7.10.2024 Law in media
Cyberwarfare on the Internet. The ESET Report
KF
Governments, corporations, and even the education sector are becoming targets of advanced cyber attacks. The report for the period from October 2023 to March 2024, prepared by ESET, sheds light on the intensification of activities by Advanced Persistent Threat (APT) groups, which conduct espionage, sabotage, and destabilization operations in key sectors on behalf of states.
Threats from the Middle East: Iran Strikes After Hamas Attack
In October 2023, following Hamas`s attack on Israel, the activity of Iranian cyber threat groups surged dramatically. As ESET specialists note, there has been a shift in the strategy of these groups—from cyber espionage and ransomware to more destructive actions, such as access brokering and wiper attacks aimed at destroying data. MuddyWater and Agrius, two of the most well-known groups linked to Iran, conducted a series of attacks targeting various sectors, including communications, government, and finance.
- Agrius`s attack on the Israeli communication sector: In November 2023, Agrius used an advanced BIOS wiper, leading to the paralysis of systems in many Israeli companies. Modified versions of the Red Petya tool, previously used in other sabotage operations, were employed in these attacks.
ESET notes that while these operations have become more aggressive, their effectiveness has decreased. The accelerated pace of activities has led to operational errors, such as the frequent use of the same tools and techniques, increasing the chances of detection.
North Korea: Not Just Spying, but Stealing Millions in Cryptocurrency
In the digital world, one of the most dangerous players remains North Korea. Its groups, such as Lazarus, continuously target the aerospace and defense sectors. However, they are increasingly focusing on operations against cryptocurrency firms. In 2023, according to ESET data, Lazarus and other North Korean groups stole cryptocurrencies worth up to a billion dollars. This is just a drop in the ocean of financial losses inflicted on companies worldwide.
- Lazarus`s Techniques: The North Korean group increasingly employs advanced attack techniques, such as supply-chain attacks, which involve injecting malicious code into official software updates.
Meanwhile, groups like ScarCruft and Konni focus on highly targeted phishing attacks that enable them to gain access to government networks in South Korea and Russia. In one attack, Konni used a trojanized installer to infiltrate the computers of employees at the Russian embassy.
China: Masters of Exploitation
Chinese APT groups are not slowing down and continue to exploit vulnerabilities in publicly available applications. Mustang Panda, one of the best-known Chinese groups, has concentrated its activities on the maritime transport sector, attacking companies in Europe. Their victims include companies from Norway, Greece, and the Netherlands, including vessels.
- DLL Hijacking Technique: Mustang Panda utilized a technique known as DLL hijacking to attack the computer systems of these companies. In this case, files with incorrect digital signatures were used, allowing them to take control of the victims` systems.
However, the biggest challenge facing cybersecurity specialists is the emergence of new Chinese APT groups. CeranaKeeper, a newly identified group, operates similarly to Mustang Panda but has its own unique toolkit. ESET is monitoring the activities of both groups, which seem to be using the same digital tool provider, suggesting potential technical collaboration.
Russian Cyberwarfare Continues: Europe and Ukraine in the Crosshairs
Russia remains one of the most active players on the digital battlefield. In recent months, groups linked to Russia, such as Gamaredon, have focused their efforts on intelligence attacks and sabotage operations targeting Ukraine. Russian groups are responsible for dozens of daily attacks on Ukrainian energy systems.
- Attack on Kyivstar: In December 2023, Sandworm launched an attack on one of Ukraine`s largest telecommunications operators – Kyivstar. This attack, which led to network outages, was publicized on pro-Russian Telegram channels.
Russian groups, such as Sednit, are also continuing intelligence operations in Europe, focusing on EU governmental institutions. In March 2024, Sednit conducted a series of phishing attacks exploiting vulnerabilities in Microsoft Outlook (CVE-2024-21413).
advertisement
Dominant Techniques: Phishing, Ransomware, and Wipers
The ESET report clearly shows that APT groups continue to favor phishing techniques as a precursor to larger operations. In particular, spear phishing—attacks targeted at selected individuals or organizations—remains a favorite method for initial access.
- Phishing: Russian-linked groups, such as Sednit and Callisto, use spear phishing as the main attack vector. In one recent attack on European institutions, emails contained malicious links and attachments that, when opened, allowed attackers to take control of the victims` systems.
Additionally, in 2024, there has been an increase in attacks using wiper malware—malicious software that destroys data on the attacked systems. These destructive attacks have primarily occurred in the Middle East, where Iranian groups like MuddyWater and Agrius have targeted Israeli companies.
Target Sectors of APT Groups (October 2023 - March 2024):
Region | Sector | State-linked APT Groups |
---|---|---|
Europe | Government, Defense, Energy | Russia, China |
Middle East | Telecommunications, Government | Iran, BladedFeline, POLONIUM |
Asia | Aerospace, Cryptocurrency | North Korea (Lazarus) |
The Americas | Government, Energy | China, Iran |
Summary in Numbers
Iran
- 3 major attacks in Israel using wipers.
- 70% of attacks on the communication and government sector.
North Korea:
- Value of stolen cryptocurrencies in 2023: $600 million – $1 billion.
- 5 major phishing campaigns targeting the defense industry.
Russia:
- 12 daily attacks on Ukrainian energy infrastructure.
- 4 successful espionage operations in EU institutions.
The ESET report shows that the digital world is becoming increasingly dangerous, and cyber threats are evolving at an unprecedented pace. Both governments and companies must confront ever-more advanced adversaries that employ new techniques and tools.
The entire APT Activity Report is available at:
https://dagma.eu/storage/_common/blog/doc/APT_Activity_Report_Q4_2023-Q1_2024.pdf
COMMERCIAL BREAK
New articles in section Law in media
How South Asian Governments Manipulate Media. IFJ Report
Krzysztof Fiedorek
South Asia faces significant challenges in maintaining democracy and press freedom. The latest report from the International Federation of Journalists (IFJ), "Artificial Independence: The Fight To Save Media and Democracy," highlights the growing threats faced by journalists, including violence, financial pressures, and censorship.
Unsolved Journalist Murders: CPJ Report 2024
KFi
Haiti and Israel have topped the latest report by the Committee to Protect Journalists (CPJ) on impunity in journalist murders. Worldwide, 80% of cases remain unsolved. The report explores why those who kill journalists evade accountability, highlighting the countries leading this grim statistic and its impact on press freedom.
Online Hate in Numbers. What Do We Think About Offensive Comments?
KFi
Nearly 70% of adults have encountered online hate. The group most affected includes individuals aged 18–24, with 81% reporting exposure to hateful content - according to the report "Hate on the Internet," prepared by the polish Foundation "W zgodzie ze sobą" in cooperation with Maison&Partners and the Ariadna research panel.
See articles on a similar topic:
What Data Google Collects. Privacy on the Internet
KF
According to a gs.statcounter.com report – May 2018, Google captures over 97% of internet users. Currently, many free applications are available to users. What does Google collect? When using the most popular search engine, we should be aware of how our data is collected and used.
Illusory Security. Small and Medium Enterprises Easy Targets for Cybercrime
KF
35% of micro, small, and medium enterprises (SMEs) fear the theft of their employees' personal data. This comes from research conducted on behalf of ChronPESEL.pl and the National Debt Register of Poland.
Local Media in Poland - Court Cases
Bartłomiej Dwornik
Investigative journalists in local newsrooms often remain in the shadow of their colleagues from national outlets, despite frequently being the first to uncover a scandal.
Deepfake. A Powerful New Weapon in The Information War
Krzysztof Fiedorek
One of the newest threats to the credibility of information is deepfake technology. Deepfake is a type of false video or audio material where the person in the recording appears to speak or behave in a way that does not align with reality.