Researchers Uncover a New Type of APT Group

Password Blogs | IEMLabs

In the past decade, the word has witnessed an exponential growth in technology. But such development comes with its own pros and cons. With the growth of technology, there has also been an increase in cybercrime and cyber attacks. Black hat hackers are either producing sophisticated technologies for attacking vulnerable systems or using sophisticated technologies created by others to hack into vulnerable systems. 

But recently, there has been a rise of a new kind of an APT(Advanced Persistent Threat) group that has come into the limelight. Researchers have got an idea on how this group is attacking systems to get easy money out of them. This APT group uses Dynamic Link Library(DLL) side-loading attacks. Although this kind of attacks have occurred before, researchers have found that this group is using never-seen-before sophisticated tools for their attacks. 

According to the researchers, there are two kinds of criminal groups, either there are the ones who create or code their own tools or there are those who use tools provided by others. But the researchers have concluded that this APT group is unlike their previous counterparts. They are using the best parts of both the worlds. The attacks have mostly been on non-governmental organisations in Myanmar, most probably for swindling easy money out of these organisations.


By Hrithik Lall

IEMLabs is an ISO 27001:2013 and ISO 9001:2015 certified company, we are also a proud member of EC Council, NASSCOM, Data Security Council of India (DSCI), Indian Chamber of Commerce (ICC), U.S. Chamber of Commerce, and Confederation of Indian Industry (CII). The company was established in 2016 with a vision in mind to provide Cyber Security to the digital world and make them Hack Proof. The question is why are we suddenly talking about Cyber Security and all this stuff? With the development of technology, more and more companies are shifting their business to Digital World which is resulting in the increase in Cyber Crimes.

Leave a comment

Your email address will not be published.

This site is under maintenance,
some features might not work!!!