Inside an APT campaign with multiple targets in India and Japan

From Botnets.fr
Revision as of 03:44, 19 August 2015 by Eric.freyssinet (talk | contribs)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search

(Publication) Google search: [1]

Inside an APT campaign with multiple targets in India and Japan
Botnet
Malware
Botnet/malware group
Exploit kits
Services
Feature
Distribution vector
Target
Origin
Campaign Luckycat
Operation/Working group
Vulnerability
CCProtocol
Date 2012 / 2012-03-26
Editor/Conference Trend Micro
Link http://www.trendmicro.com/cloud-content/us/pdfs/security-intelligence/white-papers/wp luckycat redux.pdf (Archive copy)
Author
Type Tech report

Abstract

The Luckycat campaign targeted the following industries and/or communities:

  • Aerospace
  • Energy
  • Engineering
  • Shipping
  • Military research
  • Tibetan activists

The Luckycat campaign attacked a diverse set of targets using a variety of malware, some of which have been linked to other cyber-espionage campaigns. The attackers behind this campaign maintain a diverse set of C&C infrastructure and leverages anonymity tools to obfuscate their operations. We were able to track elements of this campaign to hackers based in China.

Bibtex

 @misc{Lua error: Cannot create process: proc_open(/dev/null): failed to open stream: Operation not permitted2012BFR4669,
   editor = {Trend Micro},
   author = {},
   title = {Inside an APT campaign with multiple targets in India and Japan},
   date = {26},
   month = Mar,
   year = {2012},
   howpublished = {\url{http://www.trendmicro.com/cloud-content/us/pdfs/security-intelligence/white-papers/wp_luckycat_redux.pdf}},
 }