Home Icon

Loading, Please Wait...

CST: 30/09/2020 16:24:51   

Anomali Threat Research Team Discovers BITTER APT Phishing Campaign Targeting People's Republic of China Government Agencies

418 Days ago

Threat Actors May Be Stealing Credentials from Agency Officials, Conducting Espionage

LAS VEGAS, Aug. 08, 2019 (GLOBE NEWSWIRE) -- BLACK HAT — Anomali, a leader in intelligence-driven cybersecurity solutions, today published its latest research report: Suspected BITTER APT Continues Targeting Government of China and Chinese Organizations

The Anomali Threat Research Team discovered this new phishing attack leveraging spoof sites that appear to be designed to steal email credentials from target victims within the government of the People’s Republic of China. Although the attackers’ exact motivation is unknown, it is logical to conclude that this is an espionage campaign. 

By stealing email credentials, and accessing internal email content, it would be possible for infiltrators to gain insight into decisions being made within the target organizations. Once in, threat actors could also gain access to sensitive information. 

Attack victims are members of staff for the organizations being targeted. Most of the agencies being phished relate to economic trade, defense, aviation, and foreign relations. This suggests that the attackers are likely to be an actor or group operating under a mandate to understand China’s international goals. 

China-based CERT 360 has previously reported on related indicators being attributed to BITTER APT. This group is known to operate out of a South Asian country and is a suspected Indian APT in open source reporting. BITTER APT campaigns primarily target China, Pakistan and Saudi Arabia historically.

Phishing Defense
Although the attack identified is targeting officials within the government of the People's Republic of China, it is important for all organizations to understand that threat actors use the same methods and techniques to target the public and private sectors. Organizations at risk of being targeted in the manner observed should take several basic precautionary steps. This includes having security controls in place that integrate threat intelligence about active attacks, defense-in-depth protections including firewalls, and regular security training for employees that includes anti-phishing education. 

To learn more about Anomali and how hundreds of enterprises use it to reduce risk, visit us on the exhibitor floor at Black Hat USA 2019, #1114. 

Twitter: https://twitter.com/Anomali
LinkedIn: https://www.linkedin.com/company/anomali/
Blog: https://www.anomali.com/blog

About Anomali
Anomali® detects adversaries and tells you who they are. Organizations rely on Anomali to detect threats, understand adversaries, and respond effectively. Anomali arms security teams with machine learning optimized threat intelligence and identifies hidden threats targeting their environments. The platform enables organizations to collaborate and share threat information among trusted communities and is the most widely adopted platform for ISACs and leading enterprises worldwide. For more information, visit us at www.anomali.com

Joe Franscella
News Media Relations

We Are Diffrent
Is your business listed correctly on America’s largest city directory network of 1,000 portals?