<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Small countries are jumping on the hacking tool bandwagon in Threats</title>
    <link>https://community.isc2.org/t5/Threats/Small-countries-are-jumping-on-the-hacking-tool-bandwagon/m-p/42374#M231</link>
    <description>&lt;P&gt;the Red Drip team reported that APT36 was using a decoy health advisory document to spread a Remote Administration Tool (RAT).&lt;/P&gt;</description>
    <pubDate>Mon, 11 Jan 2021 04:34:47 GMT</pubDate>
    <dc:creator>Andrade265</dc:creator>
    <dc:date>2021-01-11T04:34:47Z</dc:date>
    <item>
      <title>Small countries are jumping on the hacking tool bandwagon</title>
      <link>https://community.isc2.org/t5/Threats/Small-countries-are-jumping-on-the-hacking-tool-bandwagon/m-p/42296#M228</link>
      <description>&lt;P&gt;Hi All&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Not immediately obvious, but countries with less resources, are now jumping on the cyber security hacking and using tools readily available against their own people and other countries:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.darkreading.com/vulnerabilities---threats/even-small-nations-have-jumped-into-the-cyber-espionage-game/d/d-id/1339846?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple" target="_blank"&gt;https://www.darkreading.com/vulnerabilities---threats/even-small-nations-have-jumped-into-the-cyber-espionage-game/d/d-id/1339846?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_Cautim&lt;/P&gt;</description>
      <pubDate>Mon, 09 Oct 2023 09:45:19 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Threats/Small-countries-are-jumping-on-the-hacking-tool-bandwagon/m-p/42296#M228</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2023-10-09T09:45:19Z</dc:date>
    </item>
    <item>
      <title>Re: Small countries are jumping on the hacking tool bandwagon</title>
      <link>https://community.isc2.org/t5/Threats/Small-countries-are-jumping-on-the-hacking-tool-bandwagon/m-p/42374#M231</link>
      <description>&lt;P&gt;the Red Drip team reported that APT36 was using a decoy health advisory document to spread a Remote Administration Tool (RAT).&lt;/P&gt;</description>
      <pubDate>Mon, 11 Jan 2021 04:34:47 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Threats/Small-countries-are-jumping-on-the-hacking-tool-bandwagon/m-p/42374#M231</guid>
      <dc:creator>Andrade265</dc:creator>
      <dc:date>2021-01-11T04:34:47Z</dc:date>
    </item>
    <item>
      <title>Re: Small countries are jumping on the hacking tool bandwagon</title>
      <link>https://community.isc2.org/t5/Threats/Small-countries-are-jumping-on-the-hacking-tool-bandwagon/m-p/42375#M232</link>
      <description>&lt;P&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/716813721"&gt;@Andrade265&lt;/a&gt;that is disturbing &lt;A href="https://www.varonis.com/blog/apt-groups/" target="_blank" rel="noopener"&gt;https://www.varonis.com/blog/apt-groups/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Mythic Leopard has been linked to Pakistan and mainly focuses its resources on hacking and spear-phishing Indian government entities. The driving force behind these attacks is espionage to gain intelligence from the Indian government, military and other private Indian sectors. Using spear-phishing emails, Mythic Leopard was able to &lt;A href="https://cysinfo.com/cyber-attack-targeting-cbi-and-possibly-indian-army-officials/" target="_blank" rel="noopener noreferrer"&gt;infect targets&lt;/A&gt; using a malicious Excel file.&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Origin: Pakistan&lt;/LI&gt;&lt;LI&gt;Established: 2016&lt;/LI&gt;&lt;LI&gt;Primary Targets: India and the Indian Army&lt;/LI&gt;&lt;LI&gt;Weapon of Choice: Social Engineering&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Previously, they would have used proxies to do their dirty work or paid for others to carry it out.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Plus the fact that Pakistan and India have a long standing hatred of each other too.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Indian governmental defense organizations and their personnel are the latest victims of APT36, a Seqrite article reports. Fake profiles of attractive women are used as bait in honey traps set up by APT36. Those that visit the fake profiles receive emails with attachments or are engaged in conversations over messaging applications where they are presented with links to malware or the malware itself. Once the victim opens the attachment, Crimson RAT is subsequently installed on their system. Crimson RAT is known for stealing data and reporting it back to its command and control servers. This campaign has been labeled "Operation Honey Pot" by Seqrite. For full technical details of this campaign, please see the link in the Reference section below.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;UL class="public-DraftStyleDefault-ul"&gt;&lt;LI&gt;&lt;DIV class="public-DraftStyleDefault-block public-DraftStyleDefault-ltr"&gt;&lt;A href="https://www.seqrite.com/blog/operation-honey-trap-apt36-targets-defense-organizations-in-india/" target="_blank" rel="noopener noreferrer"&gt;&lt;SPAN&gt;https://www.seqrite.com/blog/operation-honey-trap-apt36-targets-defense-organizations-in-india/&lt;/SPAN&gt;&lt;/A&gt;&lt;/DIV&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Cautim_Caute&lt;/P&gt;</description>
      <pubDate>Mon, 11 Jan 2021 04:55:50 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Threats/Small-countries-are-jumping-on-the-hacking-tool-bandwagon/m-p/42375#M232</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2021-01-11T04:55:50Z</dc:date>
    </item>
  </channel>
</rss>

