{"id":7413,"date":"2022-04-14T12:38:15","date_gmt":"2022-04-14T19:38:15","guid":{"rendered":"https:\/\/webdev.securin.xyz\/?p=7413"},"modified":"2023-04-05T12:33:57","modified_gmt":"2023-04-05T19:33:57","slug":"prevent-falling-victim-to-apt-groups-using-securins-ai-based-vulnerability-and-threat-intelligence","status":"publish","type":"post","link":"https:\/\/webdev.securin.xyz\/articles\/prevent-falling-victim-to-apt-groups-using-securins-ai-based-vulnerability-and-threat-intelligence\/","title":{"rendered":"Securin\u2019s AI-Based Insights into APT Groups and Their Arsenal"},"content":{"rendered":"
The only way for organizations to stay safe from today\u2019s state-of-the-art threats is to secure the exposures in their attack surfaces. Securin\u2019s predictive warnings, combined with years of threat research experience, can help identify and address possible attack vectors, before they can be exploited.\u00a0<\/strong><\/p>\n <\/p>\n The last couple of years have seen heightened activity in terms of cyber attacks, website hacks and network outages. This has also brought to the forefront a variety of threat actors who are constantly scouting for exposures to exploit; their intentions varying from disinformation, propaganda, espionage, to destructive cyber attacks. This blog calls attention to a specific category of threat actors, the Advanced Persistent (APT) Groups.<\/p>\n <\/p>\n Advanced Persistent Groups can be nation-state or state-sponsored threat actors, or actors who attack with motives like identity theft or financial gain, stealthily invading networks and causing cumulative damage over extended periods. As they do not demand ransoms or claim attack victims on leak sites, they usually remain undetected for prolonged periods, thus compounding the damage – a classic example being the Elephant Beetle group<\/a>. This makes it all the more critical to ward off such threats by proactively monitoring the exposures in organizational attack surfaces and addressing the ones that could give rise to network compromises.<\/p>\n <\/p>\n In this blog, we probe deeper into the findings from Securin\u2019s continued research on APT groups and the vulnerabilities they are after.<\/strong><\/p>\n <\/p>\n Our research has identified 117 distinct APT groups with vulnerability associations, cumulatively using 235 vulnerabilities to invade victim networks.<\/p>\n<\/blockquote>\n <\/p>\n <\/p>\n Of the APT groups identified, 89 groups are backed by 18 nation states. State-sponsored groups are known to target intellectual property and critical industry sectors in order to establish a competitive advantage over the target nation. China, Russia and Iran are linked to the most number of threat groups, with the former two nations together accounting for almost 63% of all known groups.<\/p>\n <\/p>\n <\/p>\n We analyzed the top APT groups by the number of vulnerabilities associated. Unsurprisingly, the top position goes to the Russia-based Nobelium<\/a>, or the APT 28 group, best known for the Solarwinds incident<\/a> that brought a whole new dimension to supply chain attacks.<\/p>\n <\/p>\n Interestingly, a North Korean group, APT 37 (Kimsuky, InkySquid, Reaper and ScarCruft) bags the 3rd spot, with 20 vulnerabilities in its arsenal. The group\u2019s primary targets are China, Hong Kong, India, Japan, Kuwait, Nepal, Romania, Russia, South Korea, UK, USA, Vietnam and the Middle East. APT37 is also known to have waged attacks against the Ministry of Unification, Sejong Institute, Korea Institute for Defense Analyses, and Republic of Korea\/South Korea. APT37 was highly active in the latter half of 2021, with many small campaigns across multiple industries.<\/p>\n <\/p>\n\n
State-Sponsored APT Groups<\/h2>\n
Most Dangerous APT groups<\/h2>\n