Press ESC to close

Dark Web Profile: Patchwork APT

CategoryDetails
Threat ActorsPatchwork APT (also known as Dropping Elephant, Quilted Tiger, Viceroy Tiger); believed to be Indian-based cyber espionage group active since 2009.
Campaign OverviewFocused on cyber espionage against government, defense, and diplomatic organizations using spear phishing, watering hole attacks, and malware like BADNEWS RAT and VajraSpy.
Target Regions (Victims)South and Southeast Asia, Europe, North America, particularly Pakistan, Sri Lanka, Uruguay, Bangladesh, Taiwan, Australia, and the US. Targeted sectors include aviation, defense, energy, financial, government, IT, media, NGOs, pharmaceutical, and think tanks.
Methodology– Spear phishing with malicious attachments or links.
– Watering hole attacks by compromising legitimate websites.
– Exploiting vulnerabilities (e.g., CVE-2017-0261) for malware delivery.
– Use of honey-trap romance scams for Android targeting.
Product TargetedGovernment systems, diplomatic entities, Android devices (via VajraSpy RAT), and sectors involved in Chinese foreign relations or geopolitical matters.
Malware ReferenceBADNEWS RAT, VajraSpy RAT.
Tools UsedCustom malware, spear phishing payloads, watering hole techniques, remote access trojans (RATs), malicious Android apps.
Vulnerabilities Exploited– CVE-2017-0261 (remote code execution in Microsoft documents).
– Vulnerabilities in Android (used for VajraSpy payloads).
TTPs– Targeting diplomats, academics, and think tanks.
– Using phishing, social engineering, and watering hole attacks.
– Deploying malware like VajraSpy via fake apps.
– Data exfiltration through Firebase C&C servers.
– Persistent access via privilege escalation.
AttributionSideWinder APT attributed based on overlap in C&C infrastructure and historical targeting of geopolitical adversaries.
Recommendations– Apply patches for known vulnerabilities.
– Use email filtering and multi-factor authentication.
– Implement endpoint security and network segmentation.
– Provide user awareness training.
– Regularly test incident response plans.
– Limit app permissions.
SourceSOCRadar

Read full article: https://socradar.io/dark-web-profile-patchwork-apt/

The above summary has been generated by an AI language model

Leave a Reply

Your email address will not be published. Required fields are marked *