APT (Advanced Persistent Threat) Archives - GBHackers Security | #1 Globally Trusted Cyber Security News Platform https://gbhackers.com/tag/apt-advanced-persistent-threat/ GBhackers Offering Exclusive Cyber Security News Coverage, New Research papers & Technology Updates. Tue, 22 Oct 2024 11:15:31 +0000 en-US hourly 1 https://wordpress.org/?v=6.6.2 https://gbhackers.com/wp-content/uploads/2024/09/cropped-gbh-32x32.png APT (Advanced Persistent Threat) Archives - GBHackers Security | #1 Globally Trusted Cyber Security News Platform https://gbhackers.com/tag/apt-advanced-persistent-threat/ 32 32 IcePeony Hackers Exploiting Public Web Servers To Inject Webshells https://gbhackers.com/icepeony-hackers-webshells/ https://gbhackers.com/icepeony-hackers-webshells/#respond Tue, 22 Oct 2024 11:15:30 +0000 https://gbhackers.com/?p=113768 IcePeony, a China-nexus APT group, has been active since 2023, targeting India, Mauritius, and Vietnam by exploiting SQL injection vulnerabilities to compromise systems using webshells and backdoors, leveraging a custom IIS malware called IceCache. The attackers accidentally exposed a server containing sensitive data, including a zsh_history file that revealed their detailed attack timeline and techniques. […]

The post IcePeony Hackers Exploiting Public Web Servers To Inject Webshells appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

The post IcePeony Hackers Exploiting Public Web Servers To Inject Webshells appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

]]>
https://gbhackers.com/icepeony-hackers-webshells/feed/ 0
Crimson Palace Returns With New Hacking Tolls And Tactics https://gbhackers.com/crimson-palace-hacking-tools-tactics/ https://gbhackers.com/crimson-palace-hacking-tools-tactics/#respond Mon, 16 Sep 2024 07:37:29 +0000 https://gbhackers.com/?p=111873 Cluster Bravo, despite its brief initial activity, subsequently targeted 11 organizations in the same region, as researchers found that these attackers used compromised environments within the same vertical for malware staging.  Cluster Charlie, after being disrupted, returned with new techniques, including using the HUI loader to inject Cobalt Strike beacons into mstsc.exe.  They employed open-source […]

The post Crimson Palace Returns With New Hacking Tolls And Tactics appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

The post Crimson Palace Returns With New Hacking Tolls And Tactics appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

]]>
https://gbhackers.com/crimson-palace-hacking-tools-tactics/feed/ 0
ToddyCat APT Abuses SMB, Exploits IKEEXT A Exchange RCE To Deploy ICMP Backdoor https://gbhackers.com/toddycat-apt-exploits/ https://gbhackers.com/toddycat-apt-exploits/#respond Wed, 04 Sep 2024 11:30:36 +0000 https://gbhackers.com/?p=107220 ToddyCat is an APT group that has been active since December 2020, and primarily it targets the government and military entities in Europe and Asia.  The group is known for its sophisticated cyber-espionage tactics and has been involved in multiple high-profile attacks. Cybersecurity researchers at Kaspersky Lab identified that ToddyCat APT group has been abusing […]

The post ToddyCat APT Abuses SMB, Exploits IKEEXT A Exchange RCE To Deploy ICMP Backdoor appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

The post ToddyCat APT Abuses SMB, Exploits IKEEXT A Exchange RCE To Deploy ICMP Backdoor appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

]]>
https://gbhackers.com/toddycat-apt-exploits/feed/ 0
Operation Oxidovy, Threat Actors Targeting Government And Military Officials https://gbhackers.com/operation-oxidovy-threat-actors/ https://gbhackers.com/operation-oxidovy-threat-actors/#respond Tue, 03 Sep 2024 09:14:11 +0000 https://gbhackers.com/?p=96467 The recent campaign targeting the Czech Republic involves a malicious ZIP file that contains a decoy LNK file and a batch script. The LNK runs the batch script, which spawns a decoy PDF document and renames a masqueraded PDF file to a portable executable, which is copied to the startup folder for persistence.  Decoy documents […]

The post Operation Oxidovy, Threat Actors Targeting Government And Military Officials appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

The post Operation Oxidovy, Threat Actors Targeting Government And Military Officials appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

]]>
https://gbhackers.com/operation-oxidovy-threat-actors/feed/ 0
Earth Baku Using Customized Tools To Maintain Persistence And Steal Data https://gbhackers.com/earth-baku-custom-tools-data-theft/ https://gbhackers.com/earth-baku-custom-tools-data-theft/#respond Wed, 14 Aug 2024 12:08:34 +0000 https://gbhackers.com/?p=95697 Earth Baku, an APT actor who initially focused on the Indo-Pacific region, has grown its activities extensively since late 2022. The group has increased its presence in Europe, the Middle East, and Africa (MEA), having also confirmed engagements in Italy, Germany, UAE and Qatar. Cybersecurity researchers at Trend Micro recently discovered that Earth Baku has […]

The post Earth Baku Using Customized Tools To Maintain Persistence And Steal Data appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

The post Earth Baku Using Customized Tools To Maintain Persistence And Steal Data appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

]]>
https://gbhackers.com/earth-baku-custom-tools-data-theft/feed/ 0
Turla Hackers Weaponizing LNK-Files To Deploy Fileless Malware https://gbhackers.com/turla-hackers-lnk-fileless-malware/ https://gbhackers.com/turla-hackers-lnk-fileless-malware/#respond Tue, 09 Jul 2024 06:16:46 +0000 https://gbhackers.com/?p=93254 Hackers often weaponize LNK files because they can carry malware into systems undetected by anyone. LNK files are shortcuts that, when opened, launch a malicious payload (like scripts or executables). LNK files are widely used in Windows environments and can easily pass themselves off as genuine files, making it hard for users to suspect their […]

The post Turla Hackers Weaponizing LNK-Files To Deploy Fileless Malware appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

The post Turla Hackers Weaponizing LNK-Files To Deploy Fileless Malware appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

]]>
https://gbhackers.com/turla-hackers-lnk-fileless-malware/feed/ 0