Title
stringlengths
4
210
Date
stringlengths
10
10
Affiliations
stringlengths
4
587
Description
stringlengths
43
1.57k
Response
stringlengths
7
270
Victims
stringlengths
3
359
Sponsor
stringlengths
4
87
Type
stringclasses
7 values
Category
stringlengths
8
51
Sources_1
stringlengths
28
255
Sources_2
stringlengths
24
221
Sources_3
stringlengths
36
255
Nodaria
2023-02-08
Also known as UAC-0056, Ember Bear, and Cadet Blizzard.
Nodaria is a Russia-linked threat actor. It has been active since March 2021 and is primarily linked to attacks against Ukraine, including the January 2022 WhisperGate wiper attacks. The group likely also targeted organizations in Georgia and Kyrgyzstan. 
Unknown
Organizations in Georgia, Kyrgyzstan, and Ukraine
Russian Federation
Data destruction
Government, Private sector
https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/nodaria-ukraine-infostealer
https://thehackernews.com/2023/02/russian-hackers-using-graphiron-malware.html
null
Targeting of Ukrainian government bodies
2023-04-30
APT 28
Russian group APT 28 aimed a spear-phishing campaign at Ukrainian government organizations, advertising fake Windows Update guides in order to collect intelligence on government activities.
Confirmation
Ukrainian government organizations using the Windows operating system
Russian Federation
Espionage
Government
https://cert.gov.ua/article/4492467
https://securityaffairs.com/145500/apt/spear-phishing-campaign-apt28.html?web_view=true
null
Targeting of high-value customers of an East Asian data-loss prevention company
2023-03-15
Bronze Butler
Tick, a Chinese intelligence-aligned actor, compromised an internal update to the servers of a data-loss prevention company in order to deliver malware within the network. Tick packaged its malware as part of legitimate installers so that the malware was eventually executed on computers of the company’s customers. 
Unknown
Two customers of an East Asian data-loss prevention company
China
Espionage
Private sector
https://www.welivesecurity.com/2023/03/14/slow-ticking-time-bomb-tick-apt-group-dlp-software-developer-east-asia/
null
null
Targeting of South Korean hospital network
2023-05-10
Kimsuky
Kimsuky attacked the networks of Seoul National University Hospital in 2021 and stole personal data from over eight hundred thousand current and former patients and employees. Two years later, South Korean police attributed the attack to North Korea.
Confirmation https://www.police.go.kr/user/bbs/BD_selectBbs.do?q_bbsCode=1002&q_bbscttSn=20230510144333019&q_tab=&q_searchKeyTy=&q_searchVal=&q_rowPerPage=10&q_currPage=1&q_sortName=&q_sortOrder=
Seoul National University Hospital
Korea (Democratic People's Republic of)
Espionage
Civil society
https://www.police.go.kr/user/bbs/BD_selectBbs.do?q_bbsCode=1002&q_bbscttSn=20230510144333019&q_tab=&q_searchKeyTy=&q_searchVal=&q_rowPerPage=10&q_currPage=1&q_sortName=&q_sortOrder=
https://www.nknews.org/2023/05/north-korean-hackers-stole-830k-peoples-data-in-attack-on-seoul-hospital-rok/
null
Targeting of European government agencies and diplomats
2023-04-13
The Dukes
Russian threat actor the Dukes ran a phishing campaign posing as various European embassies and sending fake Google Calendar invites that redirected those who clicked on the invite to malicious documents. The operation’s goal appears to be to steal documents related to the Ukraine war.
Confirmation https://www.gov.pl/web/baza-wiedzy/espionage-campaign-linked-to-russian-intelligence-services
Government agencies and diplomats associated with NATO and the European Union
Russian Federation
Espionage
Government
https://www.gov.pl/web/baza-wiedzy/espionage-campaign-linked-to-russian-intelligence-services
null
null
Targeting of Vietnamese agriculture business
2023-06-09
Ocean Lotus
Ocean Lotus used a novel backdoor as part of an attack on a Vietnamese agricultural company. The attacks were launched to steal information and were likely part of a bigger campaign by Ocean Lotus against large businesses in Vietnam
Unknown
An unnamed Vietnamese agricultural business
Vietnam
Espionage
Private sector
https://www.elastic.co/security-labs/elastic-charms-spectralviper
null
null
Targeting of telecommunications and media firms in Vietnam
2023-02-13
Goblin Panda
China-backed threat actor Goblin Panda has been observed using lure documents with embedded malicious macros. The group deployed three major variants of ShellFang, a custom shellcode loader, against the telecommunications and media sectors in Vietnam throughout 2022.
Unknown
Vietnamese organizations in the information technology, media, and telecommunications sectors
China
Espionage
Private sector
https://www.trendmicro.com/en_us/research/23/b/earth-zhulong-familiar-patterns-target-southeast-asian-firms.html
null
null
Targeting of military personnel in South Asia
2023-05-03
Believed to be the work of the Pakistani government
An unnamed state-linked Pakistani threat group used fake apps and websites to compromise and spy on the personal devices of military personnel in India and the Pakistani Air Force.
Unknown
Military personnel in India and the Pakistani Air Force
Pakistan
Espionage
Military
https://about.fb.com/wp-content/uploads/2023/06/Meta-Quarterly-Adversarial-Threat-Report-Q1-2023.pdf
null
null
Targeting of U.S. federal civilian agency
2023-03-15
Hafnium
Chinese threat actor Hafnium attacked an unnamed U.S. government civilian agency from August to January 2023. Hafnium exploited a known vulnerability in software in the agency’s Microsoft Internet Information Services (IIS) web server.
Unknown
U.S. federal agency
China
Espionage
Government
https://www.cisa.gov/sites/default/files/2023-03/aa23-074a-threat-actors-exploit-telerik-vulnerability-in-us-government-iis-server_1.pdf
null
null
Targeting of cryptocurrency exchanges in DangerousPassword campaign
2023-05-12
Lazarus Group
BlueNoroff, a subcluster of the threat actor Lazarus Group, sent malicious shortcut files to cryptocurrency exchanges as part of an expansion of its DangerousPassword campaign. The malware was distributed both over email and through LinkedIn messages.
Confirmation https://blogs.jpcert.or.jp/en/2023/05/dangerouspassword.html
Cryptocurrency exchanges in Japan and other countries
Korea (Democratic People's Republic of)
Espionage
Private sector
https://blogs.jpcert.or.jp/en/2023/05/dangerouspassword.html
null
null
Targeting of a Taiwanese media organization
2023-04-17
APT 41
The Chinese threat actor APT 41 targeted a Taiwanese media company with a phishing campaign that abused the Google command-and-control red teaming tool in order to steal data from victims.
Unknown
Taiwanese media organization
China
Espionage
Civil society
https://services.google.com/fh/files/blogs/gcat_threathorizons_full_apr2023.pdf
https://www.bleepingcomputer.com/news/security/hackers-abuse-google-command-and-control-red-team-tool-in-attacks/
null
Targeting of South Korean professors, dissidents, and human rights advocates
2023-06-12
APT 37
APT 37, a North Korean hacking group, distributed information-stealing malware through Ably, a South Korean data-transfer and messaging application. The malware could be used to steal information from the victim’s computer and to record video and audio and exfiltrate it.
Unknown
Professors, human rights advocates, and North Korean defectors
Korea (Democratic People's Republic of)
Espionage
Civil society
https://asec.ahnlab.com/ko/53851/
null
null
Targeting of Indian two-factor authentication tool Kavach
2023-02-21
APT 36
Pakistani threat actor APT 36 targeted Indian government entities with a spear-phishing campaign that used a new version of ReverseRAT malware. The attacks aimed to compromise Kavach, a two-factor authentication system the Indian government used to secure its systems.
Unknown
Kavach, a two-factor authentication system used by Indian government agencies
Pakistan
Espionage
Government
https://industrialcyber.co/ransomware/sidecopy-apt-group-uses-reverserat-backdoor-to-target-indian-government-agencies-threatmon-reports/
null
null
Targeting of military personnel and activists in Southeast Asia
2023-05-03
Patchwork
Patchwork, an Indian state-sponsored threat actor, used social engineering and spear-phishing lures to target military personnel and activists in Bangladesh, China, India, Pakistan, Sri Lanka, and Tibet.
Unknown
Military personnel and minority rights activists in Bangladesh, China, India, Pakistan, Sri Lanka, and Tibet
India
Espionage
Military, Civil society
https://about.fb.com/wp-content/uploads/2023/06/Meta-Quarterly-Adversarial-Threat-Report-Q1-2023.pdf
null
null
Targeting of Indian government’s premier defense technology research agency
2023-03-23
APT 36
The Pakistani cyberespionage group APT 36 targeted workers at India’s Defense Research and Development Organization with the goal of stealing sensitive military secrets. The group used spear phishing for initial entry with emails that alleged they contained research material about military technologies sent as attachments, but which actually contained malware.
Unknown
India’s Defense Research and Development Organization
Pakistan
Espionage
Government
https://blog.cyble.com/2023/03/21/notorious-sidecopy-apt-group-sets-sights-on-indias-drdo/
null
null
Targeting of Ukrainian civil-society groups
2023-05-17
APT 28
APT 28 targeted Ukrainian civil-society groups using a combination of phishing techniques and compromised Ubiquiti Wi-Fi routers. The phishing emails impersonated documents from a Ukrainian defense think tank, the Center for Defense Strategies.
Unknown
Ukrainian civil-society organizations
Russian Federation
Espionage
Civil society
https://blog.sekoia.io/apt28-leverages-multiple-phishing-techniques-to-target-ukrainian-civil-society/
null
null
Targeting of users of Kakao
2023-01-13
Kimsuky
Kimsuky, a North Korean threat actor, ran a phishing campaign that distributed fake login pages for the popular South Korean messaging app Kakao. Kimsuky likely aimed to steal victims’ passwords; whether the campaign specifically targeted any users is unclear.
Unknown
Users of the Kakao chat application in South Korea
Korea (Democratic People's Republic of)
Espionage
Private sector
https://blog.alyac.co.kr/5043
null
null
Targeting of Indian government agencies
2023-04-19
APT 36
The Pakistani threat actor APT 36 used a two-factor authentication tool to deliver a new backdoor called Poseidon to Linux users working for Indian government agencies.
Unknown
Linux users working for Indian government agencies
Pakistan
Espionage
Government
https://www.uptycs.com/blog/cyber_espionage_in_india_decoding_apt_36_new_linux_malware
https://thehackernews.com/2023/04/pakistani-hackers-use-linux-malware.html?web_view=true
null
Targeting of Atomic Wallet cryptocurrency users
2023-06-13
Lazarus Group
North Korean hackers stole over $100 million in cryptocurrency from over five thousand cryptocurrency wallets run by a company called Atomic Wallet.
Unknown
Atomic Wallet users
Korea (Democratic People's Republic of)
Financial Theft
Private sector
https://hub.elliptic.co/analysis/north-korea-linked-atomic-wallet-heist-tops-100-million
null
null
Targeting of Ukrainian government websites using two-year-old backdoors
2023-02-23
Nodaria
Ukraine’s Computer Emergency Response Team said that Russian state hackers, Nodaria, breached multiple government websites using backdoors placed as far back as December 2021. The hackers used the backdoors to modify content on the affected websites, although what content was modified is unclear.
Confirmation https://cert.gov.ua/article/3947787
Ukrainian government websites
Russian Federation
Defacement
Government
https://cert.gov.ua/article/3947787
null
null
Targeting of the Ukrainian public sector
2023-05-04
Sandworm
The Russian threat group Sandworm was observed destroying data on Ukrainian state networks using a malicious script, RoarBat. Sandworm gained initial access to the networks by compromising VPN accounts that lacked two-factor authentication.
Confirmation
Ukraine’s public networks
Russian Federation
Data destruction
Government
https://cert.gov.ua/article/4555802
https://securityaffairs.com/145731/cyber-warfare-2/sandworm-apt-winrar-destructive-attacks.html?web_view=true
null
Targeting of Middle Eastern telecommunications providers
2023-03-23
Gallium
The Chinese state actor Gallium targeted Middle Eastern telecommunications companies in a prolonged spear-phishing campaign dubbed Operation Soft Cell. After gaining access, attackers have been observed stealing credentials, performing general reconnaissance, and exfiltrating data.
Unknown
Middle Eastern telecommunications companies
China
Espionage
Private sector
https://www.sentinelone.com/labs/operation-tainted-love-chinese-apts-target-telcos-in-new-attacks/
null
null
Targeting of users of Israeli shipping and logistics websites
2023-05-23
Believed to be the work of the Iranian government
An Iranian threat actor perpetrated a watering hole attack using eight Israeli websites. The websites belonged to companies from the shipping, logistics, and financial services industries.
Unknown
Digital Ocean, uPress, and Bezeq International
Iran (Islamic Republic of)
Espionage
Private sector
https://www.clearskysec.com/fata-morgana/
null
null
Targeting of the Iranian government
2023-01-18
Mirage
Mirage, a Chinese threat actor, deployed a new backdoor, dubbed Turian, against the Iranian government in 2022. What agencies in the Iranian government were compromised, or what information Mirage found, is unclear.
Unknown
The Iranian government
China
Espionage
Government
https://unit42.paloaltonetworks.com/playful-taurus/#post-126622-_f65uqufagf4w
null
null
Targeting of human rights groups and activists related to human rights advocacy in North Korea
2023-04-20
Believed to be the work of the North Korean government
An APT group with similarities to Kimusky compromised legitimate business websites to target human rights groups and activists in North Korea.
Unknown
Human rights groups and activists focused on North Korea
Korea (Democratic People's Republic of)
Espionage
Civil society
https://interlab.or.kr/archives/18979
null
null
Targeting of users of Naver
2023-06-15
Believed to be the work of the North Korean government
North Korean hackers set up a fake website designed to look like the South Korean web portal and search engine Naver, according to a report by the South Korean National Intelligence Service.
Confirmation https://www.reuters.com/world/asia-pacific/north-korean-hackers-create-fake-web-portal-souths-spy-agency-says-2023-06-15/
Users of the Naver web portal and search engine
Korea (Democratic People's Republic of)
Espionage
Civil society
https://www.reuters.com/world/asia-pacific/north-korean-hackers-create-fake-web-portal-souths-spy-agency-says-2023-06-15/
null
null
Targeting of Asian conglomerate in the materials sector
2023-02-28
Winnti Umbrella
Chinese APT Winnti Umbrella has been targeting multiple subsidiaries of an Asian conglomerate in the materials and composites sector using open-source malware. The group likely tried to steal intellectual property.
Unknown
An unidentified Asian conglomerate in the materials sector
China
Espionage
Private sector
https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/blackfly-espionage-materials
null
null
Targeting of minority groups in Iran
2023-05-04
Believed to be the work of the Iranian government
The Iranian government is using BoldSpy malware to surveil minority groups in the country and monitor arms, alcohol, and drugs trafficking. The Law Enforcement Command of the Islamic Republic of Iran likely installs the malware, probably using physical access to victim devices it obtains during targets’ detention.
Unknown
Minority groups in Iran
Iran (Islamic Republic of)
Espionage
Civil society
https://www.lookout.com/blog/iranian-spyware-bouldspy
null
null
Targeting with spyware of Meta employee who holds U.S. and Greek citizenship
2023-03-20
Believed to be the work of the Greek intelligence service
Greece’s national intelligence service installed Predator spyware onto the phone of a Meta employee in the country, Artemis Seaford, in September 2021 and operated the malware for at least two months. Why Seaford was targeted is unclear, and the Greek authorities have said they will launch an investigation into the hack.
Unknown
Artemis Seaford, a Meta employee
Greece
Espionage
Private sector
https://www.nytimes.com/2023/03/20/world/europe/greece-spyware-hacking-meta.html
null
null
Volt Typhoon
2023-05-24
Affiliated with the Chinese government.
U.S. government agencies and Microsoft detected activity on critical infrastructure in the United States and Guam by a new Chinese threat actor dubbed Volt Typhoon. The attacks were primarily designed to gather information on U.S. critical infrastructure and military capabilities, but Microsoft and the agencies said the attacks could be preparation for a future attack on U.S. critical infrastructure. Also known as Vanguard Panda.
Confirmation https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-144a
U.S. Navy systems and critical infrastructure networks
China
Espionage
Government, Military, Private sector
https://www.microsoft.com/en-us/security/blog/2023/05/24/volt-typhoon-targets-us-critical-infrastructure-with-living-off-the-land-techniques/
https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-144a
null
Targeting of Harmony cryptocurrency bridge
2023-01-23
Lazarus Group
Lazarus Group stole nearly $100 million in cryptocurrency from the platform Harmony Bridge in June 2022. The FBI formally attributed the hack to Lazarus in January 2023 after the hackers attempted to launder nearly $60 million through cryptocurrency mixers and a series of wallets.`
Confirmation https://www.fbi.gov/news/press-releases/fbi-confirms-lazarus-group-cyber-actors-responsible-for-harmonys-horizon-bridge-currency-theft
Harmony Bridge cryptocurrency platform
Korea (Democratic People's Republic of)
Financial Theft
Private sector
https://www.fbi.gov/news/press-releases/fbi-confirms-lazarus-group-cyber-actors-responsible-for-harmonys-horizon-bridge-currency-theft
null
null
Targeting of Mac users at financial institutions
2023-04-24
Lazarus Group
BlueNoroff, a subgroup of North Korea’s Lazarus Group, was observed using a new Mac operating-system malware family, dubbed RustBucket, in recent attacks on Mac machines. Based on the lures used, BlueNoroff likely targeted the financial technology sector with the malware. RustBucket can be used to gather system information and allows the attacker to perform various actions on infected machines.
Unknown
Financial technology firms and their employees who use the Mac operating system
Korea (Democratic People's Republic of)
Espionage
Private sector
https://blog.sekoia.io/bluenoroffs-rustbucket-campaign/
null
null
Targeting of organizations using Barracuda email security gateway devices
2023-06-15
Believed to be the work of the Chinese government
A Chinese threat actor compromised Barracuda brand email security gateway systems and used access to infiltrate networks attached to the Barracuda products. Once the campaign was detected, the attackers rapidly expanded their persistence on compromised systems, leading Barracuda to tell affected customers to destroy their devices due to the potential for continued compromise.
Unknown
Users of the Barracuda email security gateway, including trade offices and academic research organizations in Taiwan and Hong Kong
China
Espionage
Government, Civil society
https://www.mandiant.com/resources/blog/barracuda-esg-exploited-globally
null
null
Targeting of Belgian member of Parliament
2023-03-01
Zirconium
Chinese actor Zirconium targeted a Belgian MP, Samuel Cogolati, with a spear-phishing attack. The attack came soon after Cogolati authored a resolution condemning the crimes against humanity committed against Uyghur Muslims in China’s Xinjiang region.
Denouncement https://www.ft.com/content/5c32261c-b1a6-488e-9002-0ca9e0c8ff1b
Samuel Cogolati, Belgian MP
China
Espionage
Government
https://www.ft.com/content/5c32261c-b1a6-488e-9002-0ca9e0c8ff1b
null
null
Targeting of the staff of Korea Risk Group, as well as organizations in the United States, Asia, and Europe
2023-05-04
Kimsuky
Kimusky deployed ReconShark malware against phishing targets, including the staff of the information and analysis firm Korea Risk Group, and organizations and individuals in the United States, Asia, and Europe, including think tanks, research universities, and government entities.
Unknown
Korea Risk Group and individuals and organizations in the United States, Asia, and Europe
Korea (Republic of)
Espionage
Private sector, Civil society
https://www.sentinelone.com/labs/kimsuky-evolves-reconnaissance-capabilities-in-new-global-campaign/?web_view=true
null
null
Targeting of 3CXDesktopApp customers and crypto firms
2023-03-30
Lazarus Group
Suspected members of the North Korean Lazarus Group targeted customers of the voice and video conferencing software 3CXDesktopApp in a financially motivated supply-chain attack during March 2023. The infected infrastructure was spread primarily across European countries, with additional victims in South Africa, the United Kingdom, and North America. In addition to being targeted with an info-stealer, some victims—most of whom were cryptocurrency firms in Brazil, France, Germany, and Italy—were also infected with a second-stage payload.
Unknown
Software company 3CX and users of its equipment
Korea (Democratic People's Republic of)
Espionage
Private sector
https://www.crowdstrike.com/blog/crowdstrike-detects-and-prevents-active-intrusion-campaign-targeting-3cxdesktopapp-customers
https://www.mandiant.com/resources/blog/3cx-software-supply-chain-compromise
null
Targeting of telecommunications equipment in Guam
2023-05-24
Volt Typhoon
Volt Typhoon is a threat actor that has been active since 2021 and targets various organizations, including educational institutions, information technology companies, military networks, and transportation groups for the purposes of espionage. The group primarily targets high-value victims and maintains persistent access through “living off the land” techniques and hands-on activity.
Denouncement https://www.nytimes.com/2023/05/24/us/politics/china-guam-malware-cyber-microsoft.html
Military networks in Guam and critical infrastructure networks in the United States
China
Espionage
Government, Military, Private sector
https://www.microsoft.com/en-us/security/blog/2023/05/24/volt-typhoon-targets-us-critical-infrastructure-with-living-off-the-land-techniques/
https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-144a
null
Targeting of Hive ransomware group
2023-01-26
U.S. Department of Justice, FBI
The U.S. Department of Justice ran a months-long disruption campaign against the Hive ransomware group. During this time, the FBI infiltrated the group’s servers and stole decryption keys, which they distributed to victims, preventing $130 million in ransom payouts.
Unknown
Hive ransomware group
United States
Data destruction
Private sector
https://www.justice.gov/opa/pr/us-department-justice-disrupts-hive-ransomware-variant
null
null
Targeting of U.S. critical infrastructure and civil-society groups
2023-04-18
Charming Kitten
Iranian state-sponsored actor Charming Kitten has been linked to attacks on the U.S. critical infrastructure from 2021 to mid-2022. Those attacks weaponized n-day vulnerabilities on a number of targets, including activists, journalists, the defense industrial base, political dissidents, and U.S. government employees.
Unknown
U.S. activists, journalists, the defense industrial base, political dissidents, and government employees
Iran (Islamic Republic of)
Espionage
Government, Private sector, Civil society
https://www.microsoft.com/en-us/security/blog/2023/04/18/nation-state-threat-actor-mint-sandstorm-refines-tradecraft-to-attack-high-value-targets/
null
null
Targeting of the Indian defense sector
2023-06-15
APT 36
SideCopy, a Pakistani threat actor, used phishing lures against research institutes and companies associated with the Indian defense sector. The phishing lures used in the case were meant to emulate important documents in the Indian defense procurement process.
Unknown
Organizations associated with the Indian defense sector
Pakistan
Espionage
Military, Private sector
https://www.seqrite.com/blog/double-action-triple-infection-and-a-new-rat-sidecopys-persistent-targeting-of-indian-defence
null
null
Targeting East Asian and Southeast Asian health-care, manufacturing, technology, and government organizations
2023-05-05
APT 41
In its latest campaign, APT 41 targeted East Asian and Southeast Asian health-care, manufacturing, technology, and government organizations, attacking via installed Windows Defender in the target environment.
Unknown
East Asian and Southeast Asian health-care, manufacturing, technology, and government organizations.
China
Espionage
Private sector, Government
https://www.trendmicro.com/en_us/research/23/e/attack-on-security-titans-earth-longzhi-returns-with-new-tricks.html
null
null
Targeting of military and government networks in Afghanistan, Bhutan, Myanmar, Nepal, and Sri Lanka
2023-02-15
SideWinder
Threat researchers gained access to a portion of SideWinder’s infrastructure and used that access to determine its targets between June and November 2021. They found that SideWinder had targeted thirteen victims in Afghanistan, one in Bhutan, ten in Myanmar, twenty-nine in Nepal, and six in Sri Lanka. Most were government officials or offices. They likely do not represent the full array of SideWinder’s targets.
Unknown
Government organizations and others in Afghanistan, Bhutan, Myanmar, Nepal, and Sri Lanka
India
Espionage
Government, Military
https://www.group-ib.com/media-center/press-releases/sidewinder-apt-report/
null
null
Targeting of Kenyan government
2023-05-25
Believed to be the work of the Chinese government
Chinese hackers targeted several ministries within Kenya’s government for several years. The hacks were primarily to gain information on Kenya’s ability to repay its debts associated with projects funded under China’s Belt and Road Initiative.
Denial https://www.reuters.com/world/africa/chinese-hackers-attacked-kenyan-government-debt-strains-grew-2023-05-24/
Kenyan government ministries, especially those with financial information
China
Espionage
Government
https://www.reuters.com/world/africa/chinese-hackers-attacked-kenyan-government-debt-strains-grew-2023-05-24/
null
null
Targeting of Ukrainian national news agency, Ukrinform
2023-01-27
Sandworm
The Russian threat group Sandworm used a new Golang-based data wiper, SwiftSlicer, to violate the integrity and accessibility of information within the network of Ukrainian news agency Ukrinform.
Confirmation https://cert.gov.ua/article/3718487
Ukrinform
Russian Federation
Data destruction
Government
https://cert.gov.ua/article/3718487
https://www.bleepingcomputer.com/news/security/ukraine-sandworm-hackers-hit-news-agency-with-5-data-wipers/
null
Targeting of South Korean institutions
2023-04-25
Tonto Team
Chinese actor Tonto Team targeted South Korean education, construction, diplomatic, and political institutions with a malicious file related to anti-malware products.
Unknown
South Korean education, construction, diplomatic, and political institutions
Korea (Democratic People's Republic of)
Espionage
Civil society, Government
https://asec.ahnlab.com/en/51746/
null
null
Targeting of Ukrainian government agencies in phishing attack
2023-06-16
Ghostwriter
GhostWriter launched phishing attacks against Ukrainian government agencies. The group used malicious documents purporting to be a report from an expert at the National Defense University of Ukraine.
Confirmation https://cert.gov.ua/article/4905718
Agencies in the Ukrainian government who collaborate with National Defense University of Ukraine
Russian Federation
Espionage
Government, Military
https://cert.gov.ua/article/4905718
null
null
Targeting of the Technion, the Israeli Institute of Technology
2023-03-07
MuddyWater
Iranian threat actor MuddyWater launched a ransomware attack against the Technion in February 2023, forcing the school to delay its final exams by several days.
Unknown
Technion, Israeli Institute of Technology
Iran (Islamic Republic of)
Financial Theft
Civil society
https://therecord.media/israel-technion-ransomware-attack-iran-darkbit-muddywater
null
null
Targeting of PaperCut MF and NG print management servers by an Islamic Revolutionary Guard Corps–affiliated actor
2023-05-08
Charming Kitten
Charming Kitten targeted vulnerabilities in PaperCut MF and NG print management servers with ransomware.
Unknown
Organizations using PaperCut MF and NG print management servers
Iran (Islamic Republic of)
Financial Theft
Private sector
https://www.bleepingcomputer.com/news/security/microsoft-iranian-hacking-groups-join-papercut-attack-spree/?web_view=true
https://archive.ph/X3h3F
null
SideWinder
2023-02-15
Believed to be affiliated with the Indian government.
SideWinder is an Indian threat actor that has been active since at least 2012. The group primarily operates espionage campaigns but has been observed launching attacks that appear financially motivated.
Unknown
Government and military organizations in Afghanistan, Bhutan, Myanmar, Nepal, and Sri Lanka.
India
Espionage
Government, Military
https://www.group-ib.com/blog/hunting-sidewinder/
null
null
Targeting of Russian iPhone users
2023-06-01
Attributed by Russian security services to the U.S. National Security Agency 
Russian security services accused the U.S. National Security Agency of planting malware on thousands of Apple devices throughout the country. Researchers at Kaspersky also said that executives at their company were targeted as part of the campaign, although they did not attribute it to any country.
Unknown
Members of the Russian government and employees of the cybersecurity company Kaspersky
United States
Espionage
Government, Private sector
https://www.washingtonpost.com/technology/2023/06/01/russia-iphone-hack-kaspersky/
https://safe-surf.ru/specialists/news/693258/
https://usa.kaspersky.com/blog/triangulation-attack-on-ios/28444
Targeting of Ukrainian government authorities
2023-02-01
Gamaredon
Gamaredon, a Russian threat actor group, targeted Ukrainian government authorities. The group used spear-phishing emails to gain initial access and deployed surveillance malware on affected systems.
Confirmation https://scpc.gov.ua/api/docs/19b0a96e-8c31-44bf-863e-cd3e0b651f22/19b0a96e-8c31-44bf-863e-cd3e0b651f22.pdf
Ukrainian government organizations and critical infrastructure facilities, as well as defense, security, and law enforcement agencies
Russian Federation
Espionage
Government
https://scpc.gov.ua/api/docs/19b0a96e-8c31-44bf-863e-cd3e0b651f22/19b0a96e-8c31-44bf-863e-cd3e0b651f22.pdf
null
null
Targeting of high-profile government, aviation, energy, telecoms and banking-sector entities in the Middle East and North Africa
2023-04-27
MuddyWater
MuddyWater ran a phishing campaign that likely began in July 2021 against high-profile government, aviation, banking-sector, energy, and telecommunications entities in the Middle East and North Africa.
Unknown
High-profile government, aviation, energy, telecommunications companies and banking-sector entities in Armenia, Azerbaijan, Bahrain, Canada, Egypt, Israel, Jordan, Kuwait, Malaysia, Saudi Arabia, Syria, Turkey, and the United Arab Emirates
Iran (Islamic Republic of)
Espionage
Government, Private sector, Civil society
https://securelist.com/apt-trends-report-q1-2023/109581/#:~:text=We%20have%20identified,Armenia%20and%20Malaysia
null
null
Targeting of Ukrainian email servers
2023-06-16
APT 28
APT 28, a Russian threat actor, used spear-phishing lures to gain a hold on Ukrainian government and military email servers and then attempted to expand access to the broader email network. The campaign has been active since at least November 2021.
Unknown
Agencies in the Ukrainian government and military who operate Roundcube email servers
Russian Federation
Espionage
Government, Military
https://www.recordedfuture.com/bluedelta-exploits-ukrainian-government-roundcube-mail-servers
null
null
Targeting of Mexican journalists and human rights advocates
2023-03-07
Believed to be the work of a Mexican intelligence agency.
Documents leaked from the Mexican government detail how the Military Intelligence Center, a department within Mexico’s intelligence agency, deployed spyware against three Mexican journalists and Raymundo Ramos, a human rights advocate in the country, between 2019 and 2021.
Unknown
Three journalists and Raymundo Ramos, a human rights advocate in Mexico
Mexico
Espionage
null
https://www.nytimes.com/2023/03/07/world/americas/mexico-military-surveillance.html
null
null
Targeting of PaperCut MF and NG print management servers by a Ministry of Intelligence and Security–affiliated actor
2023-05-08
MuddyWater
MuddyWater targeted vulnerabilities in PaperCut MF and NG print management servers with ransomware.
Unknown
Organizations using PaperCut MF and NG print management servers
Iran (Islamic Republic of)
Financial Theft
Private sector
https://www.bleepingcomputer.com/news/security/microsoft-iranian-hacking-groups-join-papercut-attack-spree/?web_view=true
https://archive.ph/X3h3F
null
Targeting of organizations of strategic interest to the Chinese government
2023-03-30
WInnti Umbrella
Winnti Umbrella, a Chinese state-sponsored threat actor, is continuing to target organizations of interest to the Chinese government (including government, media, and information technology organizations). The group was using Keyplug, a Linux version of the custom modular backdoor, to gain access to victims’ networks, exfiltrating information in line with espionage operations.
Unknown
Aviation, automotive, education, government, media, information technology, and religious organizations
China
Espionage
Government, Civil society, Private sector
https://www.recordedfuture.com/with-keyplug-chinas-redgolf-spies-on-steals-from-wide-field-targets
https://www.mandiant.com/resources/blog/apt41-us-state-governments
null
Targeting of Taiwanese government and critical infrastructure operators
2023-06-02
Emissary Panda
Threat researchers discovered command-and-control infrastructure used by Emissary Panda to coordinate a campaign against Taiwanese government entities and critical infrastructure providers.
Unknown
Taiwanese government agencies and critical infrastructure providers
China
Espionage
Government, Private sector
https://blog.eclecticiq.com/chinese-threat-actor-used-modified-cobalt-strike-variant-to-attack-taiwanese-critical-infrastructure
null
null
Targeting of an Indian medical research organization and technology and energy sectors
2023-02-02
Lazarus Group
Lazarus Group targeted an Indian health-care organization, a technology manufacturer, and the chemical engineering department of a leading research university. The campaign’s goal appeared to be collecting intelligence on major Indian industries.  
Unknown
An Indian medical research organization, technology manufacturer, and university
Korea (Democratic People's Republic of)
Espionage
Private sector, Civil society
https://labs.withsecure.com/publications/no-pineapple-dprk-targeting-of-medical-research-and-technology-sector
null
null
Targeting of manufacturing and real-estate sectors in India and telecommunications companies in Bulgaria and Pakistan
2023-04-27
Lazarus Group
A Lazarus Group campaign, active from early 2020 until January 2023, leveraged a backdoored UltraVNC client against manufacturing and real-estate sectors in India and telecommunications companies in Pakistan and Bulgaria. The goal of the operation, whose scope extends beyond Bulgaria, India, and Pakistan, appears to be intelligence collection.
Unknown
Manufacturing and real-estate sectors in India and telecommunications companies in Bulgaria and Pakistan
Korea (Democratic People's Republic of)
Espionage
Private sector, Civil society
https://securelist.com/apt-trends-report-q1-2023/109581/#:~:text=We%20observed%20a,countries%20and%20sectors
null
null
Targeting of government organizations in Eastern Europe and Western Asia
2023-06-14
Mustang Panda
Mustang Panda targeted government and civil-society networks in at least nine countries— including the United States, Greece, Japan, and the United Kingdom—with several new malware droppers. 
Unknown
Government and civil-society groups in the United States, Estonia, Finland, Greece, Japan, Latvia, Taiwan, and Turkey
China
Espionage
Government, Civil society
https://www.trendmicro.com/en_us/research/23/f/behind-the-scenes-unveiling-the-hidden-workings-of-earth-preta.html
null
null
Targeting of infrastructure projects in Indonesia, Thailand, and Vietnam
2023-03-08
Believed to be the work of the Chinese government
A Chinese threat actor was detected targeting the strategic infrastructure projects of government organizations in Indonesia, Thailand, and Vietnam. Active since late 2022, the campaign uses spear-fishing emails for initial access and deploys the Soul malware framework once inside the network.
Unknown
Infrastructure projects in Indonesia, Thailand, and Vietnam
China
Espionage
Government
https://research.checkpoint.com/2023/pandas-with-a-soul-chinese-espionage-attacks-against-southeast-asian-government-entities/
null
null
Targeting of Pakistani government officials and networks in Turkey
2023-05-08
SideWinder
SideWinder, an Indian APT, distributed spear-phishing lures to various Pakistani government officials. The lures were primarily related to the Pakistani military or U.S.-Pakistan relations. After the initial campaign against Pakistan was detected, the group used the same group of command-and-control servers to launch payloads in Turkey. The group’s targets in Turkey remain unclear.
Unknown
Pakistani government officials and computers in Turkey
India
Espionage
Government
https://blogs.blackberry.com/en/2023/05/sidewinder-uses-server-side-polymorphism-to-target-pakistan
null
null
Targeting of Ukrainian organizations with old cybercrime malware
2023-01-05
Turla
A Russian threat actor, Turla, used defunct command and control website domains to reactivate dormant backdoors installed before 2013 by criminal hackers. Turla then downloaded new information-stealing malware on the infected networks to identify whether they would be valuable for espionage.
Unknown
Ukrainian organizations
Russian Federation
Espionage
Private sector
https://www.mandiant.com/resources/blog/turla-galaxy-opportunity
null
null
Targeting of experts in North Korea policy issues
2023-04-05
Kimsuky
In a recent phishing campaign, North Korean threat actor Kimsuky posed as media outlets and think tanks and requested interviews or information about North Korea. The emails contained malicious links redirecting to fake login pages that harvested user credentials.
Unknown
Government and military personnel, think tanks, policymakers, academics, and researchers in South Korea and the United States
Korea (Democratic People's Republic of)
Espionage
Government, Civil society, Private sector
https://blog.google/threat-analysis-group/how-were-protecting-users-from-government-backed-attacks-from-north-korea/
https://thehackernews.com/2023/04/google-tag-warns-of-north-korean-linked.html
null
Targeting of Islamic State group militants in Iraq
2023-06-04
Australian Signals Directorate
In 2016, Australian operators deployed the tool Light Bolt against Islamic State militants in coordination with an offensive to retake Mosul, Iraq. Light Bolt was designed to deny Islamic State militants internet access and was used to disrupt communications in coordination with ground forces attempting to retake Mosul. 
Unknown
Islamic State militants operating around the city of Mosul
Australia
Sabotage
Military
https://www.abc.net.au/news/2023-06-05/australian-cyber-spies-disrupted-islamic-state-militants/102425324
null
null
Targeting of Scottish National Party member of Parliament (MP)
2023-02-08
Calisto
Russia-backed threat actor Calisto is believed to be behind a spear-phishing attack on the email accounts of Stewart McDonald, a Scottish National Party MP, and a member of his staff. McDonald said he worried the Russian government planned to leak the emails it stole, although as of March 28, 2023, none have been made public.
Denouncement https://www.theguardian.com/politics/2023/feb/08/scottish-mp-stewart-mcdonald-emails-hacked-russia-linked-group
Stewart McDonald, a Scottish National Party MP and staff member
Russian Federation
Doxing
Government
https://www.theguardian.com/politics/2023/feb/08/scottish-mp-stewart-mcdonald-emails-hacked-russia-linked-group
null
null
Targeting Linux systems in Nepal and South Africa
2023-04-28
Gallium
Chinese threat actor Gallium is using a new variant of the PingPull malware to target the Linux systems of finance, government, and telecommunications organizations across Africa, Europe, and Southeast Asia.
Unknown
Finance, government, and telecommunications organizations across Africa, Europe, and Southeast Asia
China
Espionage
Civil society, Government, Private sector
https://unit42.paloaltonetworks.com/alloy-taurus/
https://cyware.com/news/alloy-taurus-apt-spotted-using-pingpull-and-a-new-backdoor-to-target-linux-users-30399251
null
Targeting of European diplomatic entities
2023-03-15
The Dukes
Russian threat group the Dukes ran a spear-phishing campaign against diplomatic entities and systems that were transmitting sensitive information about regional politics, aiding Ukrainian citizens fleeing the country, and helping the government of Ukraine.
Unknown
European diplomatic entities and information systems
Russian Federation
Espionage
Government
https://blogs.blackberry.com/en/2023/03/nobelium-targets-eu-governments-assisting-ukraine
null
null
Targeting of government networks with Snake malware
2023-05-09
Turla
The FBI said it had disrupted a malware network, Snake, run by Turla, a unit within Russia’s Federal Security Service (FSB). Snake had been operational for almost twenty years and had been placed on computers in over fifty countries, including the United States and Russia. The U.S. operation disabled Turla’s Snake malware using a tool that propagated itself across the network of devices compromised by Snake and prompted the FSB’s malware to overwrite its own vital components.
Hack Back https://www.justice.gov/opa/pr/justice-department-announces-court-authorized-disruption-snake-malware-network-controlled
Organizations in over fifty countries, including the United States, Australia, Russia, and members of the European Union
Russian Federation
Espionage
Government, Military, Private sector, Civil society
https://www.justice.gov/opa/pr/justice-department-announces-court-authorized-disruption-snake-malware-network-controlled
https://www.wired.com/story/turla-history-russia-fsb-hackers/
https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-129a
Calisto
2023-01-06
Also known as Cold River, Seaborgium, TA446, TAG-53
Calisto is a Russian government-affiliated threat actor. The group uses spear-phishing tactics to compromise individual email accounts for espionage purposes. The group has also been known to leak stolen emails as part of information-warfare efforts.
Confirmation https://www.ncsc.gov.uk/news/spear-phishing-campaigns-targets-of-interest
Politicians and organizations in the United States, United Kingdom, and Europe.
Russian Federation
Espionage
Private sector, Civil society, Government
https://www.microsoft.com/en-us/security/blog/2022/08/15/disrupting-seaborgiums-ongoing-phishing-operations/
https://www.ncsc.gov.uk/news/spear-phishing-campaigns-targets-of-interest
https://www.recordedfuture.com/exposing-tag-53-credential-harvesting-infrastructure-for-russia-aligned-espionage-operations
Targeting of Indian education sector
2023-04-13
APT 36
Pakistani state-backed group APT 36 targeted entities in the Indian education sector with education-themed documents that contained Crimson RAT malware.
Unknown
Educational institutions and students in India
Pakistan
Espionage
Civil society
https://www.sentinelone.com/labs/transparent-tribe-apt36-pakistan-aligned-threat-actor-expands-interest-in-indian-education-sector/
null
null
Targeting of analysts of North Korean affairs
2023-06-06
Kimsuky
Kimsuky used social engineering techniques to deploy ReconShark malware against former South Korean government officials and researchers focused on North Korean affairs. The group focused on expanding access to affected systems and stealing subscriptions to the North Korea-focused news website NKNews.
Unknown
Researchers focused on North Korean affairs
Korea (Democratic People's Republic of)
Espionage
Civil society
https://www.sentinelone.com/labs/kimsuky-new-social-engineering-campaign-aims-to-steal-credentials-and-gather-strategic-intelligence/
null
null
Targeting of dissidents and opposition political candidates in Ghana
2022-01-20
Believed to be the work of Ghana's government
The Israeli spyware firm NSO Group sold Pegasus spyware to the government of Ghana, which used the tools to spy on political opponents and dissidents. Ghana's intelligence agency launched an investigation into the spyware allegations. NSO Group has claimed that although Ghana bought the spyware, it was never actually used in the country. 
Denial https://www.haaretz.com/israel-news/tech-news/nso-ghana-op-exposed-never-before-seen-pegasus-spyware-footage-workers-passports-1.10553725
Political dissidents and opposition leaders in Ghana
Ghana
Espionage
Civil society
https://www.haaretz.com/israel-news/tech-news/2022-01-20/ty-article/nso-ghana-op-exposed-never-before-seen-pegasus-spyware-footage-workers-passports/0000017f-f1fb-df98-a5ff-f3ffb9a20000
null
null
Targeting of Ukrainian state entities
2022-03-07
UNC1151
The Belarusian threat actor UNC1151 targeted multiple Ukrainian government agencies with a backdoor called MicroBackdoor. The malware was delivered via phishing emails that included a bait image and files containing malicious code. The backdoor and loader were created in January 2022, before Russia’s invasion of Ukraine.  
null
Ukrainian state entities
Belarus
Espionage
Government
https://cert.gov.ua/article/37626
null
null
Targeting of Russian and Belarusian websites
2022-05-04
Ukrainian IT Army
Ukraine’s IT Army compromised Docker Engine honeypots in an attempt to execute distributed denial-of-service (DDoS) attacks against Russian and Belarusian websites.
null
Russian and Belarusian websites were targeted, including those belonging to government, military, media, finance, energy, retail, mining, manufacturing, chemicals, production, technology, advertisements, agriculture, transportation, and political parties.
Ukraine
Denial of service
Government, Private sector, Civil society
https://www.crowdstrike.com/blog/compromised-docker-honeypots-used-for-pro-ukrainian-dos-attack/
null
null
Targeting of the Belgian Federal Public Service Interior in Chinese espionage campaign
2022-07-18
Zirconium
Chinese threat actors targeted the Belgian Federal Public Service Interior as part of a wide-ranging cyberespionage campaign involving multiple threat actors. Belgian authorities condemned the activity.
Denouncement https://diplomatie.belgium.be/en/news/declaration-minister-foreign-affairs-malicious-cyber-activities
Belgian Federal Public Service Interior
China
Espionage
Government
https://diplomatie.belgium.be/en/news/declaration-minister-foreign-affairs-malicious-cyber-activities
https://www.bleepingcomputer.com/news/security/belgium-says-chinese-hackers-attacked-its-ministry-of-defense/
null
Targeting of Ukrainian government agencies
2022-08-11
Gamaredon
The Computer Emergency Response Team of Ukraine found that Gamaredon had been breaking into Ukrainian government email accounts.  
Confirmation
Ukrainian government agencies
Russian Federation
Espionage
Government
https://cert.gov.ua/article/2681855
null
null
Targeting of Palestinian entities and activists
2022-02-02
APT-C-23
The Hamas-linked threat actor APT-C-23 used malware embedded in politically themed decoy files and documents to install backdoors on the systems of targeted Palestinian individuals and organizations.  
null
null
null
Espionage
Civil society
https://www.cyberscoop.com/palestinian-targeted-arid-viper-hamas/
https://blog.talosintelligence.com/2022/02/arid-viper-targets-palestine.html
null
Targeting of government agencies in the European Union
2022-04-05
Gamaredon
Russian threat actor Gamaredon targeted Ukrainian organizations in a phishing campaign. The hackers sent malicious emails with lures related to the Russia-Ukraine conflict, including attachments labeled “Information on war criminals of the Russian Federation” and “Necessary_military_assistance.” The emails contained malware which allowed Russian operators to conduct espionage.
Confirmation https://cert.gov.ua/article/39086
Government agencies of EU member states
Russian Federation
Espionage
Government
https://www.bleepingcomputer.com/news/security/ukraine-spots-russian-linked-armageddon-phishing-attacks/
null
null
Targeting of Rostec
2022-05-19
Believed to be the work of the Chinese government
A Chinese threat actor targeted two research institutes run by Rostec, a major Russian state-owned defense conglomerate. The attackers used spear-phishing lures to plant malware and steal data on Russian radar and electronic warfare capabilities.
null
Two research institutes run by Rostec
China
Espionage
Government
https://blog.checkpoint.com/2022/05/19/twisted-panda-check-point-research-unveils-a-chinese-apt-espionage-campaign-against-russian-state-owned-defense-institutes/
null
null
Targeting of Albanian government
2022-08-04
Believed to be the work of the Iranian government
Iranian threat actors targeted Albanian government networks with ransomware. The attack appears to have been motivated by Albania’s hosting a conference for the People’s Mojahedin Organization of Iran, a group previously listed as a terrorist organization by the European Union (EU) and United States and dedicated to opposing the Iranian regime.
Denouncement https://twitter.com/JasonMBrodsky/status/1567465232083165184?s=20&t=nJqgodp_ASXIZWex6LR3Ig
Albanian government networks
Iran (Islamic Republic of)
Data destruction
Government
https://www.mandiant.com/resources/blog/likely-iranian-threat-actor-conducts-politically-motivated-disruptive-activity-against?1=
https://www.cisa.gov/uscert/ncas/alerts/aa22-264a
null
Targeting of users of cryptocurrency applications
2022-12-03
Lazarus Group
North Korean hacking group Lazarus created a fake brand called BloxHolder to spread fake cryptocurrency apps that would infect users with AppleJeus malware to steal money and cryptocurrency. The campaign was active from June to at least October 2022.  
Unknown
Cryptocurrency applications
Korea (Democratic People's Republic of)
Financial Theft
Private sector
https://www.volexity.com/blog/2022/12/01/buyer-beware-fake-cryptocurrency-applications-serving-as-front-for-applejeus-malware/
https://www.bleepingcomputer.com/news/security/hackers-use-new-fake-crypto-app-to-breach-networks-steal-cryptocurrency/
null
Targeting of VMWare Horizon servers with Log4Shell vulnerability
2022-02-18
APT 35
The Iranian threat actor APT 35 leveraged the Log4Shell vulnerability to run malicious PowerShell commands, deploy backdoors, steal credentials, and move laterally through systems.  
null
VMware Horizon servers
Iran (Islamic Republic of)
Espionage
Private sector
https://www.sentinelone.com/labs/log4j2-in-the-wild-iranian-aligned-threat-actor-tunnelvision-actively-exploiting-vmware-horizon/
https://www.bleepingcomputer.com/news/security/iranian-hackers-target-vmware-horizon-servers-with-log4j-exploits/
null
Targeting of cryptocurrency company employees
2022-04-19
Lazarus Group
North Korean hackers targeted cryptocurrency company employees in a phishing campaign to access systems and make fraudulent trades. Lazarus sent mass emails with job offers embedded with malicious links. When victims clicked, their devices downloaded TraderTraitor malware, which enabled the hackers to execute commands and infiltrate company networks to make fraudulent blockchain transactions.
Confirmation https://www.cisa.gov/uscert/ncas/alerts/aa22-108a
Cryptocurrency company employees
Korea (Democratic People's Republic of)
Financial Theft
Private sector
https://www.cisa.gov/uscert/ncas/alerts/aa22-108a
https://www.cyberscoop.com/tradertraitor-malware-warning-cisa-lazarus-group-north-korea/
null
Targeting of individual suspects in serious criminal investigations within Canada
2022-06-29
Believed to be the work of the Canadian government
The Royal Canadian Mounted Police (RCMP) has confirmed that it uses spyware to infiltrate the mobile devices of suspects in highly sensitive criminal and national security investigations. From 2018 to 2020, the RCMP said it used spyware in ten investigations.
null
Individual suspects within Canadian police investigations.
Canada
Espionage
Civil society
https://www.politico.com/news/2022/06/29/canada-national-police-spyware-phones-00043092
null
null
Targeting of Ukrainian government agencies in espionage campaign
2022-09-15
Gamaredon
Gamaredon, a Russian threat actor, was found using newly developed malware to steal information from Ukrainian government agencies. The malware was distributed through a phishing campaign.
Unknown
Ukrainian government agencies
Russian Federation
Espionage
Government
https://blog.talosintelligence.com/2022/09/gamaredon-apt-targets-ukrainian-agencies.html
null
null
Targeting of U.S. National Laboratories
2022-12-06
Calisto
In July 2022, Calisto targeted scientists at the Brookhaven National Laboratory with a fake login page to steal credentials. The hackers appear to have used the harvested credentials to access documents related to counter-proliferation and nuclear accountability in Russia and other states.
Unknown
Scientists at the Brookhaven National Laboratory
Russian Federation
Espionage
Government
https://www.pwc.com/gx/en/issues/cybersecurity/cyber-threat-intelligence/blue-callisto-orbits-around-us.html
null
null
Targeting of Israeli activist
2022-01-20
Believed to be the work of Israel's government.
The Israeli government used the NSO Group's spyware tool Pegasus to spy on an Israeli activist. The authorities allegedly catalogued his activity on a dating site for use as future leverage. 
Denial https://www.calcalistech.com/ctech/articles/0%2C7340%2CL-3927606%2C00.html
An activist in Israel
Israel
Espionage
Civil society
https://www.calcalistech.com/ctech/articles/0%2C7340%2CL-3927606%2C00.html
null
null
Targeting of Ukrainian government and information technology (IT) sector systems with WhisperGate malware
2022-01-15
Nodaria
The Russian Army’s Main Intelligence Directorate (the GRU) used WhisperGate wiper malware on Ukrainian systems on January 13, 2022. The wiper masqueraded as ransomware, offering victims the chance to decrypt their data for a fee, while in reality, the malware wiped the system. The wiper was found on systems throughout Ukraine, including the foreign ministry and networks used by the Ukrainian cabinet.
Unknown
Ukrainian government and IT sector systems
Russian Federation
Data destruction
Government
https://www.microsoft.com/security/blog/2022/01/15/destructive-malware-targeting-ukrainian-organizations/
https://query.prod.cms.rt.microsoft.com/cms/api/am/binary/RE4Vwwd
null
Targeting of Belgian Defense Ministry
2022-07-18
Gallium
Chinese threat actors targeted the Belgian Defense Ministry as part of a wide-ranging cyberespionage campaign involving multiple threat actors, which also targeted the Interior Service. Belgian authorities condemned the activity.
Denouncement https://diplomatie.belgium.be/en/news/declaration-minister-foreign-affairs-malicious-cyber-activities
Belgian Defense Ministry
China
Espionage
Military
https://diplomatie.belgium.be/en/news/declaration-minister-foreign-affairs-malicious-cyber-activities
null
null
Targeting of Uyghur populations
2022-11-10
Mirage
Chinese-affiliated threat actor APT 15 led a mobile surveillance campaign against Uyghurs in China and abroad using BadBazaar malware masquerading as Android apps. 
Unknown
Members of the Uyghur ethnic group
China
Espionage
Civil society
https://www.lookout.com/blog/uyghur-surveillance-campaign-badbazaar-moonshine
null
null
Targeting of Jordanian activists
2022-04-05
Believed to be the work of the Jordanian government
The devices of at least four Jordanian human rights activists, lawyers, and journalists were infected with NSO Group’s Pegasus spyware between August 2019 and December 2021. Two Pegasus operators involved in the incident, named Mansaf and BlackIris, are likely connected to agencies of the Jordanian government.
null
Four Jordanian human rights defenders, lawyers, and journalists
Jordan
Espionage
Civil society
https://citizenlab.ca/2022/04/peace-through-pegasus-jordanian-human-rights-defenders-and-journalists-hacked-with-pegasus-spyware/
null
null
Targeting of Tibetans living abroad
2022-06-01
Lucky Cat
A Chinese threat actor was found using a zero-day vulnerability, dubbed Follina, in Microsoft Office products to distribute zero-click malware. The attackers used Follina to target Tibetan organizations and Tibetans living abroad with malware.
null
Tibetan organizations and Tibetans living abroad
China
Espionage
Civil society
https://www.bleepingcomputer.com/news/security/windows-msdt-zero-day-now-exploited-by-chinese-apt-hackers/
https://techcrunch.com/2022/06/01/china-backed-hackers-are-exploiting-unpatched-microsoft-zero-day/
null
Targeting of Australian, Malaysian, and European organizations and organizations operating in and around the South China Sea.
2022-08-30
APT 40
APT 40 launched an espionage campaign targeting Australian, European, and Asian organizations involved in maintaining and producing wind turbines in the South China Sea, as well as Malaysian organizations working in the Kasawari gas field.
Unknown
Australian, Canadian, German, Japanese, Norwegian, Swedish, and Taiwanese organizations involved in wind turbine maintenance and production, as well as Malaysian oil and gas refineries.
China
Espionage
Government, Private sector
https://www.proofpoint.com/us/blog/threat-insight/chasing-currents-espionage-south-china-sea
https://www.bleepingcomputer.com/news/security/chinese-hackers-target-australian-govt-with-scanbox-malware/
https://therecord.media/china-linked-hackers-target-organizations-operating-in-south-china-sea/
Targeting of Latvian, Lithuanian, and Ukrainian computer systems
2022-02-23
Sandworm
Russian threat actors targeted computer systems in Latvia, Lithuania, and Ukraine with a wiper dubbed HermeticWiper. The malware was aimed at Windows devices, corrupting systems’ master boot records, displaying signs of ransomware as a decoy, and destroying stored data. This followed another wiper attack aimed at Ukraine in January. 
null
Latvian, Lithuanian, and Ukrainian computer systems owned by banks and government contractors, as well as systems used by the defense, aviation, and IT sectors
Russian Federation
Data destruction
Government, Civil society
https://www.cisa.gov/uscert/ncas/alerts/aa22-057a
https://www.sentinelone.com/labs/hermetic-wiper-ukraine-under-attack/
https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/ukraine-wiper-malware-russia
Targeting of journalists reporting on North Korea
2022-04-21
APT 37
North Korea–linked threat actor APT 37 targeted journalists with novel Goldbackdoor malware. APT 37 initially used RokRat malware to hack the email account of a former director at South Korea’s National Intelligence Service. The hackers then impersonated the official and targeted South Korean journalists, sending emails laced with Goldbackdoor malware. The malware can be used to steal passwords and documents.
null
Journalists and the former director of South Korea’s National Intelligence Service
Korea (Democratic People's Republic of)
Espionage
Civil society
https://stairwell.com/news/threat-research-the-ink-stained-trail-of-goldbackdoor/
https://www.nknews.org/2022/04/north-korean-hackers-steal-ex-intelligence-officials-emails-in-malware-attack/
null
Targeting of UN Interim Force in Lebanon (UNIFIL)
2022-06-29
Believed to be the work of the Iranian government
The Israeli defense minister has accused Iran and Hezbollah of attempting a cyberattack against the UNIFIL to steal information about its activities within southern Lebanon.
Confirmation https://www.timesofisrael.com/gantz-says-iran-and-hezbollah-attempted-to-hack-unifil-steal-deployment-infomation/
UN peacekeeping force in Lebanon
Iran (Islamic Republic of)
Espionage
Civil society, Military
https://www.timesofisrael.com/gantz-says-iran-and-hezbollah-attempted-to-hack-unifil-steal-deployment-infomation/
null
null
Targeting of Ukrainian networks via fake telecommunications firms
2022-09-19
Sandworm
A Russian threat actor masqueraded as a Ukrainian telecommunications firm in order to gain access to other networks in Ukraine, both through spear-phishing and malicious public domains.
Unknown
Ukrainian telecommunications infrastructure and other firms
Russian Federation
Espionage
Private sector, Government
https://www.recordedfuture.com/russia-nexus-uac-0113-emulating-telecommunication-providers-in-ukraine
null
null
Targeting of organizations supporting Ukraine
2022-12-06
Calisto
As part of a phishing campaign, Calisto targeted NATO-affiliated military and strategic research institutes, a Ukraine-based defense contractor, and former intelligence officials and Russia experts who were working at nongovernmental organizations.
Unknown
Six private companies in the United States and Eastern Europe and four nongovernmental organizations
Russian Federation
Espionage
Civil society, Private sector
https://blog.sekoia.io/calisto-show-interests-into-entities-involved-in-ukraine-war-support/
null
null
Targeting of local Israeli officials
2022-01-23
Believed to be the work of Israel's government
The signals intelligence unit of the Israeli police is suspected of using Pegasus spyware to surveil local officials and their families in Israel. The warrantless surveillance conducted with Pegasus was used to inform later prosecutions for bribery, some of which were dismissed in court for lack of evidence. The police attempted to cover up evidence that they had used Pegasus in the investigations. 
Unknown
Mayors and other local officials in Israel.
Israel
Espionage
Government
https://www.calcalistech.com/ctech/articles/0%2C7340%2CL-3927704%2C00.html
null
null