fbpx
Frame-14

Privacy Ninja

        • DATA PROTECTION

        • CYBERSECURITY

        • Penetration Testing

          Secure your network against various threat points. VA starts at only S$1,000, while VAPT starts at S$4,000. With Price Beat Guarantee!

        • API Penetration Testing
        • Enhance your digital security posture with our approach that identifies and addresses vulnerabilities within your API framework, ensuring robust protection against cyber threats targeting your digital interfaces.

        • On-Prem & Cloud Network Penetration Testing
        • Boost your network’s resilience with our assessment that uncovers security gaps, so you can strengthen your defences against sophisticated cyber threats targeting your network

        • Web Penetration Testing
        • Fortify your web presence with our specialised web app penetration testing service, designed to uncover and address vulnerabilities, ensuring your website stands resilient against online threats

        • Mobile Penetration Testing
        • Strengthen your mobile ecosystem’s resilience with our in-depth penetration testing service. From applications to underlying systems, we meticulously probe for vulnerabilities

        • Cyber Hygiene Training
        • Empower your team with essential cybersecurity knowledge, covering the latest vulnerabilities, best practices, and proactive defence strategies

        • Thick Client Penetration Testing
        • Elevate your application’s security with our thorough thick client penetration testing service. From standalone desktop applications to complex client-server systems, we meticulously probe for vulnerabilities to fortify your software against potential cyber threats.

        • Source Code Review
        • Ensure the integrity and security of your codebase with our comprehensive service, meticulously analysing code quality, identifying vulnerabilities, and optimising performance for various types of applications, scripts, plugins, and more

        • Email Spoofing Prevention
        • Check if your organisation’s email is vulnerable to hackers and put a stop to it. Receive your free test today!

        • Email Phishing Excercise
        • Strengthen your defense against email threats via simulated attacks that test and educate your team on spotting malicious emails, reducing breach risks and boosting security.

        • Cyber Essentials Bundle
        • Equip your organisation with essential cyber protection through our packages, featuring quarterly breached accounts monitoring, email phishing campaigns, cyber hygiene training, and more. LAUNCHING SOON.

Facebook Unmasks Vietnam’s APT32 Hacking Group

Facebook Unmasks Vietnam’s APT32 Hacking Group

The Facebook security team has revealed today the real identity of APT32, a Vietnam-backed hacking group active in cyberespionage campaigns targeting foreign government, multi-national corporations, and journalists since at least 2014.

The APT32 nation-state hackers were linked to Vietnamese IT firm CyberOne Group in a report published earlier today by Nathaniel Gleicher, Facebook’s Head of Security Policy, and Mike Dvilyanski, Cyber Threat Intelligence Manager.

“Our investigation linked this activity to CyberOne Group, an IT company in Vietnam (also known as CyberOne Security, CyberOne Technologies, Hành Tinh Company Limited, Planet and Diacauso),” they said.

“As our industry partners have previously reported, APT32 has deployed a wide range of adversarial tactics across the internet. We have been tracking and taking action against this group for several years.”

After making the connection between the APT group and the Vietnamese IT firm, Facebook added all associated domains with the two entities to a global block list to prevent them from being shared on the social network.

Facebook also removed all accounts associated with the group from its platform and notified the individuals that may have been targeted by APT32.

APT32’s tactics, techniques, and procedures

The report also detailed some of the most important TTPs APT32 used throughout the years including social engineering, as well as using malicious Play Store Android apps and watering holes to compromise their targets’ devices and use them for “broad surveillance.”

APT32 operators have posed as businesses and activists on various online platforms and used these fake personas to evade detection even when scrutinized by security researchers.

Also Read: What is Pentest Report? Here’s A Walk-through

“Some of their Pages were designed to lure particular followers for later phishing and malware targeting,” the report says.

APT32’s watering holes were used to deliver custom-tailored malware payloads capable of targeting specific platforms (i.e., Windows and macOS) and attacks directed at various individuals and organizations including:

  • Vietnamese human rights activists locally and abroad
  • Various foreign governments including those in Laos and Cambodia
  • Non-governmental organizations,
  • News agencies
  • Businesses from various industry sectors (e.g., information technology, hospitality, hospitals, retail, auto industry, and mobile services)

“The latest activity we investigated and disrupted has the hallmarks of a well-resourced and persistent operation focusing on many targets at once, while obfuscating their origin,” the two Facebook execs added.

“We shared our findings including YARA rules and malware signatures with our industry peers so they too can detect and stop this activity.”

APT32 campaigns and history

APT32 is a Vietnamese-backed advanced persistent threat group (also tracked as OceanLotus and SeaLotus) known to have targeted foreign companies investing in multiple Vietnam industry sectors.

The nation-state hackers are also known to have been behind attacks against a long list of research institutes from around the world, media organizations, various human rights orgs, as well as Chinese maritime construction firms. [1234567]

Last year, they also breached the networks of multiple Toyota and Lexus sales subsidiaries accessing the personal information of roughly 3.1 million Toyota customers, as well as the networks of BMW and Hyundai

They were also linked by threat intelligence and cyber-attack response services firm Crowdstrike to attacks against automotive targets in a report published in October 2019.

Also Read: What Legislation Exists in Singapore Regarding Data Protection and Security?

More recently, APT32 carried out spear-phishing attacks targeting China’s Ministry of Emergency Management and the government of Wuhan province attempting to harvest intelligence on the ongoing COVID-19 crisis.

0 Comments

KEEP IN TOUCH

Subscribe to our mailing list to get free tips on Data Protection and Data Privacy updates weekly!

Personal Data Protection

REPORTING DATA BREACH TO PDPC?

We have assisted numerous companies to prepare proper and accurate reports to PDPC to minimise financial penalties.
×

Hello!

Click one of our contacts below to chat on WhatsApp

× Chat with us