You searched for APT10 | SC Media

Your search for APT10 returned 17 results

Active Filters

Click on a filter below to refine your search. Remove a filter to broaden your search.

Your search for APT10 returned 17 results

Sort Results:

Relevant Recent
APTs/cyberespionage, Cybercrime, Security News

Operation Soft Cell campaign targets cellular telecom providers, points to China’s APT10

A threat actor using tools and techniques associated with APT10, the Chinese hacking group, and aimed at global cellular telecommunications providers completely took over at least one provider’s network in its efforts to obtain data on very specific, high-value targets, according to a report from the Cybereason Nocturnus team. Operation Soft Cell, active since at…
APTs/cyberespionage, Cybercrime, Malware, Security News

APT10 campaign debuts two new loaders for distributing PlugX and Quasar RATs

The reputed Chinese state-sponsored threat group APT10 appears to be the culprit behind a campaign this past April that sought to distribute PlugX and Quasar RAT malware via one of two newly discovered downloader variants. Researchers from enSilo uncovered the campaign after samples were collected from one or more targets based in the Philippines. PlugX and…
Cybercrime, Malware, Security News

APT10 targets Japanese media company with upgraded UPPERCUT

Chinese cyberespionage group APT10 has been targeting Japanese corporations using updated TTPs. In July 2018, the threat group was spotted targeting the Japanese media sector using spearphishing emails containing malicious documents that prompted the installation of the UPPERCUT backdoor, also known as ANEL, according to a Sept. 13 FireEye blog post. The threat actors used…
APTs/cyberespionage, Security News

CrowdStrike verifies portions of report linking APT10 activity to Chinese government actors

Researchers with CrowdStrike yesterday partially confirmed reports from the mysterious APT-hunting group Intrusion Truth, verifying several findings that allegedly draw connections between the threat group APT10 and a Chinese foreign intelligence agency. Over the previous two months, Intrusion Truth has issued multiple reports on the group, also known as Stone Panda, linking it to the Tianjin Bureau of China’s Ministry of State Security (MSS). In…

APT10 exposed new toolset in recent campaigns

FireEye researchers spotted a new group of tools used by the infamous APT10 group that was responsible for the infamous Cloud Hopper campaign among other high profile attacks. During the groups 2016/2017 cyberespionage activities the group revealed a set of unique tools believed to be unique to the threat group including several backdoors and an…
APTs/cyberespionage, Cybercrime, Security News

APT40 hacking group linked to 13 alleged front companies in Hainan, China

The mysterious research group Intrusion Truth has unleashed a new series of reports claiming that 13 businesses based in the southern island province of Hainan, China are collectively a front for reputed Chinese state-sponsored hacking group APT40. The alleged front companies all purport to be science and technology businesses seeking to hire pen testers, software development…
Power plant Russia
APTs/cyberespionage, cyberattack, Malware, Phishing, Security News

Second phishing campaign featuring LookBack malware targets U.S. utilities

A malicious threat actor continued to target the U.S. utilities sector with LookBack malware last August, launching a new phishing campaign that targeted organizations with emails impersonating a certification test administrator. Discovered earlier this year by researchers at Proofpoint, LookBack includes a proxy mechanism and a remote access trojan module. In July, the attackers behind…
APTs/cyberespionage, Security News

APT-hunting group claims China’s Security Ministry is behind APT17

Researchers at Intrusion Truth are claiming the cyberespionage group APT17 is operated by the Jinan bureau of the Chinese Ministry of State Security (MSS). Intrusion Truth is an online anonymous group of cybersecurity analysts who investigate and expose APT groups linked to the Chinese government.    APT17 is believed to have been behind a series of…
APTs/cyberespionage, Malware, Security News

Report: Chinese cyberspies hacked MSP, retailer and law firm in economic espionage campaign

The Chinese state-sponsored threat actor APT10 used stolen remote access software credentials to infiltrate the network of Norwegian managed services provider Visma last year, likely in an effort to launch secondary attacks against the MSP’s clients. An investigation into the cyber espionage campaign revealed that APT10, aka Stone Panda, used similar tactics to invade the…
Cybercrime, Security News

Hacking Back

Close your eyes for a moment and whisper the term “hack back.” Doesn’t it conjure up familiar rough-hewn heroes played by the likes of Charles Bronson and Kris Kristofferson who roamed the silver screen with some regularity in the 1970s, tracking down bad guys and meting out justice when authorities either could not or fell…
Next post in Cybercrime