For more than three years, the Global Research and Analysis Team (GReAT) at Kaspersky has been publishing quarterly summaries of advanced persistent threat (APT) activity. The summaries are based on company's threat intelligence research. 

The main trends identified in Q2 2020:

  • Geo-politics remains an important motive for some APT threat actors, as shown in the activities of MuddyWater, the compromise of the Middle East Eye website and the campaigns of CloudComputating and HoneyMyte groups.
  • As is clear from the activities of Lazarus and BlueNoroff, financial gain is another driver for some threat actors – including the use of ransomware attacks.
  • While Southeast Asia continues to be an active region for APT activities, this quarter we have also observed heavy activity by Chinese-speaking groups, including ShadowPad, HoneyMyte, CactusPete, CloudComputating and SixLittleMonkeys.
  • APT threat actors continue to exploit software vulnerabilities – examples this quarter include Hades and MagicScroll.
  • We have noted before that the use of mobile implants is no longer a novelty, and this quarter is no exception, as illustrated by the PhantomLance campaign.
  • It is clear that APT actors, like opportunistic cybercriminals, continue to exploit the COVID-19 pandemic as a theme to lure potential victims. However, we would note once again that this doesn’t represent a shift in TTPs.
Read more

Share:

Added:08.12.2020
Latest update:
09.03.2020

Share:

Similar analytics:MORE similar analytics
Similar news:
Subscribe to get updates

By clicking the button you agree to Privacy Policy

Add your research

Unless otherwise stated, the content is available under Creative Commons BY 4.0 license

Supported by the Moscow Government