Title stringlengths 4 210 | Date stringlengths 10 10 ⌀ | Affiliations stringlengths 4 587 ⌀ | Description stringlengths 43 1.57k | Response stringlengths 7 270 ⌀ | Victims stringlengths 3 359 ⌀ | Sponsor stringlengths 4 87 ⌀ | Type stringclasses 7
values | Category stringlengths 8 51 ⌀ | Sources_1 stringlengths 28 255 ⌀ | Sources_2 stringlengths 24 221 ⌀ | Sources_3 stringlengths 36 255 ⌀ |
|---|---|---|---|---|---|---|---|---|---|---|---|
Nodaria | 2023-02-08 | Also known as UAC-0056, Ember Bear, and Cadet Blizzard. | Nodaria is a Russia-linked threat actor. It has been active since March 2021 and is primarily linked to attacks against Ukraine, including the January 2022 WhisperGate wiper attacks. The group likely also targeted organizations in Georgia and Kyrgyzstan. | Unknown | Organizations in Georgia, Kyrgyzstan, and Ukraine | Russian Federation | Data destruction | Government, Private sector | https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/nodaria-ukraine-infostealer | https://thehackernews.com/2023/02/russian-hackers-using-graphiron-malware.html | null |
Targeting of Ukrainian government bodies | 2023-04-30 | APT 28 | Russian group APT 28 aimed a spear-phishing campaign at Ukrainian government organizations, advertising fake Windows Update guides in order to collect intelligence on government activities. | Confirmation | Ukrainian government organizations using the Windows operating system | Russian Federation | Espionage | Government | https://cert.gov.ua/article/4492467 | https://securityaffairs.com/145500/apt/spear-phishing-campaign-apt28.html?web_view=true | null |
Targeting of high-value customers of an East Asian data-loss prevention company | 2023-03-15 | Bronze Butler | Tick, a Chinese intelligence-aligned actor, compromised an internal update to the servers of a data-loss prevention company in order to deliver malware within the network. Tick packaged its malware as part of legitimate installers so that the malware was eventually executed on computers of the company’s customers. | Unknown | Two customers of an East Asian data-loss prevention company | China | Espionage | Private sector | https://www.welivesecurity.com/2023/03/14/slow-ticking-time-bomb-tick-apt-group-dlp-software-developer-east-asia/ | null | null |
Targeting of South Korean hospital network | 2023-05-10 | Kimsuky | Kimsuky attacked the networks of Seoul National University Hospital in 2021 and stole personal data from over eight hundred thousand current and former patients and employees. Two years later, South Korean police attributed the attack to North Korea. | Confirmation https://www.police.go.kr/user/bbs/BD_selectBbs.do?q_bbsCode=1002&q_bbscttSn=20230510144333019&q_tab=&q_searchKeyTy=&q_searchVal=&q_rowPerPage=10&q_currPage=1&q_sortName=&q_sortOrder= | Seoul National University Hospital | Korea (Democratic People's Republic of) | Espionage | Civil society | https://www.police.go.kr/user/bbs/BD_selectBbs.do?q_bbsCode=1002&q_bbscttSn=20230510144333019&q_tab=&q_searchKeyTy=&q_searchVal=&q_rowPerPage=10&q_currPage=1&q_sortName=&q_sortOrder= | https://www.nknews.org/2023/05/north-korean-hackers-stole-830k-peoples-data-in-attack-on-seoul-hospital-rok/ | null |
Targeting of European government agencies and diplomats | 2023-04-13 | The Dukes | Russian threat actor the Dukes ran a phishing campaign posing as various European embassies and sending fake Google Calendar invites that redirected those who clicked on the invite to malicious documents. The operation’s goal appears to be to steal documents related to the Ukraine war. | Confirmation https://www.gov.pl/web/baza-wiedzy/espionage-campaign-linked-to-russian-intelligence-services | Government agencies and diplomats associated with NATO and the European Union | Russian Federation | Espionage | Government | https://www.gov.pl/web/baza-wiedzy/espionage-campaign-linked-to-russian-intelligence-services | null | null |
Targeting of Vietnamese agriculture business | 2023-06-09 | Ocean Lotus | Ocean Lotus used a novel backdoor as part of an attack on a Vietnamese agricultural company. The attacks were launched to steal information and were likely part of a bigger campaign by Ocean Lotus against large businesses in Vietnam | Unknown | An unnamed Vietnamese agricultural business | Vietnam | Espionage | Private sector | https://www.elastic.co/security-labs/elastic-charms-spectralviper | null | null |
Targeting of telecommunications and media firms in Vietnam | 2023-02-13 | Goblin Panda | China-backed threat actor Goblin Panda has been observed using lure documents with embedded malicious macros. The group deployed three major variants of ShellFang, a custom shellcode loader, against the telecommunications and media sectors in Vietnam throughout 2022. | Unknown | Vietnamese organizations in the information technology, media, and telecommunications sectors | China | Espionage | Private sector | https://www.trendmicro.com/en_us/research/23/b/earth-zhulong-familiar-patterns-target-southeast-asian-firms.html | null | null |
Targeting of military personnel in South Asia | 2023-05-03 | Believed to be the work of the Pakistani government | An unnamed state-linked Pakistani threat group used fake apps and websites to compromise and spy on the personal devices of military personnel in India and the Pakistani Air Force. | Unknown | Military personnel in India and the Pakistani Air Force | Pakistan | Espionage | Military | https://about.fb.com/wp-content/uploads/2023/06/Meta-Quarterly-Adversarial-Threat-Report-Q1-2023.pdf | null | null |
Targeting of U.S. federal civilian agency | 2023-03-15 | Hafnium | Chinese threat actor Hafnium attacked an unnamed U.S. government civilian agency from August to January 2023. Hafnium exploited a known vulnerability in software in the agency’s Microsoft Internet Information Services (IIS) web server. | Unknown | U.S. federal agency | China | Espionage | Government | https://www.cisa.gov/sites/default/files/2023-03/aa23-074a-threat-actors-exploit-telerik-vulnerability-in-us-government-iis-server_1.pdf | null | null |
Targeting of cryptocurrency exchanges in DangerousPassword campaign | 2023-05-12 | Lazarus Group | BlueNoroff, a subcluster of the threat actor Lazarus Group, sent malicious shortcut files to cryptocurrency exchanges as part of an expansion of its DangerousPassword campaign. The malware was distributed both over email and through LinkedIn messages. | Confirmation https://blogs.jpcert.or.jp/en/2023/05/dangerouspassword.html | Cryptocurrency exchanges in Japan and other countries | Korea (Democratic People's Republic of) | Espionage | Private sector | https://blogs.jpcert.or.jp/en/2023/05/dangerouspassword.html | null | null |
Targeting of a Taiwanese media organization | 2023-04-17 | APT 41 | The Chinese threat actor APT 41 targeted a Taiwanese media company with a phishing campaign that abused the Google command-and-control red teaming tool in order to steal data from victims. | Unknown | Taiwanese media organization | China | Espionage | Civil society | https://services.google.com/fh/files/blogs/gcat_threathorizons_full_apr2023.pdf | https://www.bleepingcomputer.com/news/security/hackers-abuse-google-command-and-control-red-team-tool-in-attacks/ | null |
Targeting of South Korean professors, dissidents, and human rights advocates | 2023-06-12 | APT 37 | APT 37, a North Korean hacking group, distributed information-stealing malware through Ably, a South Korean data-transfer and messaging application. The malware could be used to steal information from the victim’s computer and to record video and audio and exfiltrate it. | Unknown | Professors, human rights advocates, and North Korean defectors | Korea (Democratic People's Republic of) | Espionage | Civil society | https://asec.ahnlab.com/ko/53851/ | null | null |
Targeting of Indian two-factor authentication tool Kavach | 2023-02-21 | APT 36 | Pakistani threat actor APT 36 targeted Indian government entities with a spear-phishing campaign that used a new version of ReverseRAT malware. The attacks aimed to compromise Kavach, a two-factor authentication system the Indian government used to secure its systems. | Unknown | Kavach, a two-factor authentication system used by Indian government agencies | Pakistan | Espionage | Government | https://industrialcyber.co/ransomware/sidecopy-apt-group-uses-reverserat-backdoor-to-target-indian-government-agencies-threatmon-reports/ | null | null |
Targeting of military personnel and activists in Southeast Asia | 2023-05-03 | Patchwork | Patchwork, an Indian state-sponsored threat actor, used social engineering and spear-phishing lures to target military personnel and activists in Bangladesh, China, India, Pakistan, Sri Lanka, and Tibet. | Unknown | Military personnel and minority rights activists in Bangladesh, China, India, Pakistan, Sri Lanka, and Tibet | India | Espionage | Military, Civil society | https://about.fb.com/wp-content/uploads/2023/06/Meta-Quarterly-Adversarial-Threat-Report-Q1-2023.pdf | null | null |
Targeting of Indian government’s premier defense technology research agency | 2023-03-23 | APT 36 | The Pakistani cyberespionage group APT 36 targeted workers at India’s Defense Research and Development Organization with the goal of stealing sensitive military secrets. The group used spear phishing for initial entry with emails that alleged they contained research material about military technologies sent as attachments, but which actually contained malware. | Unknown | India’s Defense Research and Development Organization | Pakistan | Espionage | Government | https://blog.cyble.com/2023/03/21/notorious-sidecopy-apt-group-sets-sights-on-indias-drdo/ | null | null |
Targeting of Ukrainian civil-society groups | 2023-05-17 | APT 28 | APT 28 targeted Ukrainian civil-society groups using a combination of phishing techniques and compromised Ubiquiti Wi-Fi routers. The phishing emails impersonated documents from a Ukrainian defense think tank, the Center for Defense Strategies. | Unknown | Ukrainian civil-society organizations | Russian Federation | Espionage | Civil society | https://blog.sekoia.io/apt28-leverages-multiple-phishing-techniques-to-target-ukrainian-civil-society/ | null | null |
Targeting of users of Kakao | 2023-01-13 | Kimsuky | Kimsuky, a North Korean threat actor, ran a phishing campaign that distributed fake login pages for the popular South Korean messaging app Kakao. Kimsuky likely aimed to steal victims’ passwords; whether the campaign specifically targeted any users is unclear. | Unknown | Users of the Kakao chat application in South Korea | Korea (Democratic People's Republic of) | Espionage | Private sector | https://blog.alyac.co.kr/5043 | null | null |
Targeting of Indian government agencies | 2023-04-19 | APT 36 | The Pakistani threat actor APT 36 used a two-factor authentication tool to deliver a new backdoor called Poseidon to Linux users working for Indian government agencies. | Unknown | Linux users working for Indian government agencies | Pakistan | Espionage | Government | https://www.uptycs.com/blog/cyber_espionage_in_india_decoding_apt_36_new_linux_malware | https://thehackernews.com/2023/04/pakistani-hackers-use-linux-malware.html?web_view=true | null |
Targeting of Atomic Wallet cryptocurrency users | 2023-06-13 | Lazarus Group | North Korean hackers stole over $100 million in cryptocurrency from over five thousand cryptocurrency wallets run by a company called Atomic Wallet. | Unknown | Atomic Wallet users | Korea (Democratic People's Republic of) | Financial Theft | Private sector | https://hub.elliptic.co/analysis/north-korea-linked-atomic-wallet-heist-tops-100-million | null | null |
Targeting of Ukrainian government websites using two-year-old backdoors | 2023-02-23 | Nodaria | Ukraine’s Computer Emergency Response Team said that Russian state hackers, Nodaria, breached multiple government websites using backdoors placed as far back as December 2021. The hackers used the backdoors to modify content on the affected websites, although what content was modified is unclear. | Confirmation https://cert.gov.ua/article/3947787 | Ukrainian government websites | Russian Federation | Defacement | Government | https://cert.gov.ua/article/3947787 | null | null |
Targeting of the Ukrainian public sector | 2023-05-04 | Sandworm | The Russian threat group Sandworm was observed destroying data on Ukrainian state networks using a malicious script, RoarBat. Sandworm gained initial access to the networks by compromising VPN accounts that lacked two-factor authentication. | Confirmation | Ukraine’s public networks | Russian Federation | Data destruction | Government | https://cert.gov.ua/article/4555802 | https://securityaffairs.com/145731/cyber-warfare-2/sandworm-apt-winrar-destructive-attacks.html?web_view=true | null |
Targeting of Middle Eastern telecommunications providers | 2023-03-23 | Gallium | The Chinese state actor Gallium targeted Middle Eastern telecommunications companies in a prolonged spear-phishing campaign dubbed Operation Soft Cell. After gaining access, attackers have been observed stealing credentials, performing general reconnaissance, and exfiltrating data. | Unknown | Middle Eastern telecommunications companies | China | Espionage | Private sector | https://www.sentinelone.com/labs/operation-tainted-love-chinese-apts-target-telcos-in-new-attacks/ | null | null |
Targeting of users of Israeli shipping and logistics websites | 2023-05-23 | Believed to be the work of the Iranian government | An Iranian threat actor perpetrated a watering hole attack using eight Israeli websites. The websites belonged to companies from the shipping, logistics, and financial services industries. | Unknown | Digital Ocean, uPress, and Bezeq International | Iran (Islamic Republic of) | Espionage | Private sector | https://www.clearskysec.com/fata-morgana/ | null | null |
Targeting of the Iranian government | 2023-01-18 | Mirage | Mirage, a Chinese threat actor, deployed a new backdoor, dubbed Turian, against the Iranian government in 2022. What agencies in the Iranian government were compromised, or what information Mirage found, is unclear. | Unknown | The Iranian government | China | Espionage | Government | https://unit42.paloaltonetworks.com/playful-taurus/#post-126622-_f65uqufagf4w | null | null |
Targeting of human rights groups and activists related to human rights advocacy in North Korea | 2023-04-20 | Believed to be the work of the North Korean government | An APT group with similarities to Kimusky compromised legitimate business websites to target human rights groups and activists in North Korea. | Unknown | Human rights groups and activists focused on North Korea | Korea (Democratic People's Republic of) | Espionage | Civil society | https://interlab.or.kr/archives/18979 | null | null |
Targeting of users of Naver | 2023-06-15 | Believed to be the work of the North Korean government | North Korean hackers set up a fake website designed to look like the South Korean web portal and search engine Naver, according to a report by the South Korean National Intelligence Service. | Confirmation https://www.reuters.com/world/asia-pacific/north-korean-hackers-create-fake-web-portal-souths-spy-agency-says-2023-06-15/ | Users of the Naver web portal and search engine | Korea (Democratic People's Republic of) | Espionage | Civil society | https://www.reuters.com/world/asia-pacific/north-korean-hackers-create-fake-web-portal-souths-spy-agency-says-2023-06-15/ | null | null |
Targeting of Asian conglomerate in the materials sector | 2023-02-28 | Winnti Umbrella | Chinese APT Winnti Umbrella has been targeting multiple subsidiaries of an Asian conglomerate in the materials and composites sector using open-source malware. The group likely tried to steal intellectual property. | Unknown | An unidentified Asian conglomerate in the materials sector | China | Espionage | Private sector | https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/blackfly-espionage-materials | null | null |
Targeting of minority groups in Iran | 2023-05-04 | Believed to be the work of the Iranian government | The Iranian government is using BoldSpy malware to surveil minority groups in the country and monitor arms, alcohol, and drugs trafficking. The Law Enforcement Command of the Islamic Republic of Iran likely installs the malware, probably using physical access to victim devices it obtains during targets’ detention. | Unknown | Minority groups in Iran | Iran (Islamic Republic of) | Espionage | Civil society | https://www.lookout.com/blog/iranian-spyware-bouldspy | null | null |
Targeting with spyware of Meta employee who holds U.S. and Greek citizenship | 2023-03-20 | Believed to be the work of the Greek intelligence service | Greece’s national intelligence service installed Predator spyware onto the phone of a Meta employee in the country, Artemis Seaford, in September 2021 and operated the malware for at least two months. Why Seaford was targeted is unclear, and the Greek authorities have said they will launch an investigation into the hack. | Unknown | Artemis Seaford, a Meta employee | Greece | Espionage | Private sector | https://www.nytimes.com/2023/03/20/world/europe/greece-spyware-hacking-meta.html | null | null |
Volt Typhoon | 2023-05-24 | Affiliated with the Chinese government. | U.S. government agencies and Microsoft detected activity on critical infrastructure in the United States and Guam by a new Chinese threat actor dubbed Volt Typhoon. The attacks were primarily designed to gather information on U.S. critical infrastructure and military capabilities, but Microsoft and the agencies said the attacks could be preparation for a future attack on U.S. critical infrastructure. Also known as Vanguard Panda. | Confirmation https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-144a | U.S. Navy systems and critical infrastructure networks | China | Espionage | Government, Military, Private sector | https://www.microsoft.com/en-us/security/blog/2023/05/24/volt-typhoon-targets-us-critical-infrastructure-with-living-off-the-land-techniques/ | https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-144a | null |
Targeting of Harmony cryptocurrency bridge | 2023-01-23 | Lazarus Group | Lazarus Group stole nearly $100 million in cryptocurrency from the platform Harmony Bridge in June 2022. The FBI formally attributed the hack to Lazarus in January 2023 after the hackers attempted to launder nearly $60 million through cryptocurrency mixers and a series of wallets.` | Confirmation https://www.fbi.gov/news/press-releases/fbi-confirms-lazarus-group-cyber-actors-responsible-for-harmonys-horizon-bridge-currency-theft | Harmony Bridge cryptocurrency platform | Korea (Democratic People's Republic of) | Financial Theft | Private sector | https://www.fbi.gov/news/press-releases/fbi-confirms-lazarus-group-cyber-actors-responsible-for-harmonys-horizon-bridge-currency-theft | null | null |
Targeting of Mac users at financial institutions | 2023-04-24 | Lazarus Group | BlueNoroff, a subgroup of North Korea’s Lazarus Group, was observed using a new Mac operating-system malware family, dubbed RustBucket, in recent attacks on Mac machines. Based on the lures used, BlueNoroff likely targeted the financial technology sector with the malware. RustBucket can be used to gather system information and allows the attacker to perform various actions on infected machines. | Unknown | Financial technology firms and their employees who use the Mac operating system | Korea (Democratic People's Republic of) | Espionage | Private sector | https://blog.sekoia.io/bluenoroffs-rustbucket-campaign/ | null | null |
Targeting of organizations using Barracuda email security gateway devices | 2023-06-15 | Believed to be the work of the Chinese government | A Chinese threat actor compromised Barracuda brand email security gateway systems and used access to infiltrate networks attached to the Barracuda products. Once the campaign was detected, the attackers rapidly expanded their persistence on compromised systems, leading Barracuda to tell affected customers to destroy their devices due to the potential for continued compromise. | Unknown | Users of the Barracuda email security gateway, including trade offices and academic research organizations in Taiwan and Hong Kong | China | Espionage | Government, Civil society | https://www.mandiant.com/resources/blog/barracuda-esg-exploited-globally | null | null |
Targeting of Belgian member of Parliament | 2023-03-01 | Zirconium | Chinese actor Zirconium targeted a Belgian MP, Samuel Cogolati, with a spear-phishing attack. The attack came soon after Cogolati authored a resolution condemning the crimes against humanity committed against Uyghur Muslims in China’s Xinjiang region. | Denouncement https://www.ft.com/content/5c32261c-b1a6-488e-9002-0ca9e0c8ff1b | Samuel Cogolati, Belgian MP | China | Espionage | Government | https://www.ft.com/content/5c32261c-b1a6-488e-9002-0ca9e0c8ff1b | null | null |
Targeting of the staff of Korea Risk Group, as well as organizations in the United States, Asia, and Europe | 2023-05-04 | Kimsuky | Kimusky deployed ReconShark malware against phishing targets, including the staff of the information and analysis firm Korea Risk Group, and organizations and individuals in the United States, Asia, and Europe, including think tanks, research universities, and government entities. | Unknown | Korea Risk Group and individuals and organizations in the United States, Asia, and Europe | Korea (Republic of) | Espionage | Private sector, Civil society | https://www.sentinelone.com/labs/kimsuky-evolves-reconnaissance-capabilities-in-new-global-campaign/?web_view=true | null | null |
Targeting of 3CXDesktopApp customers and crypto firms | 2023-03-30 | Lazarus Group | Suspected members of the North Korean Lazarus Group targeted customers of the voice and video conferencing software 3CXDesktopApp in a financially motivated supply-chain attack during March 2023. The infected infrastructure was spread primarily across European countries, with additional victims in South Africa, the United Kingdom, and North America. In addition to being targeted with an info-stealer, some victims—most of whom were cryptocurrency firms in Brazil, France, Germany, and Italy—were also infected with a second-stage payload. | Unknown | Software company 3CX and users of its equipment | Korea (Democratic People's Republic of) | Espionage | Private sector | https://www.crowdstrike.com/blog/crowdstrike-detects-and-prevents-active-intrusion-campaign-targeting-3cxdesktopapp-customers | https://www.mandiant.com/resources/blog/3cx-software-supply-chain-compromise | null |
Targeting of telecommunications equipment in Guam | 2023-05-24 | Volt Typhoon | Volt Typhoon is a threat actor that has been active since 2021 and targets various organizations, including educational institutions, information technology companies, military networks, and transportation groups for the purposes of espionage. The group primarily targets high-value victims and maintains persistent access through “living off the land” techniques and hands-on activity. | Denouncement https://www.nytimes.com/2023/05/24/us/politics/china-guam-malware-cyber-microsoft.html | Military networks in Guam and critical infrastructure networks in the United States | China | Espionage | Government, Military, Private sector | https://www.microsoft.com/en-us/security/blog/2023/05/24/volt-typhoon-targets-us-critical-infrastructure-with-living-off-the-land-techniques/ | https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-144a | null |
Targeting of Hive ransomware group | 2023-01-26 | U.S. Department of Justice, FBI | The U.S. Department of Justice ran a months-long disruption campaign against the Hive ransomware group. During this time, the FBI infiltrated the group’s servers and stole decryption keys, which they distributed to victims, preventing $130 million in ransom payouts. | Unknown | Hive ransomware group | United States | Data destruction | Private sector | https://www.justice.gov/opa/pr/us-department-justice-disrupts-hive-ransomware-variant | null | null |
Targeting of U.S. critical infrastructure and civil-society groups | 2023-04-18 | Charming Kitten | Iranian state-sponsored actor Charming Kitten has been linked to attacks on the U.S. critical infrastructure from 2021 to mid-2022. Those attacks weaponized n-day vulnerabilities on a number of targets, including activists, journalists, the defense industrial base, political dissidents, and U.S. government employees. | Unknown | U.S. activists, journalists, the defense industrial base, political dissidents, and government employees | Iran (Islamic Republic of) | Espionage | Government, Private sector, Civil society | https://www.microsoft.com/en-us/security/blog/2023/04/18/nation-state-threat-actor-mint-sandstorm-refines-tradecraft-to-attack-high-value-targets/ | null | null |
Targeting of the Indian defense sector | 2023-06-15 | APT 36 | SideCopy, a Pakistani threat actor, used phishing lures against research institutes and companies associated with the Indian defense sector. The phishing lures used in the case were meant to emulate important documents in the Indian defense procurement process. | Unknown | Organizations associated with the Indian defense sector | Pakistan | Espionage | Military, Private sector | https://www.seqrite.com/blog/double-action-triple-infection-and-a-new-rat-sidecopys-persistent-targeting-of-indian-defence | null | null |
Targeting East Asian and Southeast Asian health-care, manufacturing, technology, and government organizations | 2023-05-05 | APT 41 | In its latest campaign, APT 41 targeted East Asian and Southeast Asian health-care, manufacturing, technology, and government organizations, attacking via installed Windows Defender in the target environment. | Unknown | East Asian and Southeast Asian health-care, manufacturing, technology, and government organizations. | China | Espionage | Private sector, Government | https://www.trendmicro.com/en_us/research/23/e/attack-on-security-titans-earth-longzhi-returns-with-new-tricks.html | null | null |
Targeting of military and government networks in Afghanistan, Bhutan, Myanmar, Nepal, and Sri Lanka | 2023-02-15 | SideWinder | Threat researchers gained access to a portion of SideWinder’s infrastructure and used that access to determine its targets between June and November 2021. They found that SideWinder had targeted thirteen victims in Afghanistan, one in Bhutan, ten in Myanmar, twenty-nine in Nepal, and six in Sri Lanka. Most were government officials or offices. They likely do not represent the full array of SideWinder’s targets. | Unknown | Government organizations and others in Afghanistan, Bhutan, Myanmar, Nepal, and Sri Lanka | India | Espionage | Government, Military | https://www.group-ib.com/media-center/press-releases/sidewinder-apt-report/ | null | null |
Targeting of Kenyan government | 2023-05-25 | Believed to be the work of the Chinese government | Chinese hackers targeted several ministries within Kenya’s government for several years. The hacks were primarily to gain information on Kenya’s ability to repay its debts associated with projects funded under China’s Belt and Road Initiative. | Denial https://www.reuters.com/world/africa/chinese-hackers-attacked-kenyan-government-debt-strains-grew-2023-05-24/ | Kenyan government ministries, especially those with financial information | China | Espionage | Government | https://www.reuters.com/world/africa/chinese-hackers-attacked-kenyan-government-debt-strains-grew-2023-05-24/ | null | null |
Targeting of Ukrainian national news agency, Ukrinform | 2023-01-27 | Sandworm | The Russian threat group Sandworm used a new Golang-based data wiper, SwiftSlicer, to violate the integrity and accessibility of information within the network of Ukrainian news agency Ukrinform. | Confirmation https://cert.gov.ua/article/3718487 | Ukrinform | Russian Federation | Data destruction | Government | https://cert.gov.ua/article/3718487 | https://www.bleepingcomputer.com/news/security/ukraine-sandworm-hackers-hit-news-agency-with-5-data-wipers/ | null |
Targeting of South Korean institutions | 2023-04-25 | Tonto Team | Chinese actor Tonto Team targeted South Korean education, construction, diplomatic, and political institutions with a malicious file related to anti-malware products. | Unknown | South Korean education, construction, diplomatic, and political institutions | Korea (Democratic People's Republic of) | Espionage | Civil society, Government | https://asec.ahnlab.com/en/51746/ | null | null |
Targeting of Ukrainian government agencies in phishing attack | 2023-06-16 | Ghostwriter | GhostWriter launched phishing attacks against Ukrainian government agencies. The group used malicious documents purporting to be a report from an expert at the National Defense University of Ukraine. | Confirmation https://cert.gov.ua/article/4905718 | Agencies in the Ukrainian government who collaborate with National Defense University of Ukraine | Russian Federation | Espionage | Government, Military | https://cert.gov.ua/article/4905718 | null | null |
Targeting of the Technion, the Israeli Institute of Technology | 2023-03-07 | MuddyWater | Iranian threat actor MuddyWater launched a ransomware attack against the Technion in February 2023, forcing the school to delay its final exams by several days. | Unknown | Technion, Israeli Institute of Technology | Iran (Islamic Republic of) | Financial Theft | Civil society | https://therecord.media/israel-technion-ransomware-attack-iran-darkbit-muddywater | null | null |
Targeting of PaperCut MF and NG print management servers by an Islamic Revolutionary Guard Corps–affiliated actor | 2023-05-08 | Charming Kitten | Charming Kitten targeted vulnerabilities in PaperCut MF and NG print management servers with ransomware. | Unknown | Organizations using PaperCut MF and NG print management servers | Iran (Islamic Republic of) | Financial Theft | Private sector | https://www.bleepingcomputer.com/news/security/microsoft-iranian-hacking-groups-join-papercut-attack-spree/?web_view=true | https://archive.ph/X3h3F | null |
SideWinder | 2023-02-15 | Believed to be affiliated with the Indian government. | SideWinder is an Indian threat actor that has been active since at least 2012. The group primarily operates espionage campaigns but has been observed launching attacks that appear financially motivated. | Unknown | Government and military organizations in Afghanistan, Bhutan, Myanmar, Nepal, and Sri Lanka. | India | Espionage | Government, Military | https://www.group-ib.com/blog/hunting-sidewinder/ | null | null |
Targeting of Russian iPhone users | 2023-06-01 | Attributed by Russian security services to the U.S. National Security Agency | Russian security services accused the U.S. National Security Agency of planting malware on thousands of Apple devices throughout the country. Researchers at Kaspersky also said that executives at their company were targeted as part of the campaign, although they did not attribute it to any country. | Unknown | Members of the Russian government and employees of the cybersecurity company Kaspersky | United States | Espionage | Government, Private sector | https://www.washingtonpost.com/technology/2023/06/01/russia-iphone-hack-kaspersky/ | https://safe-surf.ru/specialists/news/693258/ | https://usa.kaspersky.com/blog/triangulation-attack-on-ios/28444 |
Targeting of Ukrainian government authorities | 2023-02-01 | Gamaredon | Gamaredon, a Russian threat actor group, targeted Ukrainian government authorities. The group used spear-phishing emails to gain initial access and deployed surveillance malware on affected systems. | Confirmation https://scpc.gov.ua/api/docs/19b0a96e-8c31-44bf-863e-cd3e0b651f22/19b0a96e-8c31-44bf-863e-cd3e0b651f22.pdf | Ukrainian government organizations and critical infrastructure facilities, as well as defense, security, and law enforcement agencies | Russian Federation | Espionage | Government | https://scpc.gov.ua/api/docs/19b0a96e-8c31-44bf-863e-cd3e0b651f22/19b0a96e-8c31-44bf-863e-cd3e0b651f22.pdf | null | null |
Targeting of high-profile government, aviation, energy, telecoms and banking-sector entities in the Middle East and North Africa | 2023-04-27 | MuddyWater | MuddyWater ran a phishing campaign that likely began in July 2021 against high-profile government, aviation, banking-sector, energy, and telecommunications entities in the Middle East and North Africa. | Unknown | High-profile government, aviation, energy, telecommunications companies and banking-sector entities in Armenia, Azerbaijan, Bahrain, Canada, Egypt, Israel, Jordan, Kuwait, Malaysia, Saudi Arabia, Syria, Turkey, and the United Arab Emirates | Iran (Islamic Republic of) | Espionage | Government, Private sector, Civil society | https://securelist.com/apt-trends-report-q1-2023/109581/#:~:text=We%20have%20identified,Armenia%20and%20Malaysia | null | null |
Targeting of Ukrainian email servers | 2023-06-16 | APT 28 | APT 28, a Russian threat actor, used spear-phishing lures to gain a hold on Ukrainian government and military email servers and then attempted to expand access to the broader email network. The campaign has been active since at least November 2021. | Unknown | Agencies in the Ukrainian government and military who operate Roundcube email servers | Russian Federation | Espionage | Government, Military | https://www.recordedfuture.com/bluedelta-exploits-ukrainian-government-roundcube-mail-servers | null | null |
Targeting of Mexican journalists and human rights advocates | 2023-03-07 | Believed to be the work of a Mexican intelligence agency. | Documents leaked from the Mexican government detail how the Military Intelligence Center, a department within Mexico’s intelligence agency, deployed spyware against three Mexican journalists and Raymundo Ramos, a human rights advocate in the country, between 2019 and 2021. | Unknown | Three journalists and Raymundo Ramos, a human rights advocate in Mexico | Mexico | Espionage | null | https://www.nytimes.com/2023/03/07/world/americas/mexico-military-surveillance.html | null | null |
Targeting of PaperCut MF and NG print management servers by a Ministry of Intelligence and Security–affiliated actor | 2023-05-08 | MuddyWater | MuddyWater targeted vulnerabilities in PaperCut MF and NG print management servers with ransomware. | Unknown | Organizations using PaperCut MF and NG print management servers | Iran (Islamic Republic of) | Financial Theft | Private sector | https://www.bleepingcomputer.com/news/security/microsoft-iranian-hacking-groups-join-papercut-attack-spree/?web_view=true | https://archive.ph/X3h3F | null |
Targeting of organizations of strategic interest to the Chinese government | 2023-03-30 | WInnti Umbrella | Winnti Umbrella, a Chinese state-sponsored threat actor, is continuing to target organizations of interest to the Chinese government (including government, media, and information technology organizations). The group was using Keyplug, a Linux version of the custom modular backdoor, to gain access to victims’ networks, exfiltrating information in line with espionage operations. | Unknown | Aviation, automotive, education, government, media, information technology, and religious organizations | China | Espionage | Government, Civil society, Private sector | https://www.recordedfuture.com/with-keyplug-chinas-redgolf-spies-on-steals-from-wide-field-targets | https://www.mandiant.com/resources/blog/apt41-us-state-governments | null |
Targeting of Taiwanese government and critical infrastructure operators | 2023-06-02 | Emissary Panda | Threat researchers discovered command-and-control infrastructure used by Emissary Panda to coordinate a campaign against Taiwanese government entities and critical infrastructure providers. | Unknown | Taiwanese government agencies and critical infrastructure providers | China | Espionage | Government, Private sector | https://blog.eclecticiq.com/chinese-threat-actor-used-modified-cobalt-strike-variant-to-attack-taiwanese-critical-infrastructure | null | null |
Targeting of an Indian medical research organization and technology and energy sectors | 2023-02-02 | Lazarus Group | Lazarus Group targeted an Indian health-care organization, a technology manufacturer, and the chemical engineering department of a leading research university. The campaign’s goal appeared to be collecting intelligence on major Indian industries.
| Unknown | An Indian medical research organization, technology manufacturer, and university | Korea (Democratic People's Republic of) | Espionage | Private sector, Civil society | https://labs.withsecure.com/publications/no-pineapple-dprk-targeting-of-medical-research-and-technology-sector | null | null |
Targeting of manufacturing and real-estate sectors in India and telecommunications companies in Bulgaria and Pakistan | 2023-04-27 | Lazarus Group | A Lazarus Group campaign, active from early 2020 until January 2023, leveraged a backdoored UltraVNC client against manufacturing and real-estate sectors in India and telecommunications companies in Pakistan and Bulgaria. The goal of the operation, whose scope extends beyond Bulgaria, India, and Pakistan, appears to be intelligence collection. | Unknown | Manufacturing and real-estate sectors in India and telecommunications companies in Bulgaria and Pakistan | Korea (Democratic People's Republic of) | Espionage | Private sector, Civil society | https://securelist.com/apt-trends-report-q1-2023/109581/#:~:text=We%20observed%20a,countries%20and%20sectors | null | null |
Targeting of government organizations in Eastern Europe and Western Asia | 2023-06-14 | Mustang Panda | Mustang Panda targeted government and civil-society networks in at least nine countries— including the United States, Greece, Japan, and the United Kingdom—with several new malware droppers. | Unknown | Government and civil-society groups in the United States, Estonia, Finland, Greece, Japan, Latvia, Taiwan, and Turkey | China | Espionage | Government, Civil society | https://www.trendmicro.com/en_us/research/23/f/behind-the-scenes-unveiling-the-hidden-workings-of-earth-preta.html | null | null |
Targeting of infrastructure projects in Indonesia, Thailand, and Vietnam | 2023-03-08 | Believed to be the work of the Chinese government | A Chinese threat actor was detected targeting the strategic infrastructure projects of government organizations in Indonesia, Thailand, and Vietnam. Active since late 2022, the campaign uses spear-fishing emails for initial access and deploys the Soul malware framework once inside the network. | Unknown | Infrastructure projects in Indonesia, Thailand, and Vietnam | China | Espionage | Government | https://research.checkpoint.com/2023/pandas-with-a-soul-chinese-espionage-attacks-against-southeast-asian-government-entities/ | null | null |
Targeting of Pakistani government officials and networks in Turkey | 2023-05-08 | SideWinder | SideWinder, an Indian APT, distributed spear-phishing lures to various Pakistani government officials. The lures were primarily related to the Pakistani military or U.S.-Pakistan relations. After the initial campaign against Pakistan was detected, the group used the same group of command-and-control servers to launch payloads in Turkey. The group’s targets in Turkey remain unclear. | Unknown | Pakistani government officials and computers in Turkey | India | Espionage | Government | https://blogs.blackberry.com/en/2023/05/sidewinder-uses-server-side-polymorphism-to-target-pakistan | null | null |
Targeting of Ukrainian organizations with old cybercrime malware | 2023-01-05 | Turla | A Russian threat actor, Turla, used defunct command and control website domains to reactivate dormant backdoors installed before 2013 by criminal hackers. Turla then downloaded new information-stealing malware on the infected networks to identify whether they would be valuable for espionage. | Unknown | Ukrainian organizations | Russian Federation | Espionage | Private sector | https://www.mandiant.com/resources/blog/turla-galaxy-opportunity | null | null |
Targeting of experts in North Korea policy issues | 2023-04-05 | Kimsuky | In a recent phishing campaign, North Korean threat actor Kimsuky posed as media outlets and think tanks and requested interviews or information about North Korea. The emails contained malicious links redirecting to fake login pages that harvested user credentials. | Unknown | Government and military personnel, think tanks, policymakers, academics, and researchers in South Korea and the United States | Korea (Democratic People's Republic of) | Espionage | Government, Civil society, Private sector | https://blog.google/threat-analysis-group/how-were-protecting-users-from-government-backed-attacks-from-north-korea/ | https://thehackernews.com/2023/04/google-tag-warns-of-north-korean-linked.html | null |
Targeting of Islamic State group militants in Iraq | 2023-06-04 | Australian Signals Directorate | In 2016, Australian operators deployed the tool Light Bolt against Islamic State militants in coordination with an offensive to retake Mosul, Iraq. Light Bolt was designed to deny Islamic State militants internet access and was used to disrupt communications in coordination with ground forces attempting to retake Mosul. | Unknown | Islamic State militants operating around the city of Mosul | Australia | Sabotage | Military | https://www.abc.net.au/news/2023-06-05/australian-cyber-spies-disrupted-islamic-state-militants/102425324 | null | null |
Targeting of Scottish National Party member of Parliament (MP) | 2023-02-08 | Calisto | Russia-backed threat actor Calisto is believed to be behind a spear-phishing attack on the email accounts of Stewart McDonald, a Scottish National Party MP, and a member of his staff. McDonald said he worried the Russian government planned to leak the emails it stole, although as of March 28, 2023, none have been made public. | Denouncement https://www.theguardian.com/politics/2023/feb/08/scottish-mp-stewart-mcdonald-emails-hacked-russia-linked-group | Stewart McDonald, a Scottish National Party MP and staff member | Russian Federation | Doxing | Government | https://www.theguardian.com/politics/2023/feb/08/scottish-mp-stewart-mcdonald-emails-hacked-russia-linked-group | null | null |
Targeting Linux systems in Nepal and South Africa | 2023-04-28 | Gallium | Chinese threat actor Gallium is using a new variant of the PingPull malware to target the Linux systems of finance, government, and telecommunications organizations across Africa, Europe, and Southeast Asia. | Unknown | Finance, government, and telecommunications organizations across Africa, Europe, and Southeast Asia | China | Espionage | Civil society, Government, Private sector | https://unit42.paloaltonetworks.com/alloy-taurus/ | https://cyware.com/news/alloy-taurus-apt-spotted-using-pingpull-and-a-new-backdoor-to-target-linux-users-30399251 | null |
Targeting of European diplomatic entities | 2023-03-15 | The Dukes | Russian threat group the Dukes ran a spear-phishing campaign against diplomatic entities and systems that were transmitting sensitive information about regional politics, aiding Ukrainian citizens fleeing the country, and helping the government of Ukraine. | Unknown | European diplomatic entities and information systems | Russian Federation | Espionage | Government | https://blogs.blackberry.com/en/2023/03/nobelium-targets-eu-governments-assisting-ukraine | null | null |
Targeting of government networks with Snake malware | 2023-05-09 | Turla | The FBI said it had disrupted a malware network, Snake, run by Turla, a unit within Russia’s Federal Security Service (FSB). Snake had been operational for almost twenty years and had been placed on computers in over fifty countries, including the United States and Russia. The U.S. operation disabled Turla’s Snake malware using a tool that propagated itself across the network of devices compromised by Snake and prompted the FSB’s malware to overwrite its own vital components. | Hack Back https://www.justice.gov/opa/pr/justice-department-announces-court-authorized-disruption-snake-malware-network-controlled | Organizations in over fifty countries, including the United States, Australia, Russia, and members of the European Union | Russian Federation | Espionage | Government, Military, Private sector, Civil society | https://www.justice.gov/opa/pr/justice-department-announces-court-authorized-disruption-snake-malware-network-controlled | https://www.wired.com/story/turla-history-russia-fsb-hackers/ | https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-129a |
Calisto | 2023-01-06 | Also known as Cold River, Seaborgium, TA446, TAG-53 | Calisto is a Russian government-affiliated threat actor. The group uses spear-phishing tactics to compromise individual email accounts for espionage purposes. The group has also been known to leak stolen emails as part of information-warfare efforts. | Confirmation https://www.ncsc.gov.uk/news/spear-phishing-campaigns-targets-of-interest | Politicians and organizations in the United States, United Kingdom, and Europe. | Russian Federation | Espionage | Private sector, Civil society, Government | https://www.microsoft.com/en-us/security/blog/2022/08/15/disrupting-seaborgiums-ongoing-phishing-operations/ | https://www.ncsc.gov.uk/news/spear-phishing-campaigns-targets-of-interest | https://www.recordedfuture.com/exposing-tag-53-credential-harvesting-infrastructure-for-russia-aligned-espionage-operations |
Targeting of Indian education sector | 2023-04-13 | APT 36 | Pakistani state-backed group APT 36 targeted entities in the Indian education sector with education-themed documents that contained Crimson RAT malware. | Unknown | Educational institutions and students in India | Pakistan | Espionage | Civil society | https://www.sentinelone.com/labs/transparent-tribe-apt36-pakistan-aligned-threat-actor-expands-interest-in-indian-education-sector/ | null | null |
Targeting of analysts of North Korean affairs | 2023-06-06 | Kimsuky | Kimsuky used social engineering techniques to deploy ReconShark malware against former South Korean government officials and researchers focused on North Korean affairs. The group focused on expanding access to affected systems and stealing subscriptions to the North Korea-focused news website NKNews. | Unknown | Researchers focused on North Korean affairs | Korea (Democratic People's Republic of) | Espionage | Civil society | https://www.sentinelone.com/labs/kimsuky-new-social-engineering-campaign-aims-to-steal-credentials-and-gather-strategic-intelligence/ | null | null |
Targeting of dissidents and opposition political candidates in Ghana | 2022-01-20 | Believed to be the work of Ghana's government | The Israeli spyware firm NSO Group sold Pegasus spyware to the government of Ghana, which used the tools to spy on political opponents and dissidents. Ghana's intelligence agency launched an investigation into the spyware allegations. NSO Group has claimed that although Ghana bought the spyware, it was never actually used in the country. | Denial https://www.haaretz.com/israel-news/tech-news/nso-ghana-op-exposed-never-before-seen-pegasus-spyware-footage-workers-passports-1.10553725 | Political dissidents and opposition leaders in Ghana | Ghana | Espionage | Civil society | https://www.haaretz.com/israel-news/tech-news/2022-01-20/ty-article/nso-ghana-op-exposed-never-before-seen-pegasus-spyware-footage-workers-passports/0000017f-f1fb-df98-a5ff-f3ffb9a20000 | null | null |
Targeting of Ukrainian state entities | 2022-03-07 | UNC1151 | The Belarusian threat actor UNC1151 targeted multiple Ukrainian government agencies with a backdoor called MicroBackdoor. The malware was delivered via phishing emails that included a bait image and files containing malicious code. The backdoor and loader were created in January 2022, before Russia’s invasion of Ukraine. | null | Ukrainian state entities | Belarus | Espionage | Government | https://cert.gov.ua/article/37626 | null | null |
Targeting of Russian and Belarusian websites | 2022-05-04 | Ukrainian IT Army | Ukraine’s IT Army compromised Docker Engine honeypots in an attempt to execute distributed denial-of-service (DDoS) attacks against Russian and Belarusian websites. | null | Russian and Belarusian websites were targeted, including those belonging to government, military, media, finance, energy, retail, mining, manufacturing, chemicals, production, technology, advertisements, agriculture, transportation, and political parties. | Ukraine | Denial of service | Government, Private sector, Civil society | https://www.crowdstrike.com/blog/compromised-docker-honeypots-used-for-pro-ukrainian-dos-attack/ | null | null |
Targeting of the Belgian Federal Public Service Interior in Chinese espionage campaign | 2022-07-18 | Zirconium | Chinese threat actors targeted the Belgian Federal Public Service Interior as part of a wide-ranging cyberespionage campaign involving multiple threat actors. Belgian authorities condemned the activity. | Denouncement https://diplomatie.belgium.be/en/news/declaration-minister-foreign-affairs-malicious-cyber-activities | Belgian Federal Public Service Interior | China | Espionage | Government | https://diplomatie.belgium.be/en/news/declaration-minister-foreign-affairs-malicious-cyber-activities | https://www.bleepingcomputer.com/news/security/belgium-says-chinese-hackers-attacked-its-ministry-of-defense/ | null |
Targeting of Ukrainian government agencies | 2022-08-11 | Gamaredon | The Computer Emergency Response Team of Ukraine found that Gamaredon had been breaking into Ukrainian government email accounts.
| Confirmation | Ukrainian government agencies | Russian Federation | Espionage | Government | https://cert.gov.ua/article/2681855 | null | null |
Targeting of Palestinian entities and activists | 2022-02-02 | APT-C-23 | The Hamas-linked threat actor APT-C-23 used malware embedded in politically themed decoy files and documents to install backdoors on the systems of targeted Palestinian individuals and organizations. | null | null | null | Espionage | Civil society | https://www.cyberscoop.com/palestinian-targeted-arid-viper-hamas/ | https://blog.talosintelligence.com/2022/02/arid-viper-targets-palestine.html | null |
Targeting of government agencies in the European Union | 2022-04-05 | Gamaredon | Russian threat actor Gamaredon targeted Ukrainian organizations in a phishing campaign. The hackers sent malicious emails with lures related to the Russia-Ukraine conflict, including attachments labeled “Information on war criminals of the Russian Federation” and “Necessary_military_assistance.” The emails contained malware which allowed Russian operators to conduct espionage. | Confirmation https://cert.gov.ua/article/39086 | Government agencies of EU member states | Russian Federation | Espionage | Government | https://www.bleepingcomputer.com/news/security/ukraine-spots-russian-linked-armageddon-phishing-attacks/ | null | null |
Targeting of Rostec | 2022-05-19 | Believed to be the work of the Chinese government | A Chinese threat actor targeted two research institutes run by Rostec, a major Russian state-owned defense conglomerate. The attackers used spear-phishing lures to plant malware and steal data on Russian radar and electronic warfare capabilities. | null | Two research institutes run by Rostec | China | Espionage | Government | https://blog.checkpoint.com/2022/05/19/twisted-panda-check-point-research-unveils-a-chinese-apt-espionage-campaign-against-russian-state-owned-defense-institutes/ | null | null |
Targeting of Albanian government | 2022-08-04 | Believed to be the work of the Iranian government | Iranian threat actors targeted Albanian government networks with ransomware. The attack appears to have been motivated by Albania’s hosting a conference for the People’s Mojahedin Organization of Iran, a group previously listed as a terrorist organization by the European Union (EU) and United States and dedicated to opposing the Iranian regime. | Denouncement https://twitter.com/JasonMBrodsky/status/1567465232083165184?s=20&t=nJqgodp_ASXIZWex6LR3Ig | Albanian government networks | Iran (Islamic Republic of) | Data destruction | Government | https://www.mandiant.com/resources/blog/likely-iranian-threat-actor-conducts-politically-motivated-disruptive-activity-against?1= | https://www.cisa.gov/uscert/ncas/alerts/aa22-264a | null |
Targeting of users of cryptocurrency applications | 2022-12-03 | Lazarus Group | North Korean hacking group Lazarus created a fake brand called BloxHolder to spread fake cryptocurrency apps that would infect users with AppleJeus malware to steal money and cryptocurrency. The campaign was active from June to at least October 2022.
| Unknown | Cryptocurrency applications | Korea (Democratic People's Republic of) | Financial Theft | Private sector | https://www.volexity.com/blog/2022/12/01/buyer-beware-fake-cryptocurrency-applications-serving-as-front-for-applejeus-malware/ | https://www.bleepingcomputer.com/news/security/hackers-use-new-fake-crypto-app-to-breach-networks-steal-cryptocurrency/ | null |
Targeting of VMWare Horizon servers with Log4Shell vulnerability | 2022-02-18 | APT 35 | The Iranian threat actor APT 35 leveraged the Log4Shell vulnerability to run malicious PowerShell commands, deploy backdoors, steal credentials, and move laterally through systems. | null | VMware Horizon servers | Iran (Islamic Republic of) | Espionage | Private sector | https://www.sentinelone.com/labs/log4j2-in-the-wild-iranian-aligned-threat-actor-tunnelvision-actively-exploiting-vmware-horizon/ | https://www.bleepingcomputer.com/news/security/iranian-hackers-target-vmware-horizon-servers-with-log4j-exploits/ | null |
Targeting of cryptocurrency company employees | 2022-04-19 | Lazarus Group | North Korean hackers targeted cryptocurrency company employees in a phishing campaign to access systems and make fraudulent trades. Lazarus sent mass emails with job offers embedded with malicious links. When victims clicked, their devices downloaded TraderTraitor malware, which enabled the hackers to execute commands and infiltrate company networks to make fraudulent blockchain transactions. | Confirmation https://www.cisa.gov/uscert/ncas/alerts/aa22-108a | Cryptocurrency company employees | Korea (Democratic People's Republic of) | Financial Theft | Private sector | https://www.cisa.gov/uscert/ncas/alerts/aa22-108a | https://www.cyberscoop.com/tradertraitor-malware-warning-cisa-lazarus-group-north-korea/ | null |
Targeting of individual suspects in serious criminal investigations within Canada | 2022-06-29 | Believed to be the work of the Canadian government | The Royal Canadian Mounted Police (RCMP) has confirmed that it uses spyware to infiltrate the mobile devices of suspects in highly sensitive criminal and national security investigations. From 2018 to 2020, the RCMP said it used spyware in ten investigations. | null | Individual suspects within Canadian police investigations. | Canada | Espionage | Civil society | https://www.politico.com/news/2022/06/29/canada-national-police-spyware-phones-00043092 | null | null |
Targeting of Ukrainian government agencies in espionage campaign | 2022-09-15 | Gamaredon | Gamaredon, a Russian threat actor, was found using newly developed malware to steal information from Ukrainian government agencies. The malware was distributed through a phishing campaign. | Unknown | Ukrainian government agencies | Russian Federation | Espionage | Government | https://blog.talosintelligence.com/2022/09/gamaredon-apt-targets-ukrainian-agencies.html | null | null |
Targeting of U.S. National Laboratories | 2022-12-06 | Calisto | In July 2022, Calisto targeted scientists at the Brookhaven National Laboratory with a fake login page to steal credentials. The hackers appear to have used the harvested credentials to access documents related to counter-proliferation and nuclear accountability in Russia and other states. | Unknown | Scientists at the Brookhaven National Laboratory | Russian Federation | Espionage | Government | https://www.pwc.com/gx/en/issues/cybersecurity/cyber-threat-intelligence/blue-callisto-orbits-around-us.html | null | null |
Targeting of Israeli activist | 2022-01-20 | Believed to be the work of Israel's government. | The Israeli government used the NSO Group's spyware tool Pegasus to spy on an Israeli activist. The authorities allegedly catalogued his activity on a dating site for use as future leverage. | Denial https://www.calcalistech.com/ctech/articles/0%2C7340%2CL-3927606%2C00.html | An activist in Israel | Israel | Espionage | Civil society | https://www.calcalistech.com/ctech/articles/0%2C7340%2CL-3927606%2C00.html | null | null |
Targeting of Ukrainian government and information technology (IT) sector systems with WhisperGate malware | 2022-01-15 | Nodaria | The Russian Army’s Main Intelligence Directorate (the GRU) used WhisperGate wiper malware on Ukrainian systems on January 13, 2022. The wiper masqueraded as ransomware, offering victims the chance to decrypt their data for a fee, while in reality, the malware wiped the system. The wiper was found on systems throughout Ukraine, including the foreign ministry and networks used by the Ukrainian cabinet. | Unknown | Ukrainian government and IT sector systems | Russian Federation | Data destruction | Government | https://www.microsoft.com/security/blog/2022/01/15/destructive-malware-targeting-ukrainian-organizations/ | https://query.prod.cms.rt.microsoft.com/cms/api/am/binary/RE4Vwwd | null |
Targeting of Belgian Defense Ministry | 2022-07-18 | Gallium | Chinese threat actors targeted the Belgian Defense Ministry as part of a wide-ranging cyberespionage campaign involving multiple threat actors, which also targeted the Interior Service. Belgian authorities condemned the activity. | Denouncement https://diplomatie.belgium.be/en/news/declaration-minister-foreign-affairs-malicious-cyber-activities | Belgian Defense Ministry | China | Espionage | Military | https://diplomatie.belgium.be/en/news/declaration-minister-foreign-affairs-malicious-cyber-activities | null | null |
Targeting of Uyghur populations | 2022-11-10 | Mirage | Chinese-affiliated threat actor APT 15 led a mobile surveillance campaign against Uyghurs in China and abroad using BadBazaar malware masquerading as Android apps. | Unknown | Members of the Uyghur ethnic group | China | Espionage | Civil society | https://www.lookout.com/blog/uyghur-surveillance-campaign-badbazaar-moonshine | null | null |
Targeting of Jordanian activists | 2022-04-05 | Believed to be the work of the Jordanian government | The devices of at least four Jordanian human rights activists, lawyers, and journalists were infected with NSO Group’s Pegasus spyware between August 2019 and December 2021. Two Pegasus operators involved in the incident, named Mansaf and BlackIris, are likely connected to agencies of the Jordanian government. | null | Four Jordanian human rights defenders, lawyers, and journalists | Jordan | Espionage | Civil society | https://citizenlab.ca/2022/04/peace-through-pegasus-jordanian-human-rights-defenders-and-journalists-hacked-with-pegasus-spyware/ | null | null |
Targeting of Tibetans living abroad | 2022-06-01 | Lucky Cat | A Chinese threat actor was found using a zero-day vulnerability, dubbed Follina, in Microsoft Office products to distribute zero-click malware. The attackers used Follina to target Tibetan organizations and Tibetans living abroad with malware. | null | Tibetan organizations and Tibetans living abroad | China | Espionage | Civil society | https://www.bleepingcomputer.com/news/security/windows-msdt-zero-day-now-exploited-by-chinese-apt-hackers/ | https://techcrunch.com/2022/06/01/china-backed-hackers-are-exploiting-unpatched-microsoft-zero-day/ | null |
Targeting of Australian, Malaysian, and European organizations and organizations operating in and around the South China Sea. | 2022-08-30 | APT 40 | APT 40 launched an espionage campaign targeting Australian, European, and Asian organizations involved in maintaining and producing wind turbines in the South China Sea, as well as Malaysian organizations working in the Kasawari gas field. | Unknown | Australian, Canadian, German, Japanese, Norwegian, Swedish, and Taiwanese organizations involved in wind turbine maintenance and production, as well as Malaysian oil and gas refineries. | China | Espionage | Government, Private sector | https://www.proofpoint.com/us/blog/threat-insight/chasing-currents-espionage-south-china-sea | https://www.bleepingcomputer.com/news/security/chinese-hackers-target-australian-govt-with-scanbox-malware/ | https://therecord.media/china-linked-hackers-target-organizations-operating-in-south-china-sea/ |
Targeting of Latvian, Lithuanian, and Ukrainian computer systems | 2022-02-23 | Sandworm | Russian threat actors targeted computer systems in Latvia, Lithuania, and Ukraine with a wiper dubbed HermeticWiper. The malware was aimed at Windows devices, corrupting systems’ master boot records, displaying signs of ransomware as a decoy, and destroying stored data. This followed another wiper attack aimed at Ukraine in January. | null | Latvian, Lithuanian, and Ukrainian computer systems owned by banks and government contractors, as well as systems used by the defense, aviation, and IT sectors | Russian Federation | Data destruction | Government, Civil society | https://www.cisa.gov/uscert/ncas/alerts/aa22-057a | https://www.sentinelone.com/labs/hermetic-wiper-ukraine-under-attack/ | https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/ukraine-wiper-malware-russia |
Targeting of journalists reporting on North Korea | 2022-04-21 | APT 37 | North Korea–linked threat actor APT 37 targeted journalists with novel Goldbackdoor malware. APT 37 initially used RokRat malware to hack the email account of a former director at South Korea’s National Intelligence Service. The hackers then impersonated the official and targeted South Korean journalists, sending emails laced with Goldbackdoor malware. The malware can be used to steal passwords and documents. | null | Journalists and the former director of South Korea’s National Intelligence Service | Korea (Democratic People's Republic of) | Espionage | Civil society | https://stairwell.com/news/threat-research-the-ink-stained-trail-of-goldbackdoor/ | https://www.nknews.org/2022/04/north-korean-hackers-steal-ex-intelligence-officials-emails-in-malware-attack/ | null |
Targeting of UN Interim Force in Lebanon (UNIFIL) | 2022-06-29 | Believed to be the work of the Iranian government | The Israeli defense minister has accused Iran and Hezbollah of attempting a cyberattack against the UNIFIL to steal information about its activities within southern Lebanon. | Confirmation https://www.timesofisrael.com/gantz-says-iran-and-hezbollah-attempted-to-hack-unifil-steal-deployment-infomation/ | UN peacekeeping force in Lebanon | Iran (Islamic Republic of) | Espionage | Civil society, Military | https://www.timesofisrael.com/gantz-says-iran-and-hezbollah-attempted-to-hack-unifil-steal-deployment-infomation/ | null | null |
Targeting of Ukrainian networks via fake telecommunications firms | 2022-09-19 | Sandworm | A Russian threat actor masqueraded as a Ukrainian telecommunications firm in order to gain access to other networks in Ukraine, both through spear-phishing and malicious public domains. | Unknown | Ukrainian telecommunications infrastructure and other firms | Russian Federation | Espionage | Private sector, Government | https://www.recordedfuture.com/russia-nexus-uac-0113-emulating-telecommunication-providers-in-ukraine | null | null |
Targeting of organizations supporting Ukraine | 2022-12-06 | Calisto | As part of a phishing campaign, Calisto targeted NATO-affiliated military and strategic research institutes, a Ukraine-based defense contractor, and former intelligence officials and Russia experts who were working at nongovernmental organizations. | Unknown | Six private companies in the United States and Eastern Europe and four nongovernmental organizations | Russian Federation | Espionage | Civil society, Private sector | https://blog.sekoia.io/calisto-show-interests-into-entities-involved-in-ukraine-war-support/ | null | null |
Targeting of local Israeli officials | 2022-01-23 | Believed to be the work of Israel's government | The signals intelligence unit of the Israeli police is suspected of using Pegasus spyware to surveil local officials and their families in Israel. The warrantless surveillance conducted with Pegasus was used to inform later prosecutions for bribery, some of which were dismissed in court for lack of evidence. The police attempted to cover up evidence that they had used Pegasus in the investigations. | Unknown | Mayors and other local officials in Israel. | Israel | Espionage | Government | https://www.calcalistech.com/ctech/articles/0%2C7340%2CL-3927704%2C00.html | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.