APT (Targeted attacks)

Incidents

Garfield Garfield True

Syria suffered yet another large-scale Internet black out that lasted for about seven hours. In contrast to previous incidents this time a cut off fiber optic cable was deemed responsible for leaving most of the country off-line.

APT reports

Agent.btz: a Source of Inspiration?

The past few days has seen an extensive discussion within the IT security industry about a cyberespionage campaign called Turla, aka Snake and Uroburos, which, according to G-DATA experts, may have been created by Russian special services. One of the main conclusions also pointed out by research from BAE SYSTEMS, is a connection between the authors of

APT reports

The Careto/Mask APT: Frequently Asked Questions

The Mask is an advanced threat actor that has been involved in cyber-espionage operations since at least 2007. What makes The Mask special is the complexity of the toolset used by the attackers. This includes an extremely sophisticated piece of malware, a rootkit, a bootkit, Mac OS X and Linux versions and possibly versions for Android and iPad/iPhone (iOS).

APT reports

A Glimpse Behind “The Mask”

During the past months we have been busy analysing yet another sophisticated cyberespionage operation which has been going on at least since 2007, infecting victims in 27 countries. We deemed this operation “The Mask”.

APT reports

Kimsuky APT: Operation’s possible North Korean links uncovered

For several months, we have been monitoring an ongoing cyber-espionage campaign against South Korean think tanks. There are multiple reasons why this campaign is extraordinary in its execution and logistics. It all started one day when we encountered a somewhat unsophisticated spy program that communicated with its “master” via a public e-mail server. This approach

APT reports

The “Kimsuky” Operation: A North Korean APT?

For several months, we have been monitoring an ongoing cyber-espionage campaign against South Korean think-tanks. There are multiple reasons why this campaign is extraordinary in its execution and logistics. It all started one day when we encountered a somewhat unsophisticated spy program that communicated with its “master” via a public e-mail server. This approach is

Reports
Subscribe to our weekly e-mails

The hottest research right in your inbox