Security Software & Equipment Store

Tuesday, July 26, 2016

Mandiant Issues New Report on Russia's Cyber Espionage Tactics

The role of nation-state actors in cyber attacks was perhaps most widely revealed in February 2013 when Mandiant released the APT1 Report which detailed a professional cyber espionage group based in China. Mandiant has released a new report entitled APT28: A Window Into Russia's Cyber Espionage Operations. The report focuses on a threat group that we have designated as APT28. While APT28’s malware is fairly well known in the cybersecurity community, our report details additional information exposing ongoing, focused operations that we believe indicate a government sponsor based in Moscow. In contrast with the China-based threat actors that FireEye tracks, APT28 does not appear to conduct widespread intellectual property theft for economic gain. Instead, APT28 focuses on collecting intelligence that would be most useful to a government. Specifically, FireEye found that since at least 2007, APT28 has been targeting privileged information related to governments, militaries and security organizations that would likely benefit the Russian government. The report also describes several malware samples containing details that indicate that the developers are Russian language speakers operating during business hours that are consistent with the time zone of Russia’s major cities, including Moscow and St. Petersburg. FireEye analysts also found that APT28 has systematically evolved its malware since 2007, using flexible and lasting platforms indicative of plans for long-term use and sophisticated coding practices that suggest an interest in complicating reverse engineering efforts. Access the report at: https://www2.fireeye.com/apt28.html   Share your comments with the Cloud and Cyber Security Center.

No comments:

Post a Comment