

These files appear as photo uploads to a website, but are in fact files of stolen data simply masquerading as a JPG.ĬozyBear appears to prefer targeting high-value government-related departments in the US, UK, European Union (including Norway and Germany), South Korea and Uzbekistan.

CozyBear can also hide its network activity by using fake.By using the likes of Twitter to send information to the C&C, it helps them avoid detection. One technique CozyBear uses that isn't seen so much in some of the other APTs on this list is that the Russian actors use social media to communicate with their command and control (C&C) centre.In an alternative technique, victims were shown a Flash video called "Office Monkeys LOL Video.zip", which was not only a video player but also a dropper for the group's CozyDuke malware kit.
Cyber espionage threats from israel pdf#
Cyber espionage threats from israel how to#
The world's new reality is inescapable: cyber espionage groups are out there, and even if your organization isn't a direct target, it's increasingly likely that you may still suffer their impact.Īs we learned during the recent SolarWinds hack, the fact that our world has turned to a highly digital supply chain means companies are so intertwined that if one falls, it can knock out hundreds, if not thousands, more.īut what cyber espionage groups - also known as advanced persistent threats (APT) - are out there right now? What are their common techniques and what have they been doing recently? Below we outline a list of 10 of the top APT groups to be aware of in 2021 - and how to defend against common hacker tactics.
