Events2Join

A Look at Trending Chinese APT Techniques


A Look at Trending Chinese APT Techniques | Intel 471

China's global ambitions continue to grow, and its military strength, technology research and economic powers are giving it an opportunity ...

A Look at Trending Chinese APT Techniques - Malware News

Cyber capabilities play a key role in achieving China's strategic goals. Here's a look at significant state-sponsored actors, ...

APT QUARTERLY HIGHLIGHTS - Q3 2024 - CYFIRMA

Chinese APTs like Earth Baku and Velvet Ant targeted critical infrastructure, while groups such as APT41 expanded their scope globally, ...

Sustained Campaign Using Chinese Espionage Tools Targets Telcos

It used a custom communications protocol that was designed to look like SSL traffic but used its own encryption instead. ... techniques, and ...

Kaspersky report on APT trends in Q2 2024 - Securelist

APT trends report Q2 2024 · Most notable findings · Chinese-speaking activity · Middle East · Southeast Asia and Korean Peninsula · Hacktivism · Other ...

Chinese 'ORB' Networks Conceal APTs, Render Static IoCs Irrelevant

Chinese threat actors have been quietly and gradually revolutionizing anti-analysis techniques by hiding their malicious activities behind ...

Signature Techniques of Asian APT Groups Revealed

The 370-page report, Modern Asian APT groups: Tactics, Techniques and Procedures, published today, is based on an examination of around one ...

PortDoor: New Chinese APT Backdoor Attack Targets Russian ...

Look for the “Kr*^j4” string. 0x10. Create pipe, copy data from it and AES ... Operation CuckooBees: Deep-Dive into Stealthy Winnti Techniques. Cybereason ...

An In-Depth Look at Chinese APT ToddyCat - Avertium

Let's take a look at ToddyCat's techniques and tactics, and why it's important to implement cyber security best practices to prevent an ...

Anxun and Chinese APT Activity - ReliaQuest

From prevention techniques to emerging security trends, our comprehensive library can arm you with the tools you need to improve your security ...

China-Backed APT Attack Detection - SOC Prime

Over the past decade, China-backed state-sponsored actors made a significant shift in the sophistication of their offensive tactics, techniques, ...

Search | Mandiant

Check Your Pulse: Suspected APT Actors Leverage Authentication Bypass Techniques and Pulse Secure Zero-Day ... Demonstrating Hustle, Chinese APT Groups Quickly ...

A systematic literature review for APT detection and Effective Cyber ...

These studies used different ML techniques, and some used more than one technique in APT attack detection. ... Some of the primary studies that looked for APT ...

Chinese APT Abuses VSCode to Target Government in Asia - Unit 42

Unit 42 researchers recently found that Stately Taurus abused the popular Visual Studio Code software in espionage operations targeting government entities in ...

APT groups and threat actors | Google Cloud

An analysis of APT21 techniques suggests that another focus area of theirs is dissident groups which seek greater autonomy or independence from China, such as ...

Agencies issue advisory on threat of China-based cyber group

The Advanced Persistent Threat (APT) 40, also known as Kryptonite Panda, GINGHAM TYPHOON, Leviathan and Bronze Mohawk, has previously targeted organizations in ...

APT Quarterly Highlights : Q2 2024 - CYFIRMA

In the second quarter of 2024, Advanced Persistent Threat (APT) groups from China, North Korea, Iran, and Russia demonstrated a surge in dynamic and innovative ...

Recruitment and Training of Chinese APT Groups: The Elite ...

China's cyber operatives are not trained solely on domestic soil. Recruits are frequently sent abroad for advanced training in cyber techniques, ...

China's elite hackers expand target list to European Union

ESET's APT update also included changes in tactics, techniques, and procedures from Russia,North Korea and Iran. ... look to target critical ...

Chinese APT Uses New 'Stack Rumbling' Technique to Disable ...

A subgroup of China-linked hacker group APT41 is using a new 'stack rumbling' DoS technique to disable security software.