La tua posizione Home  :: Libreria articoli :: CyberSecurity :: Threat Actors -> ChamelGang [China]

 
      Menu principale
  Home
      About: Totocellux
      LinkedIn
      X (Twitter)
      GitHub
  Libreria articoli
      Avvisi Portale
      Software
      Hardware
      CyberSecurity
      Networking
      Telefonia
      Virtualizzazione
  Galleria Web
  Forum

Benvenuto Ospite, nel Portale Campolo.eu:
se sei già utente effettua il login,
altrimenti puoi facilmente registrarti.

[Registrati] [Login]

      Skin
Seleziona la skin dell'interfaccia

      Moduli
XML - Risorsa di notizie
Consiglia Campolo.eu ai tuoi amici

      Sondaggio settimanale
What do you think of Phoenix?
 
Creative AND Clean
Creative NOT Clean
NOT Creative BUT Clean
NOT (Creative AND Clean)

      ChamelGang [China]
espandi info/opzioni dell'articolo | Opzioni articolo | Sommario |
Names ChamelGang (Positive Technlogies) CamoFei (TeamT5) Country China China Motivation Information theft and espionage First seen 2021 Description (Positive Technologies) In Q2 2021, the PT Expert Security Center incident response team conducted an investigation in an energy company. The investigation revealed that the company's network had been compromised by an unknown group for the purpose of data theft. We gave the group the name ChamelGang (from the word 'chameleon'), because the group disguised its malware and network infrastructure under legitimate services of Microsoft, TrendMicro, McAfee, IBM, and Google. The attackers employed two methods. They acquired domains that imitate legitimate ones. In addition, the APT group placed SSL certificates that also imitated legitimate ones on its servers. To achieve their goal, the attackers used a trending penetration method—supply chain. The group compromised a subsidiary and penetrated the target company's network through it. Observed Sectors: Aviation, Energy, Government. Countries: Afghanistan, Brazil, India, Japan, Lithuania, Nepal, Russia, Taiwan, Turkey, USA, Vietnam. Tools used 7-Zip, BeaconLoader, Cobalt Strike, DoorMe, FRP, ProxyT, Tiny SHell. Operations performed 2022 ChamelGang & Friends | Cyberespionage Groups Attacking Critical Infrastructure with Ransomware Jun 2023 ChamelGang and ChamelDoH: A DNS-over-HTTPS implant Information Last change to this card: 26 August 2024
 
a Threat Actors
a libreria articoli
Home 

 
      Statistiche del Portale
numero di categorie: [ 44 ] / numero di articoli: [ 108 ]
Numero di collaboratori registrati localmente: [ 4 ]
Numero di accessi unici: [ 803 ]

 
This site is Phoenix Technology Enabled tempo di generazione pagina: [0.039063] secondi
Si consiglia l'uso del browser Google Chrome!!
Powered by Phoenix (UglySabiSkinner)
:: Informativa privacy/cookies ::
Contatta l'Amministratore