21.11.2015 Views

dissection of a Cyber- Espionage attack

cct-w08_evolving-threats-dissection-of-a-cyber-espionage-attack

cct-w08_evolving-threats-dissection-of-a-cyber-espionage-attack

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

The adversary<br />

APT28<br />

#RSAC<br />

The <strong>attack</strong> has been attributed to APT Group 28, also known as “S<strong>of</strong>acy” or<br />

“Sednit”. I will call it “APT28” from now on.<br />

APT28 group believed to have been in operation since 2007 and has been<br />

identified in several <strong>attack</strong>s that have targeted Eastern European governments,<br />

military and security-related organizations including the North Atlantic Treaty<br />

Organization (NATO).<br />

The group uses a complex set <strong>of</strong> tools and strategies to put a foothold in an<br />

environment and to control and steal interesting data.<br />

Several sources consider APT28 a group <strong>of</strong> <strong>Cyber</strong>Mercs based in Russia.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!