APT Campaigns
181 article(s)
🗓 16 Apr 2026 · 👤 AGONY
A gripping, stepwise account of how forensic experts dissected an APT attack on a CEO’s computer—from phishing email to Cobalt Strike beacon, and the critical lessons for defense.
🗓 14 Apr 2026 · 👤 AGONY · 🌍 Africa
A cunning new PlugX worm is spreading across continents via USB drives, sideloading itself through trusted software and stealing sensitive documents—while staying nearly invisible. Here’s how it works and why it matters.
🗓 14 Apr 2026 · 👤 AGONY · 🌍 Asia
APT41’s latest Linux backdoor targets major cloud providers using innovative SMTP tactics, enabling undetectable credential theft and lateral movement across enterprise environments.
🗓 13 Apr 2026 · 👤 AGONY · 🌍 Asia
APT41 is using an undetectable Linux backdoor to steal cloud credentials from major providers, blending malicious traffic into normal operations and evading traditional security tools. Learn how this stealth campaign works and how organizations can defend against it.
🗓 13 Apr 2026 · 👤 AGONY · 🌍 Africa
BITTER APT has launched a sophisticated campaign targeting Middle Eastern journalists and activists, using spearphishing and fake app logins to deploy advanced spyware like ProSpy.
🗓 13 Apr 2026 · 👤 AGONY · 🌍 Asia
APT37 is using Facebook and Telegram to lure defense sector targets into downloading trojanized software, enabling covert data theft via cloud services. Their evolving tactics blend social engineering with technical stealth, making detection harder than ever.
🗓 13 Apr 2026 · 👤 AGONY · 🌍 North America
A recent attack on Mexico’s government illustrates how attackers are using AI to automate and supercharge cyber intrusions. The incident marks a turning point, signaling the need for continuous resilience in cybersecurity.
🗓 13 Apr 2026 · 👤 AGONY · 🌍 Asia
APT37’s new cyber-espionage campaign uses Facebook, Telegram, and a trojanized PDF installer to steal sensitive data from defense targets. The operation combines social engineering with advanced, fileless malware and cloud-based command-and-control, highlighting the evolving sophistication of North Korean cyber threats.
🗓 10 Apr 2026 · 👤 AGONY
Mercenary hackers have unleashed ProSpy spyware across the Middle East, using fake secure messaging apps to infiltrate the devices of journalists and activists. This investigation unpacks the methods and implications of the hack-for-hire campaign.
🗓 10 Apr 2026 · 👤 AGONY · 🌍 Africa
A major espionage campaign is targeting Middle Eastern civil society by distributing ProSpy spyware through fake secure messaging apps. Linked to the BITTER APT group, this hack-for-hire operation relies on social engineering and technical deception.
1  
2  
3  
4  
5  
Next »