Tag: apt

  • VB2018 video: The Big Bang Theory by APT-C-23

    The APT-C-23 group, which targets users in the Middle East and in particular in the State of Palestine, was named and first reported on by 360 in a Chinese language blog post in early 2013. Its campaigns have since been written about by many security vendors, including Palo Alto and Cisco Talos . Check Point…

  • VB2018 video: Shedding skin – Turla’s fresh faces

    “Capable, well-resourced, and they go back decades.” The Turla threat group doesn’t make the news as much as some other Russian-speaking APT groups, but it is one of the most advanced and most diverse groups out there. At VB2018 in Montreal, Kurt Baumgartner and Mike Scott from Kaspersky Lab ‘s GReAT detailed the latest malware…

  • VB2018 video: Shedding skin – Turla’s fresh faces

    “Capable, well-resourced, and they go back decades.” The Turla threat group doesn’t make the news as much as some other Russian-speaking APT groups, but it is one of the most advanced and most diverse groups out there. At VB2018 in Montreal, Kurt Baumgartner and Mike Scott from Kaspersky Lab ‘s GReAT detailed the latest malware…

  • Where are all the ‘A’s in APT?

    In a guest blog post by VB2018 gold partner Kaspersky Lab, Costin Raiu, Director of the company’s Global Research and Analysis Team, looks critically at the ‘A’ in APT. A little bit of history In 1994, when I started working in the AV ‘industry’, I remember the excitement of finding and taking apart a sophisticated…

  • Where are all the ‘A’s in APT?

    In a guest blog post by VB2018 gold partner Kaspersky Lab, Costin Raiu, Director of the company’s Global Research and Analysis Team, looks critically at the ‘A’ in APT. A little bit of history In 1994, when I started working in the AV ‘industry’, I remember the excitement of finding and taking apart a sophisticated…

  • VB2018 preview: Wipers in the wild

    Some of the earliest computer viruses deleted data and sometimes even rendered computers unusable. But as malware increasingly became a tool used for criminal or (geo)political purposes, its focus shifted to stealing data and using the resources of the compromised machines. However, there has recently been a trend of APT campaigns including a ‘wiper’ functionality…

  • VB2018 preview: Wipers in the wild

    Some of the earliest computer viruses deleted data and sometimes even rendered computers unusable. But as malware increasingly became a tool used for criminal or (geo)political purposes, its focus shifted to stealing data and using the resources of the compromised machines. However, there has recently been a trend of APT campaigns including a ‘wiper’ functionality…

  • Red Eyes threat group targets North Korean defectors

    AhnLab has published a research paper that looks at the Red Eyes group, which is particularly active against North Korean defectors, as well as journalists and human rights activists in the North Korean community. The paper ( pdf ) is written by Minseok (Jacky) Cha and was originally published in Korean in April of this…

  • Red Eyes threat group targets North Korean defectors

    AhnLab has published a research paper that looks at the Red Eyes group, which is particularly active against North Korean defectors, as well as journalists and human rights activists in the North Korean community. The paper ( pdf ) is written by Minseok (Jacky) Cha and was originally published in Korean in April of this…

  • VB2017 paper: Modern reconnaissance phase on APT – protection layer

    Targeted attack campaigns involve multiple stages, the first of which consists of collecting information about the target: the reconnaissance phase. It’s an essential part of any campaign and one that often exploits that well known weakest link: the human user. At VB2017 in Madrid, Cisco Talos researchers Paul Rascagneres and Warren Mercer presented a paper…