Source |
CSO |
Identifiant |
8302529 |
Date de publication |
2023-01-19 04:27:00 (vue: 2023-01-19 13:08:57) |
Titre |
Chinese hackers targeted Iranian government entities for months: Report |
Texte |
Chinese advanced persistent threat actor, Playful Taurus, targeted several Iranian government entities between July and December 2022, according to a Palo Alto Networks report. The Chinese threat actor also known as APT15, KeChang, NICKEL, BackdoorDiplomacy, and Vixen Panda, was observed attempting to connect government domains to malware infrastructure previously associated with the APT group, according to the report.“Playful Taurus continues to evolve their tactics and their tooling. Recent upgrades to the Turian backdoor and new C2 infrastructure suggest that these actors continue to see success during their cyber espionage campaigns,” Palo Alto Networks said in a blog. To read this article in full, please click here |
Notes |
★★★
|
Envoyé |
Oui |
Condensat |
2022 according actor actors advanced also alto apt apt15 article associated attempting backdoor backdoordiplomacy between blog campaigns chinese click connect continue continues cyber december domains during entities espionage evolve full government group hackers here infrastructure iranian july kechang known malware months: networks new nickel observed palo panda persistent playful please previously read recent report said see several success suggest tactics targeted taurus these threat tooling turian upgrades vixen the to “playful |
Tags |
Malware
Threat
|
Stories |
APT 15
APT 25
|
Move |
|