You searched for APT10 | SC Media

Your search for APT10 returned 19 results

Active Filters

Click on a filter below to refine your search. Remove a filter to broaden your search.

Your search for APT10 returned 19 results

Sort Results:

Relevant Recent

Did you mean: apt12

APTs/cyberespionage, Malware, Security News

Report: Chinese cyberspies hacked MSP, retailer and law firm in economic espionage campaign

The Chinese state-sponsored threat actor APT10 used stolen remote access software credentials to infiltrate the network of Norwegian managed services provider Visma last year, likely in an effort to launch secondary attacks against the MSP’s clients. An investigation into the cyber espionage campaign revealed that APT10, aka Stone Panda, used similar tactics to invade the…
WebCast

Uncovering advanced persistent threats

Join us for a step-by-step walk through of how the Operation Cloud Hopper attack unfolded and how security professionals can implement automated defenses to detect malicious behavior like APT10's attack before the breach occurs.
APT10
Cybercrime

APT10 exposed new toolset in recent campaigns

FireEye researchers spotted a new group of tools used by the infamous APT10 group that was responsible for the infamous Cloud Hopper campaign among other high profile attacks. During the groups 2016/2017 cyberespionage activities the group revealed a set of unique tools believed to be unique to the threat group including several backdoors and an…
APTs/cyberespionage, Security News

U.S. indicts Chinese nationals on cyber espionage charges

Two Chinese nationals associated with the cyber espionage group APT10 have been indicted on charges of conspiracy to commit computer intrusions, conspiracy to commit wire fraud, and aggravated identity theft by the U.S. Department of Justice. The defendants Zhu Hua (aka Afwar, CVNX, Alayos and Godkiller) and Zhang Shilong, (aka Baobeilong, Zhang Jianguo and Atreexp)…
ChinaInternet
APTs/cyberespionage, Cybercrime, Security News

Operation Soft Cell campaign targets cellular telecom providers, points to China’s APT10

A threat actor using tools and techniques associated with APT10, the Chinese hacking group, and aimed at global cellular telecommunications providers completely took over at least one provider’s network in its efforts to obtain data on very specific, high-value targets, according to a report from the Cybereason Nocturnus team. Operation Soft Cell, active since at…
APTs/cyberespionage, Cybercrime, Malware, Security News

APT10 campaign debuts two new loaders for distributing PlugX and Quasar RATs

The reputed Chinese state-sponsored threat group APT10 appears to be the culprit behind a campaign this past April that sought to distribute PlugX and Quasar RAT malware via one of two newly discovered downloader variants. Researchers from enSilo uncovered the campaign after samples were collected from one or more targets based in the Philippines. PlugX and…
cloud hopper
Cybercrime

APT 10’s Cloud Hopper campaign exposed

Security researchers at PwC UK and BAE Systems spotted a China-based cyber espionage campaign, dubbed Cloud Hopper, targeting companies through their managed IT service providers (MSPs). The group behind the attacks, APT10, has targeted Canada, Brazil, France, Norway, Finland, Switzerland, South Africa, Australia, Japan, and India for intellectual property and other sensitive information, according to…
APT10
Cybercrime, Malware, Security News

APT10 targets Japanese media company with upgraded UPPERCUT

Chinese cyberespionage group APT10 has been targeting Japanese corporations using updated TTPs. In July 2018, the threat group was spotted targeting the Japanese media sector using spearphishing emails containing malicious documents that prompted the installation of the UPPERCUT backdoor, also known as ANEL, according to a Sept. 13 FireEye blog post. The threat actors used…
Next post in APTs/cyberespionage