by Michael Mimoso March 17, 2016
With every APT report there comes the gnawing question of whodunit. Just this week, a Reuters report linked a spree of ransomware attacks against U.S. companies to state-sponsored hacker groups in China.
Most reports, however, offer no tangible evidence other than technological footprints that can easily be faked, or are intentionally deceptive.
Related Posts Five-Year ‘Dust Storm’ APT Campaign Targets Japanese Critical Infrastructure February 24, 2016 , 2:11 pm Operation Blockbuster Coalition Ties Destructive Attacks to Lazarus Group February 24, 2016 , 8:00 am Metel Bank Robbers Borrowing from APT Attacks February 8, 2016 , 7:20 am On Wednesday at CanSecWest 2016 in Vancouver, Kaspersky Lab researchers Brian Bartholomew and Juan Andres Guerrero-Saade identified a growing trend among APT gangs of flying false flags to throw cybercrime investigators and malware researchers off the scent.
Full Article
Login to the community
No account yet? Create an account
Enter your username or e-mail address. We'll send you an e-mail with instructions to reset your password.