Inside an APT campaign with multiple targets in India and Japan
Jump to navigation
Jump to search
(Publication) Google search: [1]
Inside an APT campaign with multiple targets in India and Japan | |
---|---|
Botnet | |
Malware | |
Botnet/malware group | |
Exploit kits | |
Services | |
Feature | |
Distribution vector | |
Target | |
Origin | |
Campaign | Luckycat |
Operation/Working group | |
Vulnerability | |
CCProtocol | |
Date | 2012 / 2012-03-26 |
Editor/Conference | Trend Micro |
Link | http://www.trendmicro.com/cloud-content/us/pdfs/security-intelligence/white-papers/wp luckycat redux.pdf (Archive copy) |
Author | |
Type | Tech report |
Abstract
“ The Luckycat campaign targeted the following industries and/or communities:
- Aerospace
- Energy
- Engineering
- Shipping
- Military research
- Tibetan activists
The Luckycat campaign attacked a diverse set of targets using a variety of malware, some of which have been linked to other cyber-espionage campaigns. The attackers behind this campaign maintain a diverse set of C&C infrastructure and leverages anonymity tools to obfuscate their operations. We were able to track elements of this campaign to hackers based in China.
Bibtex
@misc{Lua error: Cannot create process: proc_open(/dev/null): failed to open stream: Operation not permitted2012BFR4669, editor = {Trend Micro}, author = {}, title = {Inside an APT campaign with multiple targets in India and Japan}, date = {26}, month = Mar, year = {2012}, howpublished = {\url{http://www.trendmicro.com/cloud-content/us/pdfs/security-intelligence/white-papers/wp_luckycat_redux.pdf}}, }