鱼周念什么| 病毒感染发烧吃什么药| 做梦遗精是什么原因| 7月15日是什么节| 护肝养肝吃什么好| 女人取环什么时候最好| 尿频是什么意思| 静怡是什么意思| sg是什么意思| 世界屋脊指的是什么| 林彪为什么叛变| 为什么养鱼养单不养双| 纯牛奶可以做什么美食| 盐酸安罗替尼胶囊主要治疗什么| 一个火一个丙念什么| 梦遗是啥意思是什么| 下过海是什么意思| 梦见自己拉屎是什么意思| 天蝎座和什么星座配| 大同有什么好玩的地方| 什么是天珠| 为什么减肥不掉秤| 一库一库雅蠛蝶是什么意思| 吉吉念什么| 逼格是什么意思| 头秃了一块是什么原因| 梦见车丢了是什么意思| 吃什么拉什么完全不能消化怎么办| 什么是人乳头瘤病毒| 来事吃什么水果好| 胃酸反流是什么原因造成| 即兴是什么意思| 正规医院减肥挂什么科| 神经性头疼吃什么药好| 禀报是什么意思| 小郡肝是什么部位| 丙氨酸氨基转移酶是什么| 鼻炎会引起什么症状| rpl是什么意思| 夏天吃什么好| 七月十五有什么忌讳| 单核细胞百分比偏高是什么意思| 梦见狼是什么意思周公解梦| 婴儿大便有泡沫是什么原因| 身上长水泡是什么原因| 老梗是什么病| ck是什么牌子的包包| 口腔异味挂什么科| 法图麦是什么意思| 野格是什么酒| 平行宇宙是什么意思| 茶叶杀青是什么意思| 上焦有火吃什么中成药| 十月十日什么星座| 公顷是什么意思| 宫腔镜是什么| 小孩生日送什么礼物| 炸了是什么意思| pnh是什么病的简称| 肾积水是什么原因| 女人脾肾两虚吃什么好| 肛周脓肿吃什么消炎药| 长鸡眼是什么原因| 婴儿放屁臭是什么原因| diy是什么| 二尾子什么意思| 艾滋病简称什么| 血常规检查什么| 1954属什么生肖| 儿童尿路感染吃什么药| 胃动力不足是什么原因造成的| 离婚要什么手续| 做免疫组化意味什么| 960万平方千米是指我国的什么| 肚子两侧疼是什么原因| 老婆子是什么意思| 一厢情愿是什么意思| 叶公好龙讽刺了什么| 铁树开花什么意思| 满满的回忆什么意思| 九知道指的是什么| 7月28日是什么星座| 空性是什么意思| 卡鱼刺挂什么科| 咽炎雾化用什么药最好| 感统训练是什么| 晚上九点是什么时辰| cva医学上是什么意思| 反将一军什么意思| 脚为什么会痒越抓越痒| 睡觉后腰疼是什么原因引起的| 积劳成疾的疾是什么意思| 经常熬夜喝什么汤好| 八哥吃什么食物| 手为什么会掉皮| 腹部痛是什么原因| 粥样动脉硬化是什么意思| 5月10日是什么星座| 花木兰代表什么生肖| 父亲节什么时间| 是什么符号| 室间隔增厚是什么意思| 妈妈的姐妹叫什么| 早晨起来口苦是什么原因| 身体安康什么意思| apc是什么意思| 山药和淮山有什么区别| 低压低吃什么药| 儿童淋巴结肿大挂什么科| 月经流的是什么血| s牌运动鞋是什么牌子| 阴道口痒用什么药好| 马蜂吃什么| 肌肉代偿是什么意思| 吧可以组什么词| 富士康是做什么的| 6点是什么时辰| 臭虫长什么样子图片| 什么食用油最好最健康| 补办手机卡需要什么| 量贩式ktv是什么意思| 扁桃体化脓是什么原因引起的| 梦见男人是什么意思| 属龙的今年要注意什么| 频繁小便是什么原因| 7月1日是什么星座| 吃避孕药有什么危害| 过山风是什么蛇| 69年鸡是什么命| 低热是什么症状| 牙痛是什么原因| 全腹部ct平扫主要检查什么| 双侧胸膜局限性增厚是什么意思| 肺纤维化有什么症状| 三保是什么| 罗汉果泡水有什么好处| 什么的散步| 什么叫法西斯| 摊手是什么意思| 耳朵里长痘是什么原因| 霉菌性阴道炎用什么栓剂| 月经前乳房胀痛是什么原因| 大土土什么字| 上什么下什么| 为什么会紫外线过敏| 今年88岁属什么生肖| 肝病不能吃什么| 梦到兔子是什么征兆| 胃怕凉怕冷是什么原因| 七月十日是什么日子| 肾湿热吃什么中成药| 金黄金黄的什么| 鼻渊是什么意思| 是什么数学符号| 口蘑是什么| 灵芝是什么| 塞药塞到什么位置| 红斑狼疮是什么引起的| 情形是什么意思| 高晓松为什么进监狱| 扬代表什么生肖| 吃什么能降低尿蛋白| m k是什么牌子| 牙龈炎吃什么消炎药| 柠檬水什么时候喝最好| 老是睡不着觉是什么原因| 舌头发黄是什么病| 呵呵是什么意思啊| 促黄体生成素低说明什么| 城市的夜晚霓虹灯璀璨是什么歌| 油菜花什么颜色| ns什么意思| 什么叫轻食| 物以类聚人以群分什么意思| 轻微脑梗吃什么药| 汗马功劳什么意思| 蛋白粉有什么用| 耳鸣去医院挂什么科| 龙利鱼是什么鱼| 贫血看什么指标| 结肠炎吃什么药最见效| 家有一老如有一宝是什么意思| 可字属于五行属什么| 亚甲炎是什么原因引起的| 日后好相见的前一句是什么| 鳄鱼为什么会流泪| 儿童身份证需要什么材料| 什么是劣药| dha不能和什么一起吃| 大三阳是什么病| 手指肿胀是什么原因| 什么是风热感冒| 咕噜是什么意思| 芋圆是用什么做的| 杀了神经的牙为什么还疼| 肌酐高了会出现什么问题| 安慰是什么意思| 南方的粽子一般是什么口味| 儿童早餐吃什么有营养还能长高| 蛇靠什么爬行| 西瓜什么时候种植| 农历闰月有什么规律| 小孩白细胞高是什么原因| 河北有什么山| 为什么会一直拉肚子| 多吃木瓜有什么好处| 支原体感染是什么症状| 流动人口是什么意思| 指甲有凹陷是什么原因| 脚背发麻是什么原因引起的| 星期一右眼皮跳是什么预兆| 什么人容易得圆锥角膜| 补办身份证需要什么手续| dpoy什么意思| 鸡精是什么做的| 姜红枣红糖一起煮有什么效果| 吃芒果不能吃什么| 油条配什么好吃| art是什么意思| 左侧卵巢囊性结构什么意思| 月经突然停止是什么原因| 熟女是什么意思| 茂密的枝叶像什么| 缓刑什么意思| 阴道清洁度三度什么意思| 澍在人名中读什么| 什么是黄体| 医生是什么生肖| 印第安纹是什么| 脚冰凉吃什么药| 现在是什么时辰| 礼尚往来什么意思| 月经提前量少是什么原因| 活血是什么意思| 临汾有什么大学| 什么气组词| hco3-是什么意思| 和什么相什么| 血热是什么意思| 乌龟王八甲鱼鳖有什么区别| w3是什么意思| 性生活后尿路感染是什么原因| 宝宝吐奶是什么原因| 罗非鱼长什么样| 在什么地方| 这个季节适合种什么蔬菜| 质变是什么意思| 三七草长什么样| 李白字什么号什么| 罗飞鱼是什么鱼| 为什么会拉稀| 陪护是什么意思| 胸部里面有个圆圆的硬东西是什么| 春宵一刻值千金什么意思| 一惊一乍是什么意思| 2027是什么年| 血氧低吃什么药| 前列腺实质回声欠均匀什么意思| 血糖偏高可以吃什么水果| 朱元璋为什么杀李善长| 下家是什么意思| 女性排卵期一般是什么时候| 男左女右是什么意思| 幼儿园报名需要什么资料| 百度Jump to content

数智源(股票代码834297)新三板上市最新公告列表

From Wikipedia, the free encyclopedia
百度 水果熟吃可以促进胡萝卜素的吸收。

An advanced persistent threat (APT) is a stealthy threat actor, typically a state or state-sponsored group, which gains unauthorized access to a computer network and remains undetected for an extended period.[1][2] In recent times, the term may also refer to non-state-sponsored groups conducting large-scale targeted intrusions for specific goals.[3]

Such threat actors' motivations are typically political or economic.[4] Every major business sector has recorded instances of cyberattacks by advanced actors with specific goals, whether to steal, spy, or disrupt. These targeted sectors include government, defense, financial services, legal services, industrial, telecoms, consumer goods and many more.[5][6][7] Some groups utilize traditional espionage vectors, including social engineering, human intelligence and infiltration to gain access to a physical location to enable network attacks. The purpose of these attacks is to install custom malware.[8]

APT attacks on mobile devices have also become a legitimate concern, since attackers are able to penetrate into cloud and mobile infrastructure to eavesdrop, steal, and tamper with data.[9]

The median "dwell-time", the time an APT attack goes undetected, differs widely between regions. FireEye reported the mean dwell-time for 2018 in the Americas as 71 days, EMEA as 177 days, and APAC as 204 days.[5] Such a long dwell-time allows attackers a significant amount of time to go through the attack cycle, propagate, and achieve their objectives.

Definition

[edit]

Definitions of precisely what an APT is can vary, but can be summarized by their named requirements below:

  • Advanced – Operators behind the threat have a full spectrum of intelligence-gathering techniques at their disposal. These may include commercial and open source computer intrusion technologies and techniques, but may also extend to include the intelligence apparatus of a state. While individual components of the attack may not be considered particularly "advanced" (e.g. malware components generated from commonly available do-it-yourself malware construction kits, or the use of easily procured exploit materials), their operators can typically access and develop more advanced tools as required. They often combine multiple targeting methods, tools, and techniques in order to reach and compromise their target and maintain access to it. Operators may also demonstrate a deliberate focus on operational security that differentiates them from "less advanced" threats.[3][10][11]
  • Persistent – Operators have specific objectives, rather than opportunistically seeking information for financial or other gain. This distinction implies that the attackers are guided by external entities. The targeting is conducted through continuous monitoring and interaction in order to achieve the defined objectives. It does not mean a barrage of constant attacks and malware updates. In fact, a "low-and-slow" approach is usually more successful. If the operator loses access to their target they usually will reattempt access, and most often, successfully. One of the operator's goals is to maintain long-term access to the target, in contrast to threats who only need access to execute a specific task.[10][12]
  • Threat – APTs are a threat because they have both capability and intent. APT attacks are executed by coordinated human actions, rather than by mindless and automated pieces of code. The operators have a specific objective and are skilled, motivated, organized and well funded. Actors are not limited to state sponsored groups.[3][10]

History and targets

[edit]

Warnings against targeted, socially-engineered emails dropping trojans to exfiltrate sensitive information were published by UK and US CERT organisations in 2005. This method was used throughout the early 1990s and does not in itself constitute an APT. The term "advanced persistent threat" has been cited as originating from the United States Air Force in 2006[13] with Colonel Greg Rattray cited as the individual who coined the term.[14]

The Stuxnet computer worm, which targeted the computer hardware of Iran's nuclear program, is one example of an APT attack. In this case, the Iranian government might consider the Stuxnet creators to be an advanced persistent threat.[citation needed][15]

Within the computer security community, and increasingly within the media, the term is almost always used in reference to a long-term pattern of sophisticated computer network exploitation aimed at governments, companies, and political activists, and by extension, also to ascribe the A, P and T attributes to the groups behind these attacks.[16] Advanced persistent threat (APT) as a term may be shifting focus to computer-based hacking due to the rising number of occurrences. PC World reported an 81 percent increase from 2010 to 2011 of particularly advanced targeted computer attacks.[17]

Actors in many countries have used cyberspace as a means to gather intelligence on individuals and groups of individuals of interest.[18][19][20] The United States Cyber Command is tasked with coordinating the US military's offensive and defensive cyber operations.[21]

Numerous sources have alleged that some APT groups are affiliated with, or are agents of, governments of sovereign states.[22][23][24] Businesses holding a large quantity of personally identifiable information are at high risk of being targeted by advanced persistent threats, including:[25]

A Bell Canada study provided deep research into the anatomy of APTs and uncovered widespread presence in Canadian government and critical infrastructure. Attribution was established to Chinese and Russian actors.[28]

Life cycle

[edit]
A diagram depicting the life cycle staged approach of an advanced persistent threat (APT), which repeats itself once complete.

Actors behind advanced persistent threats create a growing and changing risk to organizations' financial assets, intellectual property, and reputation[29] by following a continuous process or kill chain:

  1. Target specific organizations for a singular objective
  2. Attempt to gain a foothold in the environment (common tactics include spear phishing emails)
  3. Use the compromised systems as access into the target network
  4. Deploy additional tools that help fulfill the attack objective
  5. Cover tracks to maintain access for future initiatives

In 2013, Mandiant presented results of their research on alleged Chinese attacks using APT method between 2004 and 2013[30] that followed similar lifecycle:

  • Initial compromise – performed by use of social engineering and spear phishing, over email, using zero-day viruses. Another popular infection method was planting malware on a website that the victim's employees will be likely to visit.[31]
  • Establish foothold – plant remote administration software in victim's network, create net backdoors and tunnels allowing stealth access to its infrastructure.
  • Escalate privileges – use exploits and password cracking to acquire administrator privileges over victim's computer and possibly expand it to Windows domain administrator accounts.
  • Internal reconnaissance – collect information on surrounding infrastructure, trust relationships, Windows domain structure.
  • Move laterally – expand control to other workstations, servers and infrastructure elements and perform data harvesting on them.
  • Maintain presence – ensure continued control over access channels and credentials acquired in previous steps.
  • Complete mission – exfiltrate stolen data from victim's network.

In incidents analysed by Mandiant, the average period over which the attackers controlled the victim's network was one year, with longest – almost five years.[30] The infiltrations were allegedly performed by Shanghai-based Unit 61398 of People's Liberation Army. Chinese officials have denied any involvement in these attacks.[32]

Previous reports from Secdev had previously discovered and implicated Chinese actors.[33]

Mitigation strategies

[edit]

There are tens of millions of malware variations,[34] which makes it extremely challenging to protect organizations from APT. While APT activities are stealthy and hard to detect, the command and control network traffic associated with APT can be detected at the network layer level with sophisticated methods. Deep log analyses and log correlation from various sources is of limited usefulness in detecting APT activities. It is challenging to separate noises from legitimate traffic. Traditional security technology and methods have been ineffective in detecting or mitigating APTs.[35] Active cyber defense has yielded greater efficacy in detecting and prosecuting APTs (find, fix, finish) when applying cyber threat intelligence to hunt and adversary pursuit activities.[36][37] Human-Introduced Cyber Vulnerabilities (HICV) are a weak cyber link that are neither well understood nor mitigated, constituting a significant attack vector.[38]

APT groups

[edit]

China

[edit]

Iran

[edit]

North Korea

[edit]

Russia

[edit]

Turkey

[edit]

United States

[edit]

Uzbekistan

[edit]

Vietnam

[edit]

India

[edit]
  • APT-C-35[83]
  • Appin[84]
  • Bahamut
  • Confucius
  • Hangover Group
  • ModifiedElephant
  • Patchwork
  • SideWinder
  • Urpage

Naming

[edit]

Multiple organizations may assign different names to the same actor. As separate researchers could each have their own varying assessments of an APT group, companies such as CrowdStrike, Kaspersky, Mandiant, and Microsoft, among others, have their own internal naming schemes.[85] Names between different organizations may refer to overlapping but ultimately different groups, based on various data gathered.

CrowdStrike assigns animals by nation-state or other category, such as "Kitten" for Iran and "Spider" for groups focused on cybercrime.[86] Other companies have named groups based on this system — Rampant Kitten, for instance, was named by Check Point rather than CrowdStrike.[87]

Dragos bases its names for APT groups on minerals.[85]

Mandiant assigns numbered acronyms in three categories, APT, FIN, and UNC, resulting in APT names like FIN7. Other companies using a similar system include Proofpoint (TA) and IBM (ITG and Hive).[85]

Microsoft used to assign names from the periodic table, often stylized in all-caps (e.g. POTASSIUM); in April 2023, Microsoft changed its naming schema to use weather-based names (e.g. Volt Typhoon).[88]

See also

[edit]

Notes

[edit]
  1. ^ active since 2013, unlike most APTs, Gamaredon broadly targets all users all over the globe (in addition to also focusing on certain victims, especially Ukrainian organizations[75]) and appears to provide services for other APTs.[76] For example, the InvisiMole threat group has attacked select systems that Gamaredon had earlier compromised and fingerprinted.[75]

References

[edit]
  1. ^ "What Is an Advanced Persistent Threat (APT)?". www.kaspersky.com. Archived from the original on 22 March 2021. Retrieved 11 August 2019.
  2. ^ "What Is an Advanced Persistent Threat (APT)?". Cisco. Archived from the original on 22 March 2021. Retrieved 11 August 2019.
  3. ^ a b c Maloney, Sarah. "What is an Advanced Persistent Threat (APT)?". Archived from the original on 7 April 2019. Retrieved 9 November 2018.
  4. ^ Cole., Eric (2013). Advanced Persistent Threat: Understanding the Danger and How to Protect Your Organization. Syngress. OCLC 939843912.
  5. ^ a b "M-Trends Cyber Security Trends". FireEye. Archived from the original on 21 September 2021. Retrieved 11 August 2019.
  6. ^ "Cyber Threats to the Financial Services and Insurance Industries" (PDF). FireEye. Archived from the original (PDF) on 11 August 2019.
  7. ^ "Cyber Threats to the Retail and Consumer Goods Industry" (PDF). FireEye. Archived from the original (PDF) on 11 August 2019.
  8. ^ "Advanced Persistent Threats: A Symantec Perspective" (PDF). Symantec. Archived from the original (PDF) on 8 May 2018.
  9. ^ Au, Man Ho (2018). "Privacy-preserving personal data operation on mobile cloud—Chances and challenges over advanced persistent threat". Future Generation Computer Systems. 79: 337–349. doi:10.1016/j.future.2017.06.021.
  10. ^ a b c "Advanced Persistent Threats (APTs)". IT Governance. Archived from the original on 11 August 2019. Retrieved 11 August 2019.
  11. ^ "Advanced persistent Threat Awareness" (PDF). TrendMicro Inc. Archived (PDF) from the original on 10 June 2016. Retrieved 11 August 2019.
  12. ^ "Explained: Advanced Persistent Threat (APT)". Malwarebytes Labs. 26 July 2016. Archived from the original on 9 May 2019. Retrieved 11 August 2019.
  13. ^ "Assessing Outbound Traffic to Uncover Advanced Persistent Threat" (PDF). SANS Technology Institute. Archived from the original (PDF) on 26 June 2013. Retrieved 14 April 2013.
  14. ^ "Introducing Forrester's Cyber Threat Intelligence Research". Forrester Research. Archived from the original on 15 April 2014. Retrieved 14 April 2014.
  15. ^ Beim, Jared (2018). "Enforcing a Prohibition on International Espionage". Chicago Journal of International Law. 18: 647–672. ProQuest 2012381493. Archived from the original on 22 May 2021. Retrieved 18 January 2023.
  16. ^ "Advanced Persistent Threats: Learn the ABCs of APTs - Part A". SecureWorks. Archived from the original on 7 April 2019. Retrieved 23 January 2017.
  17. ^ Olavsrud, Thor (30 April 2012). "Targeted Attacks Increased, Became More Diverse in 2011". CIO Magazine. Archived from the original on 14 April 2021. Retrieved 14 April 2021.
  18. ^ "An Evolving Crisis". BusinessWeek. 10 April 2008. Archived from the original on 10 January 2010. Retrieved 20 January 2010.
  19. ^ "The New E-spionage Threat". BusinessWeek. 10 April 2008. Archived from the original on 18 April 2011. Retrieved 19 March 2011.
  20. ^ Rosenbach, Marcel; Schulz, Thomas; Wagner, Wieland (19 January 2010). "Google Under Attack: The High Cost of Doing Business in China". Der Spiegel. Archived from the original on 21 January 2010. Retrieved 20 January 2010.
  21. ^ "Commander Discusses a Decade of DOD Cyber Power". U.S. DEPARTMENT OF DEFENSE. Archived from the original on 19 September 2020. Retrieved 28 August 2020.
  22. ^ "Under Cyberthreat: Defense Contractors". Bloomberg.com. BusinessWeek. 6 July 2009. Archived from the original on 11 January 2010. Retrieved 20 January 2010.
  23. ^ "Understanding the Advanced Persistent Threat". Tom Parker. 4 February 2010. Archived from the original on 18 February 2010. Retrieved 4 February 2010.
  24. ^ "Advanced Persistent Threat (or Informationized Force Operations)" (PDF). Usenix, Michael K. Daly. 4 November 2009. Archived (PDF) from the original on 11 May 2021. Retrieved 4 November 2009.
  25. ^ "Anatomy of an Advanced Persistent Threat (APT)". Dell SecureWorks. Archived from the original on 5 March 2016. Retrieved 21 May 2012.
  26. ^ Gonzalez, Joaquin Jay III; Kemp, Roger L. (16 January 2019). Cybersecurity: Current Writings on Threats and Protection. McFarland. p. 69. ISBN 978-1-4766-7440-7.
  27. ^ Ingerman, Bret; Yang, Catherine (31 May 2011). "Top-Ten IT Issues, 2011". Educause Review. Archived from the original on 14 April 2021. Retrieved 14 April 2021.
  28. ^ McMahon, Dave; Rohozinski, Rafal. "The Dark Space Project: Defence R&D Canada – Centre for Security Science Contractor Report DRDC CSS CR 2013-007" (PDF). publications.gc.ca. Archived (PDF) from the original on 5 November 2016. Retrieved 1 April 2021.
  29. ^ "Outmaneuvering Advanced and Evasive Malware Threats". Secureworks. Secureworks Insights. Archived from the original on 7 April 2019. Retrieved 24 February 2016.
  30. ^ a b "APT1: Exposing One of China's Cyber Espionage Units". Mandiant. 2013. Archived from the original on 2 February 2015. Retrieved 19 February 2013.
  31. ^ "What are MITRE ATT&CK initial access techniques". GitGuardian - Automated Secrets Detection. 8 June 2021. Archived from the original on 29 November 2023. Retrieved 13 October 2023.
  32. ^ Blanchard, Ben (19 February 2013). "China says U.S. hacking accusations lack technical proof". Reuters. Archived from the original on 14 April 2021. Retrieved 14 April 2021.
  33. ^ Deibert, R.; Rohozinski, R.; Manchanda, A.; Villeneuve, N.; Walton, G (28 March 2009). "Tracking GhostNet: investigating a cyber espionage network". The Munk Centre for International Studies, University of Toronto. Archived from the original on 27 December 2023. Retrieved 27 December 2023.
  34. ^ RicMessier (30 October 2013). GSEC GIAC Security Essentials Certification All. McGraw Hill Professional, 2013. p. xxv. ISBN 978-0-07-182091-2.
  35. ^ "Anatomy of an APT (Advanced Persistent Threat) Attack". FireEye. Archived from the original on 7 November 2020. Retrieved 14 November 2020.
  36. ^ "Threat Intelligence in an Active Cyber Defense (Part 1)". Recorded Future. 18 February 2015. Archived from the original on 20 June 2021. Retrieved 10 March 2021.
  37. ^ "Threat Intelligence in an Active Cyber Defense (Part 2)". Recorded Future. 24 February 2015. Archived from the original on 27 February 2021. Retrieved 10 March 2021.
  38. ^ "A Context-Centred Research Approach to Phishing and Operational Technology in Industrial Control Systems | Journal of Information Warfare". www.jinfowar.com. Archived from the original on 31 July 2021. Retrieved 31 July 2021.
  39. ^ "Buckeye: Espionage Outfit Used Equation Group Tools Prior to Shadow Brokers Leak". Symantec. 7 May 2019. Archived from the original on 7 May 2019. Retrieved 23 July 2019.
  40. ^ "APT17: Hiding in Plain Sight - FireEye and Microsoft Expose Obfuscation Tactic" (PDF). FireEye. May 2015. Archived (PDF) from the original on 24 November 2023. Retrieved 21 January 2024.
  41. ^ "China-Based Threat Actors" (PDF). U.S. Department of Health and Human Services Office of Information Security. 16 August 2023. Archived (PDF) from the original on 29 December 2023. Retrieved 29 April 2024.
  42. ^ van Dantzig, Maarten; Schamper, Erik (19 December 2019). "Wocao APT20" (PDF). fox-it.com. NCC Group. Archived from the original (PDF) on 22 March 2021. Retrieved 23 December 2019.
  43. ^ Vijayan, Jai (19 December 2019). "China-Based Cyber Espionage Group Targeting Orgs in 10 Countries". www.darkreading.com. Dark Reading. Archived from the original on 7 May 2021. Retrieved 12 January 2020.
  44. ^ Barth, Bradley (16 March 2016). "'Suckfly' in the ointment: Chinese APT group steals code-signing certificates". SC Media. Archived from the original on 24 September 2024. Retrieved 24 September 2024.
  45. ^ "Building China's Comac C919 airplane involved a lot of hacking, report says". ZDNET. Archived from the original on 15 November 2019. Retrieved 24 September 2024.
  46. ^ Lyngaas, Sean (10 August 2021). "Chinese hackers posed as Iranians to breach Israeli targets, FireEye says". www.cyberscoop.com. Archived from the original on 29 November 2023. Retrieved 15 August 2021.
  47. ^ Lyngaas, Sean (12 February 2019). "Right country, wrong group? Researchers say it wasn't APT10 that hacked Norwegian software firm". www.cyberscoop.com. Cyberscoop. Archived from the original on 7 May 2021. Retrieved 16 October 2020.
  48. ^ Lyngaas, Sean (16 October 2020). "Google offers details on Chinese hacking group that targeted Biden campaign". Cyberscoop. Archived from the original on 7 May 2021. Retrieved 16 October 2020.
  49. ^ "How Microsoft names threat actors". Microsoft. 16 January 2024. Archived from the original on 10 July 2024. Retrieved 21 January 2024.
  50. ^ "Treasury Sanctions China-Linked Hackers for Targeting U.S. Critical Infrastructure". U.S. Department of the Treasury. 19 March 2024. Archived from the original on 25 March 2024. Retrieved 25 March 2024.
  51. ^ "Double Dragon APT41, a dual espionage and cyber crime operation". FireEye. 16 October 2019. Archived from the original on 7 May 2021. Retrieved 14 April 2020.
  52. ^ "Bureau names ransomware culprits". Taipei Times. 17 May 2020. Archived from the original on 22 March 2021. Retrieved 22 May 2020.
  53. ^ Greenberg, Andy (6 August 2020). "Chinese Hackers Have Pillaged Taiwan's Semiconductor Industry". Wired. ISSN 1059-1028. Archived from the original on 22 March 2021. Retrieved 14 July 2024.
  54. ^ Sabin, Sam (26 October 2022). "New pro-China disinformation campaign targets 2022 elections: Report". Axios. Archived from the original on 26 October 2022. Retrieved 27 October 2022.
  55. ^ Milmo, Dan (5 April 2024). "China will use AI to disrupt elections in the US, South Korea and India, Microsoft warns". The Guardian. ISSN 0261-3077. Archived from the original on 25 May 2024. Retrieved 7 April 2024.
  56. ^ Naraine, Ryan (2 March 2021). "Microsoft: Multiple Exchange Server Zero-Days Under Attack by Chinese Hacking Group". securityweek.com. Wired Business Media. Archived from the original on 6 July 2023. Retrieved 3 March 2021.
  57. ^ Burt, Tom (2 March 2021). "New nation-state cyberattacks". blogs.microsoft.com. Microsoft. Archived from the original on 2 March 2021. Retrieved 3 March 2021.
  58. ^ Nichols, Shaun (20 October 2021). "'LightBasin' hackers spent 5 years hiding on telco networks". TechTarget. Archived from the original on 29 November 2023. Retrieved 8 April 2022.
  59. ^ Ilascu, Ionut (19 October 2021). "LightBasin hacking group breaches 13 global telecoms in two years". Bleeping Computer. Archived from the original on 24 July 2023. Retrieved 8 April 2022.
  60. ^ Cimpanu, Catalin. "Hackers target the air-gapped networks of the Taiwanese and Philippine military". ZDnet. Archived from the original on 22 March 2021. Retrieved 16 May 2020.
  61. ^ Intelligence, Microsoft Threat (24 May 2023). "Volt Typhoon targets US critical infrastructure with living-off-the-land techniques". Microsoft Security Blog. Archived from the original on 17 January 2024. Retrieved 26 May 2023.
  62. ^ Tucker, Eric (18 September 2024). "FBI disrupts Chinese cyber operation targeting critical infrastructure in the US". Associated Press. Archived from the original on 24 September 2024. Retrieved 18 September 2024.
  63. ^ a b "Disrupting malicious uses of AI by state-affiliated threat actors". 14 February 2024. Archived from the original on 16 February 2024. Retrieved 16 February 2024.
  64. ^ a b "Staying ahead of threat actors in the age of AI". Microsoft. 14 February 2024. Archived from the original on 16 February 2024. Retrieved 16 February 2024.
  65. ^ Krouse, Sarah; McMillan, Robert; Volz, Dustin (25 September 2024). "China-Linked Hackers Breach U.S. Internet Providers in New 'Salt Typhoon' Cyberattack". The Wall Street Journal. Archived from the original on 7 October 2024. Retrieved 25 September 2024.
  66. ^ Krouse, Sarah; Volz, Dustin; Viswanatha, Aruna; McMillan, Robert (5 October 2024). "U.S. Wiretap Systems Targeted in China-Linked Hack". The Wall Street Journal. Archived from the original on 5 October 2024. Retrieved 5 October 2024.
  67. ^ Sabin, Sam (19 November 2024). "New China-linked telco attackers". Axios. Retrieved 19 November 2024.
  68. ^ Yamaguchi, Mari (8 January 2025). "Japan links Chinese hacker MirrorFace to dozens of cyberattacks targeting security and tech data". Associated Press. Archived from the original on 8 January 2025. Retrieved 8 January 2025.
  69. ^ Rajagopalan, Megha (19 June 2025). "China Is Hacking Russia to Steal War Secrets". The New York Times. ISSN 0362-4331. Retrieved 20 June 2025.
  70. ^ "What is UNC3886, the group that attacked Singapore's critical information infrastructure?". The Straits Times. 18 July 2025. ISSN 0585-3923. Retrieved 19 July 2025.
  71. ^ Montalbano, Elizabeth (1 September 2020). "Pioneer Kitten APT Sells Corporate Network Access". Threat Post. Archived from the original on 22 March 2021. Retrieved 3 September 2020.
  72. ^ "APT39, ITG07, Chafer, Remix Kitten, Group G0087 | MITRE ATT&CK?". attack.mitre.org. Archived from the original on 30 December 2022. Retrieved 30 December 2022.
  73. ^ "Crowdstrike Global Threat Report 2020" (PDF). crowdstrike.com. 2020. Archived (PDF) from the original on 14 March 2020. Retrieved 30 December 2020.
  74. ^ Kyle Alspach (4 February 2022). "Microsoft discloses new details on Russian hacker group Gamaredon". VentureBeat. Archived from the original on 6 February 2022. Retrieved 22 March 2022.
  75. ^ a b Charlie Osborne (21 March 2022). "Ukraine warns of InvisiMole attacks tied to state-sponsored Russian hackers". ZDNet. Archived from the original on 22 March 2022. Retrieved 22 March 2022.
  76. ^ Warren Mercer; Vitor Ventura (23 February 2021). "Gamaredon - When nation states don't pay all the bills". Cisco. Archived from the original on 19 March 2022. Retrieved 22 March 2022.
  77. ^ "Adversary: Venomous Bear - Threat Actor". Crowdstrike Adversary Universe. Retrieved 22 March 2022.
  78. ^ Warren Mercer; Paul Rascagneres; Vitor Ventura (29 June 2020). "PROMETHIUM extends global reach with StrongPity3 APT". Cisco. Archived from the original on 22 March 2022. Retrieved 22 March 2022.
  79. ^ "Equation: The Death Star of Malware Galaxy". Kaspersky Lab. 16 February 2015. Archived from the original on 11 July 2019. Retrieved 23 July 2019.
  80. ^ Gallagher, Sean (3 October 2019). "Kaspersky finds Uzbekistan hacking op… because group used Kaspersky AV". arstechnica.com. Ars Technica. Archived from the original on 22 March 2021. Retrieved 5 October 2019.
  81. ^ Panda, Ankit. "Offensive Cyber Capabilities and Public Health Intelligence: Vietnam, APT32, and COVID-19". thediplomat.com. The Diplomat. Archived from the original on 22 March 2021. Retrieved 29 April 2020.
  82. ^ Tanriverdi, Hakan; Zierer, Max; Wetter, Ann-Kathrin; Biermann, Kai; Nguyen, Thi Do (8 October 2020). Nierle, Verena; Sch?ffel, Robert; Wreschniok, Lisa (eds.). "Lined up in the sights of Vietnamese hackers". Bayerischer Rundfunk. Archived from the original on 22 March 2021. Retrieved 11 October 2020. In Bui's case the traces lead to a group presumably acting on behalf of the Vietnamese state. Experts have many names for this group: APT 32 and Ocean Lotus are best known. In conversations with a dozen of information security specialists, they all agreed that this is a Vietnamese group spying, in particular, on its own compatriots.
  83. ^ Lakshmanan, Ravie. "DoNot APT Expands Operations, Targets European Foreign Ministries with LoptikMod Malware". The Hacker News. Retrieved 1 August 2025.
  84. ^ "APT Attacks Trace To India, Researcher Says". www.darkreading.com. Retrieved 28 April 2025.
  85. ^ a b c BushidoToken (20 May 2022). "Threat Group Naming Schemes In Cyber Threat Intelligence". Curated Intelligence. Archived from the original on 8 December 2023. Retrieved 21 January 2024.
  86. ^ "CrowdStrike 2023 Global Threat Report" (PDF). CrowdStrike. Archived (PDF) from the original on 26 March 2024. Retrieved 21 January 2024.
  87. ^ "Rampant Kitten". Thailand Electronic Transactions Development Agency. Archived from the original on 29 November 2022. Retrieved 21 January 2024.
  88. ^ Lambert, John (18 April 2023). "Microsoft shifts to a new threat actor naming taxonomy". Microsoft. Archived from the original on 22 January 2024. Retrieved 21 January 2024.
[edit]
Lists of APT groups
晚上八点是什么时辰 一个火一个斤念什么 珝是什么意思 百年灵手表什么档次 做梦笑醒了有什么征兆
一个虫一个卑念什么 疖是什么意思 买什么保险最好最划算 团长是什么级别 Mary英文名什么意思
炒米是什么米做的 诺诺是什么意思 郭富城什么星座 一惊一乍是什么意思 昆明有什么好玩的
晚上9点到11点是什么时辰 上午12点是什么时候 高血压高血糖能吃什么水果 早餐吃什么营养又健康 耐克是什么牌子
女人严重口臭挂什么科hcv8jop9ns7r.cn 胡萝卜是什么科hcv7jop7ns0r.cn 草字头加叔念什么hcv8jop6ns6r.cn 阳气是什么hcv9jop4ns8r.cn 后脑勺发热是什么原因hcv7jop9ns2r.cn
大姨妈是什么hcv9jop6ns6r.cn 1986年虎是什么命hcv9jop6ns1r.cn 舒肝解郁胶囊治什么病jiuxinfghf.com 为什么一照相脸就歪了hcv8jop5ns1r.cn 北京佑安医院擅长什么jingluanji.com
地藏王菩萨是管什么的hcv7jop6ns3r.cn 早上7点是什么时辰hcv8jop2ns6r.cn 梦见生姜是什么意思bjhyzcsm.com 精索静脉曲张是什么hcv9jop5ns8r.cn 昆字五行属什么hcv9jop3ns7r.cn
招风耳是什么意思hcv9jop2ns9r.cn 五月三十一号是什么星座imcecn.com 甲醛超标有什么反应hcv9jop4ns0r.cn 五月二十四号是什么星座inbungee.com 粽子是什么意思hcv8jop7ns8r.cn
百度