#APT27

Miguel Afonso Caetanoremixtures@tldr.nettime.org
2025-03-06

"The Department of Justice has announced criminal charges against 12 Chinese government-linked hackers who are accused of hacking more than 100 American organizations, including the U.S. Treasury, over the course of a decade.

The charged individuals all played a “key role” in China’s hacker-for-hire ecosystem, a senior DOJ official said on a background call with reporters, including TechCrunch, on Wednesday. The official added that those charged, which includes contract hackers and Chinese law enforcement officials, targeted organizations in the U.S. and worldwide for the purposes of “suppressing free speech and religious freedoms.”

The DOJ also confirmed that two of the indicted individuals are linked to the China government-backed hacking group APT27, or Silk Typhoon."

techcrunch.com/2025/03/05/just

#USA #CyberSecurity #DoJ #China #StateHacking #APT27 #SilkTyphoon

2025-03-06

🚨 U.S. charges 12 in a Chinese Hacker-for-Hire Network linked to cyber attacks on governments & media. DOJ offers a $10M reward for info!

Read: hackread.com/us-charges-12-in-

#CyberSecurity #Hacking #APT27 #CyberCrime #China

kcnickersonkcnickerson
2025-02-13

that thing, when you're "Zero Trust Access by Cisco", is strangely ironic. i'd take a PIX of all the hacks over the decades, but don't have a 360 lens ;> @wired @Cisco wired.com/story/chinas-salt-ty

2024-08-15

EastWind campaign: new CloudSorcerer attacks on government organizations in Russia
#APT31 #PlugY #APT27
securelist.com/eastwind-apt-ca

2023-05-02

The slides botconf.eu/wp-content/uploads/ and video youtube.com/watch?v=713CsmcNE3 of my #Botconf talk about #IronTiger TTPs are online. I discuss recent infection vectors (including a supply chain attack), the evolution of their malware toolkit and targeting, and explain how we attributed these campaigns to #IronTiger #APT27 #APT threat actor

scheme showing requests from an infected victim to a C&C controlled by the attackerSome statistics about the infrastructure of the threat actorThird-Party reports linked to this threat actor that shows a larger targeting than what we saw in our telemetryScheme explaining the different links we found to attribute this campaign to Iron Tiger
Opalsec :verified:Opalsec@infosec.exchange
2023-03-05

Last week's reporting gave a great insight into the level of innovation going on in the cyber crime ecosystem - C2 over MQTT, cryters delivering payloads over SQL connections, and UEFI bootkits that bypass Window's Secure Boot! We've pulled it all together, just for you:

opalsec.substack.com/p/soc-gou

The BlackLotus #Bootkit has been upgraded to exploit a vulnerability in Microsoft's Secure Boot Mechanism, allowing it to persist on fully patched Windows 11 systems. This is enabled in no small part by the failure to update the UEFI revocation list, which allowed the bootkit author to simply load and exploit the vulnerable UEFI components on target systems.

Australia's cyber security laws were "bloody useless" in helping mitigate the Optus and Medibank breaches of 2022, according to the government's Home Affairs Minister. A new "national cyber office", reforms to Critical Infrastructure security laws, and a new Cyber Security Act are all on the table for discussion.

zScaler analysts have picked up on the Snip3 crypter, a Crypter-as-a-Sevice offering which uses multiple obfuscated stages; an AMSI Bypass, and SQL queries to circumvent security controls.

Sysdig share insights from a sophisticated #AWS-centric campaign; ESET have uncovered a new backdoor used by China's Mustang Panda (#APT27) which implements C2 over MQTT, and Team Cymru have again picked apart #IcedID's infrastructure to identify key TTPs.

Some interesting supply chain vulnerabilities this week, with bugs found in the ZK web app framework and Trusted Platform Module (TPM) having the potential to affect an untold number of applications and devices.

#Redteam members will get a kick out of DroppedConnection - a PoC that mimics Cisco AnyConnect VPN to siphon credentials and serve up malware to unwitting victims.

The #blueteam can look forward to some tips for GCP DFIR, bypassing malware geo-fencing, and tracking cyber criminal infrastructure.

Catch all this and much more in this week's newsletter:

opalsec.substack.com/p/soc-gou

#infosec #cyber #news #cybernews #infosec #infosecnews #informationsecurity #cybersecurity #hacking #security #technology #hacker #vulnerability #vulnerabilities #malware #ransomware #dfir #soc #threatintel #threatintelligence #DarkWeb #criticalinfrastructure #breach #privacy #Australia #crypter

2023-03-01

My latest #APT research on #IronTiger (#APT27/#EmissaryPanda/#LuckyMouse) is out ! It includes analysis of a new version of SysUpdate ported to Linux, a new communication protocol through DNS TXT requests, a VMProtect certificate compromise, and probable infection vector trendmicro.com/en_us/research/

heise online (inoffiziell)heiseonline@squeet.me
2022-01-26
Das Bundesamt für Verfassungsschutz warnt vor aktuellen Cyberangriffen auf Unternehmen. Es gibt zudem Hinweise zur Erkennung kompromittierter Systeme.
Verfassungsschutz: "Hyperbro"-Angriffskampagne auf deutsche Unternehmen
2021-01-05

Major Gaming Companies Hit with Ransomware Linked to APT27 - Researchers say a recent attack targeting videogaming developers has 'strong links' to the infamou... threatpost.com/ransomware-majo #ransomwareattack #gamingcompanies #cyberattacks #bronzeunion #supplychain #drbcontrol #ransomware #videogames #shellcode #covid-19 #malware #dropbox #winnti #hacks #apt27 #apt

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst