Category | Details |
---|---|
Threat Actors | LockBit 3.0, KillSec, Stormous; other unnamed actors sharing data on dark web forums |
Campaign Overview | Cyberattacks targeting Indian industries across ransomware, phishing, and data breaches |
Target Regions/Victims | Indian industries: Manufacturing, Information Services, Telecommunications, Education, National Security |
Methodology | – Ransomware – Phishing attacks – Dark web data leaks and tool sharing – Credential theft |
Product Targeted | Exposed credentials, industrial data, website vulnerabilities, databases |
Malware Reference | Credential stealers (unnamed in the report) |
Tools Used | – Ransomware tools (LockBit 3.0, etc.) – Credential-stealing malware – Tools shared on dark web forums |
Vulnerabilities Exploited | – Exposed credentials – Weak cybersecurity measures – Vulnerable websites |
TTPs | – Ransomware deployment targeting manufacturing – Data sharing and sales on dark web forums – Phishing campaigns against Information Services and Telecommunications industries |
Attribution | Primarily LockBit 3.0, followed by KillSec and Stormous |
Recommendations | – Strengthen security measures, especially in manufacturing, education, and information industries – Monitor and remediate exposed credentials – Increase phishing awareness and training for employees – Adopt advanced threat intelligence and monitoring tools |
Source | SOCRADAR |
Read full article: https://socradar.io/unveiling-indias-cyber-threat-landscape/
The above summary has been generated by an AI language model
Leave a Reply