menu szukaj
Weekly Online Magazine
ISSN 2544-5839

new articles each monday
zamknij
advertisementbanner Amazon

7.10.2024 Law in media

Cyberwarfare on the Internet. The ESET Report

KF

Governments, corporations, and even the education sector are becoming targets of advanced cyber attacks. The report for the period from October 2023 to March 2024, prepared by ESET, sheds light on the intensification of activities by Advanced Persistent Threat (APT) groups, which conduct espionage, sabotage, and destabilization operations in key sectors on behalf of states.

Cyberwarfare on the Internet: ESET Reportillustration: bing.com/create

Threats from the Middle East: Iran Strikes After Hamas Attack


In October 2023, following Hamas`s attack on Israel, the activity of Iranian cyber threat groups surged dramatically. As ESET specialists note, there has been a shift in the strategy of these groups—from cyber espionage and ransomware to more destructive actions, such as access brokering and wiper attacks aimed at destroying data. MuddyWater and Agrius, two of the most well-known groups linked to Iran, conducted a series of attacks targeting various sectors, including communications, government, and finance.

  • Agrius`s attack on the Israeli communication sector: In November 2023, Agrius used an advanced BIOS wiper, leading to the paralysis of systems in many Israeli companies. Modified versions of the Red Petya tool, previously used in other sabotage operations, were employed in these attacks.

ESET notes that while these operations have become more aggressive, their effectiveness has decreased. The accelerated pace of activities has led to operational errors, such as the frequent use of the same tools and techniques, increasing the chances of detection.

North Korea: Not Just Spying, but Stealing Millions in Cryptocurrency


In the digital world, one of the most dangerous players remains North Korea. Its groups, such as Lazarus, continuously target the aerospace and defense sectors. However, they are increasingly focusing on operations against cryptocurrency firms. In 2023, according to ESET data, Lazarus and other North Korean groups stole cryptocurrencies worth up to a billion dollars. This is just a drop in the ocean of financial losses inflicted on companies worldwide.

  • Lazarus`s Techniques: The North Korean group increasingly employs advanced attack techniques, such as supply-chain attacks, which involve injecting malicious code into official software updates.

Meanwhile, groups like ScarCruft and Konni focus on highly targeted phishing attacks that enable them to gain access to government networks in South Korea and Russia. In one attack, Konni used a trojanized installer to infiltrate the computers of employees at the Russian embassy.


advertisement

China: Masters of Exploitation


Chinese APT groups are not slowing down and continue to exploit vulnerabilities in publicly available applications. Mustang Panda, one of the best-known Chinese groups, has concentrated its activities on the maritime transport sector, attacking companies in Europe. Their victims include companies from Norway, Greece, and the Netherlands, including vessels.

  • DLL Hijacking Technique: Mustang Panda utilized a technique known as DLL hijacking to attack the computer systems of these companies. In this case, files with incorrect digital signatures were used, allowing them to take control of the victims` systems.

However, the biggest challenge facing cybersecurity specialists is the emergence of new Chinese APT groups. CeranaKeeper, a newly identified group, operates similarly to Mustang Panda but has its own unique toolkit. ESET is monitoring the activities of both groups, which seem to be using the same digital tool provider, suggesting potential technical collaboration.

Russian Cyberwarfare Continues: Europe and Ukraine in the Crosshairs


Russia remains one of the most active players on the digital battlefield. In recent months, groups linked to Russia, such as Gamaredon, have focused their efforts on intelligence attacks and sabotage operations targeting Ukraine. Russian groups are responsible for dozens of daily attacks on Ukrainian energy systems.

  • Attack on Kyivstar: In December 2023, Sandworm launched an attack on one of Ukraine`s largest telecommunications operators – Kyivstar. This attack, which led to network outages, was publicized on pro-Russian Telegram channels.

Russian groups, such as Sednit, are also continuing intelligence operations in Europe, focusing on EU governmental institutions. In March 2024, Sednit conducted a series of phishing attacks exploiting vulnerabilities in Microsoft Outlook (CVE-2024-21413).


Work In Media

Dominant Techniques: Phishing, Ransomware, and Wipers


The ESET report clearly shows that APT groups continue to favor phishing techniques as a precursor to larger operations. In particular, spear phishing—attacks targeted at selected individuals or organizations—remains a favorite method for initial access.

  • Phishing: Russian-linked groups, such as Sednit and Callisto, use spear phishing as the main attack vector. In one recent attack on European institutions, emails contained malicious links and attachments that, when opened, allowed attackers to take control of the victims` systems.

Additionally, in 2024, there has been an increase in attacks using wiper malware—malicious software that destroys data on the attacked systems. These destructive attacks have primarily occurred in the Middle East, where Iranian groups like MuddyWater and Agrius have targeted Israeli companies.

Target Sectors of APT Groups (October 2023 - March 2024):


Region Sector State-linked APT Groups
Europe Government, Defense, Energy Russia, China
Middle East Telecommunications, Government Iran, BladedFeline, POLONIUM
Asia Aerospace, Cryptocurrency North Korea (Lazarus)
The Americas Government, Energy China, Iran


Summary in Numbers


Iran

  • 3 major attacks in Israel using wipers.
  • 70% of attacks on the communication and government sector.

North Korea:

  • Value of stolen cryptocurrencies in 2023: $600 million – $1 billion.
  • 5 major phishing campaigns targeting the defense industry.

Russia:

  • 12 daily attacks on Ukrainian energy infrastructure.
  • 4 successful espionage operations in EU institutions.

The ESET report shows that the digital world is becoming increasingly dangerous, and cyber threats are evolving at an unprecedented pace. Both governments and companies must confront ever-more advanced adversaries that employ new techniques and tools.

The entire APT Activity Report is available at:
https://dagma.eu/storage/_common/blog/doc/APT_Activity_Report_Q4_2023-Q1_2024.pdf

Share the article:

dodaj na Facebook prześlij przez Messenger dodaj na Twitter dodaj na LinkedIn

COMMERCIAL BREAK

See articles on a similar topic:

Local Media in Poland - Corrections

Bartłomiej Dwornik
The regulations regarding corrections are perhaps the most frequently violated rule in Polish media. There is a clear division between those who never admit to mistakes and those who can humbly accept their faults.

Local Media in Poland - Freedom of Speech

Bartłomiej Dwornik
Abuse of freedom of speech is as common as imposing muzzles on journalists. Although the Press Law and the Constitution guarantee this fundamental freedom to everyone.

Cyber Threats 2023: Phishing Dominates, AI Targeted

Krzysztof Fiedorek
The CERT Orange Polska 2023 report reveals a rapidly evolving cyber threat landscape. Phishing has taken a decisive lead, accounting for over 44% of reported incidents. Advanced social engineering techniques, deepfakes, and a surge in malicious ads lure users with promises of quick profits or easy opportunities.

Local Media in Poland - The Press Owner Influence

Bartłomiej Dwornik
The editor-in-chief, according to the provisions of the Press Law, should be responsible for the content of the materials prepared by the editorial team as well as for the editorial and financial matters of the editorial office. This is the theory.

Quishing. How to Protect Yourself from QR Code Scams

Krzysztof Fiedorek
According to analysts from Keepnet Labs, quishing will be one of the most serious threats to businesses and individuals in 2024. In 2023, the number of data or money theft cases using this method increased globally by 587%.

Illusory Security: Small and Medium Enterprises Easy Targets for Cybercrime

KF
35% of micro, small, and medium enterprises (SMEs) fear the theft of their employees' personal data. This comes from research conducted on behalf of ChronPESEL.pl and the National Debt Register of Poland.

Data for Benefits: What Encourages Sharing Personal Information Online

Krzysztof Fiedorek
Most Poles are aware of the value of their personal data and do not share it without reason. However, one in five is willing to share data in exchange for benefits, and 16% of us do not remember if we have done so. These are the results of a study conducted by ChronPESEL.pl and the National Debt Register under the patronage of the UODO.

More in the section: Law in media

community

Facebook LinkedIn X Twitter Google RSS

Work in media

United States
New York • Washington DC • Los Angeles • Chicago • Houston • Phoenix • Philadelphia United Kingdom
London • Birmingham • Manchester • Liverpool • Glasgow • Edinburgh Canada
Toronto • Ottawa • Monstreal • Calgary Australia
Sydney • Melbourne • Brisbane • canberra Ireland, New Zealand, India

advertisement





Reporter shopping

Reporter shopping

Affordable laptops, notebooks and netbooks
Affordable laptops, notebooks and netbooks
for writing
Digital SLR and compact cameras
Digital SLR and compact cameras
for photographers
Books and e-books about media
Books and e-books about media
for reading
Video drones and flying cameras
Video drones and flying cameras
for pilots
Gimbals for stabilizing video
Gimbals for stabilizing video
for those on the move
Software and apps for creative work
Software and apps for creative work
for nerdy ones
More occasions

advertisement
Read books and e-books

Read books and e-books

Okładka Media Control. The Spectacular Achievements of Propaganda
Media Control. The Spectacular Achievements of Propaganda
Okładka Social Media Marketing All-in-One For Dummies
Social Media Marketing All-in-One For Dummies
Okładka Mass Communication: Living in a Media World
Mass Communication: Living in a Media World
Okładka Beyond The Feed: A Social Media Success Formula
Beyond The Feed: A Social Media Success Formula
Okładka Trust Me, I`m Lying: Confessions of a Media Manipulator
Trust Me, I`m Lying: Confessions of a Media Manipulator
Okładka Hate, Inc.: Why Today`s Media Makes Us Despise One Another
Hate, Inc.: Why Today`s Media Makes Us Despise One Another
more books and e-books

Reporterzy.info

More about us

Our tools and services

Contact


© Dwornik.pl Bartłomiej Dwornik 2oo1-2o24