APT (Targeted attacks)

APT reports

“El Machete”

“Machete” is a targeted attack campaign with Spanish speaking roots. Most of the victims are located in Venezuela, Ecuador, Colombia, Peru, Russia, Cuba, and Spain. Targets include high-level profiles, including intelligence services, military, embassies and government institutions.

APT reports

The Epic Turla Operation

Over the last 10 months, we have analyzed a massive cyber-espionage operation which we call “Epic Turla”. The attackers have infected several hundred computers in more than 45 countries, including government institutions, embassies, military, education, research and pharmaceutical companies. We observed exploits against older (patched) vulnerabilities, social engineering techniques and watering hole strategies.

Incidents

Haunted by APT

Over the past decade, APT have intensely targeted organizations and individuals across India. Its developing base of technology, its geographical location and bounds, its inclusive and riotous political energy, and its growing economic weight makes it a special place of interest for badly intentioned cyber attackers.

Incidents

Garfield Garfield True

Syria suffered yet another large-scale Internet black out that lasted for about seven hours. In contrast to previous incidents this time a cut off fiber optic cable was deemed responsible for leaving most of the country off-line.

APT reports

Agent.btz: a Source of Inspiration?

The past few days has seen an extensive discussion within the IT security industry about a cyberespionage campaign called Turla, aka Snake and Uroburos, which, according to G-DATA experts, may have been created by Russian special services. One of the main conclusions also pointed out by research from BAE SYSTEMS, is a connection between the authors of

APT reports

The Careto/Mask APT: Frequently Asked Questions

The Mask is an advanced threat actor that has been involved in cyber-espionage operations since at least 2007. What makes The Mask special is the complexity of the toolset used by the attackers. This includes an extremely sophisticated piece of malware, a rootkit, a bootkit, Mac OS X and Linux versions and possibly versions for Android and iPad/iPhone (iOS).

Events

A Glimpse Behind “The Mask”

During the past months we have been busy analysing yet another sophisticated cyberespionage operation which has been going on at least since 2007, infecting victims in 27 countries. We deemed this operation “The Mask”.

Reports
Subscribe to our weekly e-mails

The hottest research right in your inbox