Difference between revisions of "Inside an APT campaign with multiple targets in India and Japan"
Jump to navigation
Jump to search
(Created page with "{{Publication|Link=http://www.trendmicro.com/cloud-content/us/pdfs/security-intelligence/white-papers/wp_luckycat_redux.pdf}}") |
|||
Line 1: | Line 1: | ||
{{Publication|Link=http://www.trendmicro.com/cloud-content/us/pdfs/security-intelligence/white-papers/wp_luckycat_redux.pdf}} | {{Publication | ||
|Year=2012 | |||
|Date=2012-03-26 | |||
|Editor=Trend Micro | |||
|Link=http://www.trendmicro.com/cloud-content/us/pdfs/security-intelligence/white-papers/wp_luckycat_redux.pdf | |||
|Type=Tech report | |||
|Abstract=The Luckycat campaign targeted the following industries and/or communities: | |||
* Aerospace | |||
* Energy | |||
* Engineering | |||
* Shipping | |||
* Military research | |||
* Tibetan activists | |||
The Luckycat campaign attacked a diverse set of targets using a variety of malware, some of which have been linked to other cyber-espionage campaigns. The attackers behind this campaign maintain a diverse set of C&C infrastructure and leverages anonymity tools to obfuscate | |||
their operations. We were able to track elements of this campaign to hackers based in China. | |||
}} |
Revision as of 03:44, 19 August 2015
(Publication) Google search: [1]
Inside an APT campaign with multiple targets in India and Japan | |
---|---|
Botnet | |
Malware | |
Botnet/malware group | |
Exploit kits | |
Services | |
Feature | |
Distribution vector | |
Target | |
Origin | |
Campaign | |
Operation/Working group | |
Vulnerability | |
CCProtocol | |
Date | 2012 / 2012-03-26 |
Editor/Conference | Trend Micro |
Link | http://www.trendmicro.com/cloud-content/us/pdfs/security-intelligence/white-papers/wp luckycat redux.pdf (Archive copy) |
Author | |
Type | Tech report |
Abstract
“ The Luckycat campaign targeted the following industries and/or communities:
- Aerospace
- Energy
- Engineering
- Shipping
- Military research
- Tibetan activists
The Luckycat campaign attacked a diverse set of targets using a variety of malware, some of which have been linked to other cyber-espionage campaigns. The attackers behind this campaign maintain a diverse set of C&C infrastructure and leverages anonymity tools to obfuscate their operations. We were able to track elements of this campaign to hackers based in China.
Bibtex
@misc{Lua error: Cannot create process: proc_open(/dev/null): failed to open stream: Operation not permitted2012BFR4669, editor = {Trend Micro}, author = {}, title = {Inside an APT campaign with multiple targets in India and Japan}, date = {26}, month = Mar, year = {2012}, howpublished = {\url{http://www.trendmicro.com/cloud-content/us/pdfs/security-intelligence/white-papers/wp_luckycat_redux.pdf}}, }