Link Search Menu Expand Document

APT3


State-backed: China

Associated Groups : Gothic Panda, Pirpi, UPS Team, Buckeye, Threat Group-0110, TG-0110

Estimated time of origin:

Target sectors: Aerospace and Defense, Construction and Engineering, High Tech, Telecommunications, Transportation

Strategy : Phishing campaign exploiting Adobe Flash (CVE-2015-3113 & CVE-2015-5119) and bypass Address Space Layout Randomization (ASLR), and uses Return-Oriented Programming (ROP) to bypass Data Execution Prevention (DEP).

Malwares:

Noteworthy:

  • Shift attack to Hong Kong.
  • Uses 0day vulnerabilities that can bypass ASLR & DEP.
  • CVE-2015-5119 was leaked from Hacking Team data breach, then used by APT3 & APT18.

Reference


Symatec: Buckeye cyberespionage group shifts gaze from US to Hong Kong MITRE ATT&CK FireEye: New Zero-Day Exploit targeting Internet Explorer