Woburn, MA – July 27, 2023 – Kaspersky has released its latest quarterly report on Advanced Persistent Threats (APTs) trends, summarizing the latest developments in new and ongoing malicious campaigns. In the second quarter of 2023, researchers found new malware variants, updated toolsets, and fresh techniques from threat actors.
In the quarter’s most significant finding, researchers exposed the long-running “Operation Triangulation” campaign, involving the use of a previously unknown iOS malware platform. Experts also observed other interesting developments that they believe everyone should be aware of. Here are key highlights from the report:
Asia-Pacific witnesses a new threat actor: Mysterious Elephant
Kaspersky uncovered a new threat actor belonging to the Elephants family, operating in the Asia-Pacific region, dubbed “Mysterious Elephant.” In their latest campaign, the threat actor employed new backdoor families, capable of executing files and commands on the victim’s computer, and receiving files or commands from a malicious server for execution on the infected system. While Kaspersky researchers have observed overlaps with Confusius and SideWinder, Mysterious Elephant possesses a distinctive and unique set of TTPs, setting them apart from these other groups.
Toolsets upgraded: Lazarus’ develops new malware variant, BlueNoroff attacks macOS, and more
Lazarus upgraded its MATA framework and introducing a new variant of the sophisticated MATA malware family, MATAv5. BlueNoroff, a financial attack-focused subgroup of Lazarus, has employed new delivery methods and programming languages in recent campaigns, including the use of Trojanized PDF readers, macOS malware, and the Rust programming language. Additionally, ScarCruft APT group has developed new infection methods, evading Mark-of-the-Web (MOTW) security mechanism. The ever-evolving tactics of these threat actors present new challenges for cybersecurity professionals.
Geopolitical influences remain primary drivers of APT activity
APT campaigns remain geographically dispersed, with actors concentrating their attacks on regions including Europe, Latin America, the Middle East and various parts of Asia. Cyber espionage, with a solid geopolitical backdrop, continues to be a dominant agenda for these campaigns.
“While some threat actors stick to familiar tactics like social engineering, others have evolved, refreshing their toolsets and expanding their activities,” said David Emm, principal security researcher at Kaspersky’s Global Research and Analysis Team (GReAT). “Moreover, new advanced actors, such those conducting the ‘Operation Triangulation’ campaign, constantly emerge. This actor uses a previously unknown iOS malware platform distributed through zero-click iMessage exploits. Staying vigilant with threat intelligence and the right defense tools is crucial for global companies, so they can protect themselves against both existing and emerging threats. Our quarterly reviews are designed to highlight the most significant developments among APT groups to help defenders combat and mitigate related risks.”
To read the full APT Q2 2023 trends report, please visit Securelist.
In order to avoid falling victim to a targeted attack by a known or unknown threat actor, Kaspersky researchers recommend implementing the following measures:· Promptly update your operating system and other third-party software to their latest versions. Maintaining a regular update schedule is essential in order to stay protected from potential vulnerabilities and security risks.
· Upskill your cybersecurity team to tackle the latest targeted threats with Kaspersky online training developed by GReAT experts.
· Use the latest Threat Intelligence information to stay up-to-date with the actual TTPs used by threat actors.
· For endpoint level detection, investigation, and timely remediation of incidents, implement EDR solutions such as Kaspersky Endpoint Detection and Response.
· Dedicated services can help combat high-profile attacks. The Kaspersky Managed Detection and Response service can help identify and stop intrusions in their early stages, before the perpetrators achieve their goals. If you encounter an incident, Kaspersky Incident Response service will help you respond and minimize the consequences, in particular – identify compromised nodes and protect the infrastructure from similar attacks in the future.