The complexities of attack attribution – Week in security with Tony Anscombe

Cyber Security

Video

As highlighted by new ESET research this week, attributing a cyberattack to a specific threat actor is a complex affair

Attributing a cyberattack to a specific threat actor is no easy task, as highlighted by new ESET research published this week. ESET experts recently uncovered a new China-aligned APT group that they named CeranaKeeper and that takes aim at governmental institutions in Thailand, leveraging some tools previously attributed to Mustang Panda. However, a thorough review of the group’s tactics, techniques and procedures (TTPs), code, and infrastructure discrepancies suggests that CeranaKeeper and MustangPanda should be tracked as two separate entities.

How exactly were the attacks executed, and what more is there to know about CeranaKeeper and its relentless hunt for data? Find out in the video and make sure to also read this aptly-named blogpost Separating the bee from the panda: CeranaKeeper making a beeline for Thailand and the related comprehensive white paper CeranaKeeper: A relentless, shape-shifting group targeting Thailand.

Connect with us on FacebookTwitterLinkedIn and Instagram.

Products You May Like

Articles You May Like

DeceptionAds Delivers 1M+ Daily Impressions via 3,000 Sites, Fake CAPTCHA Pages
Lazarus Group Spotted Targeting Nuclear Engineers with CookiePlus Malware
Thousands Download Malicious npm Libraries Impersonating Legitimate Tools
HubPhish Exploits HubSpot Tools to Target 20,000 European Users for Credential Theft
Attackers Exploit Microsoft Teams and AnyDesk to Deploy DarkGate Malware

Leave a Reply

Your email address will not be published. Required fields are marked *