Friday , March 28 2025
Asian APT

Securelist report
Modern Asian APT groups’ tactics, techniques and procedures

Research is regularly published about Asian APT groups targeting organizations from different industries. These campaigns and incidents don’t only happen in one region.

Research like this usually includes detailed information about the tools used by APT actors, the vulnerabilities they exploit, and sometimes even specific attribution. Despite the abundance of these reports, companies often lack preparation to fend off such attackers.

OpenAI Offering $100K Bounties for Critical Vulns

OpenAI has increased its maximum bug bounty payout to $100,000, up from $20,000, to encourage the discovery of critical vulnerabilities...
Read More
OpenAI Offering $100K Bounties for Critical Vulns

Splunk Alert User RCE and Data Leak Vulns

Splunk has released a security advisory about critical vulnerabilities in Splunk Enterprise and Splunk Cloud Platform. These issues could lead...
Read More
Splunk Alert User RCE and Data Leak Vulns

CIRT alert Situational Awareness for Eid Holidays

As the Eid holidays near, cybercriminals may try to take advantage of weakened security during this time. The CTI unit...
Read More
CIRT alert Situational Awareness for Eid Holidays

Cyberattack on Malaysian airports: PM rejected $10 million ransom

Operations at Kuala Lumpur International Airport (KLIA) were unaffected by a cyber attack in which hackers demanded US$10 million (S$13.4...
Read More
Cyberattack on Malaysian airports: PM rejected $10 million ransom

Micropatches released for Windows zero-day leaking NTLM hashes

Unofficial patches are available for a new Windows zero-day vulnerability that allows remote attackers to steal NTLM credentials by deceiving...
Read More
Micropatches released for Windows zero-day leaking NTLM hashes

VMware Patches Authentication Bypass Flaw in Windows Tool

On Tuesday, VMware issued an urgent fix for a security flaw in its VMware Tools for Windows. CVE-2025-22230 allows a...
Read More
VMware Patches Authentication Bypass Flaw in Windows Tool

IngressNightmare
Over 40% of cloud environments are vulnerable to RCE

Kubernetes users of the Ingress NGINX Controller are advised to fix four newly found remote code execution ( RCE) vulnerabilities,...
Read More
IngressNightmare  Over 40% of cloud environments are vulnerable to RCE

(CVE-2025-29927)
Urgently Patch Your Next.js for Authorization Bypass

Next.js, a widely used React framework for building full-stack web applications, has fixed a serious security vulnerability. Used by many...
Read More
(CVE-2025-29927)  Urgently Patch Your Next.js for Authorization Bypass

Oracle refutes breach after hacker claims 6 million data theft

A hacker known as “rose87168” claims to have stolen six million records from Oracle Cloud servers. The stolen data includes...
Read More
Oracle refutes breach after hacker claims 6 million data theft

Russian zero-day seller to offer up to $4 million for Telegram exploits

Operation Zero, a Russian zero-day broker, is offering up to $4 million for Telegram exploits. They seek $500K for one-click...
Read More
Russian zero-day seller to offer up to $4 million for Telegram exploits

ALSO READ:

Exploring engagement of political parties on Facebook in Bangladesh

Cybersecurity professionals need advanced tools and techniques to combat threats. Along with expertise and experience, they also require infrastructure, asset management, vulnerability management, network segmentation, audits, and data security tools. Unprepared infrastructure is often the main reason Asian APT groups can carry out successful attacks.

Securlist report on Asian APT groups reveals their valuable intelligence. These groups attack many countries and industries. Our analysis of hundreds of attacks shows a common pattern and limited techniques used in various stages of the Cyber Kill Chain. Unfortunately, security teams struggle to detect these attacks in their own infrastructure.

Intended audience of this report:

The report provide the cybersecurity community with the best-prepared intelligence data to effectively counteract Asian APT groups. This report will be the most helpful to the following:

SOC analysts

Cyber Threat Intelligence analysts

Threat Hunting experts

Digital Forensics (DFIR) experts

Cybersecurity experts

Domain administrators

C-Level executives responsible for cybersecurity at their companies

This material is a knowledge library about the main approaches used by Asian APT groups for hacking infrastructure. The report contains detailed information about the attackers’ tactics, techniques, and procedures (TTPs) based on the MITRE ATT&CK methodology.

Check Also

March 2025

Qualcomm’s March 2025 Security Bulletin Highlights Major Vulns

Qualcomm’s March 2025 Security Bulletin addresses vulnerabilities in its products, including automotive systems, mobile chipsets, …

Leave a Reply

Your email address will not be published. Required fields are marked *