The role of nation-state actors in cyber attacks was perhaps most widely revealed in February 2013 when Mandiant released the APT1 Report which detailed a professional cyber espionage group based in China. Mandiant has released a new report entitled APT28: A Window Into Russia's Cyber Espionage Operations. The report focuses on a threat group that we have designated as
APT28. While APT28’s malware is fairly well known in the cybersecurity
community, our report details additional information exposing ongoing,
focused operations that we believe indicate a government sponsor based
in Moscow. In contrast with the China-based threat actors that FireEye tracks,
APT28 does not appear to conduct widespread intellectual property theft
for economic gain. Instead, APT28 focuses on collecting intelligence
that would be most useful to a government. Specifically, FireEye found
that since at least 2007, APT28 has been targeting privileged
information related to governments, militaries and security
organizations that would likely benefit the Russian government. The report also describes several malware samples containing
details that indicate that the developers are Russian language speakers
operating during business hours that are consistent with the time zone
of Russia’s major cities, including Moscow and St. Petersburg. FireEye
analysts also found that APT28 has systematically evolved its malware
since 2007, using flexible and lasting platforms indicative of plans for
long-term use and sophisticated coding practices that suggest an
interest in complicating reverse engineering efforts. Access the report at: https://www2.fireeye.com/apt28.html Share your comments with the Cloud and Cyber Security Center.
No comments:
Post a Comment