MosaicRegressor: Lurking in the Shadows of UEFI

    November

    December

    2021 Assaults checklist So Far

    January

    Febrary

    March

    April

    Might

    Listed are probably the most harmful APT assaults of the yr 2019-2020, we hold the checklist up to date with the brand new assaults reported often.

    You possibly can observe us on LinkedinTwitterFacebook for day by day Cybersecurity and hacking information updates





    Source link