Understand Advanced Persistent Threats (APTs)

Caleb
InfoSec Write-ups
Published in
9 min readNov 16, 2023

--

If you’ve ever wished for a guided tour through the menacing and murky world of cyber threats, you’ve clicked on the right article.

But, don’t worry. There are no gloom and doom prophecies here; only simple, understandable explanations of what Advanced Persistent Threats (APTs) are, how they work, and what you can do to protect yourself.

So, strap in, and let’s explore this mysterious cyberscape.

What are Advanced Persistent Threats?

These threats are advanced because they employ sophisticated methods, like custom malware and zero-day exploits, often created by teams of highly skilled professionals.

They’re persistent in that they usually operate over extended periods, sometimes even years, to achieve their goals.

Let’s take a step back.

One day, I noticed some abnormal behavior on a client’s network. It turned out to be an APT. The attackers, much like experienced burglars, had been silently observing, mapping the network, learning our routines, finding our weak spots, all while staying below the radar.

Tactics, Techniques, and Procedures (TTPs) of APTs

Advanced Persistent Threats are crafty villains that change their methods as needed. However, there is a general playbook they tend to follow, known as the Cyber Kill Chain model.

1. Reconnaissance: The first step is much like casing the joint. The attackers gather as much information as they can about the target, such as technical vulnerabilities, employee habits, and anything else that might give them an edge.

2. Weaponization: In this stage, the attackers create the digital weapons they will use, such as developing custom malware or exploiting known software vulnerabilities.

3. Delivery: The attackers then deliver the weapon, usually through deceptive practices like spear-phishing emails or malicious websites. It’s much like a burglar leaving a “present” at your doorstep.

4. Exploitation & Installation: This stage is where the attack truly begins. The weapon exploits a vulnerability in the system, and the malicious payload is installed.

5. Command and Control: The attackers now have a foothold inside the system and establish a way to control their installed malware remotely. It’s similar to a burglar finding a way into your home and setting up a secret hideout.

6. Actions on Objectives: Now comes the execution of the actual attack. The APTs start stealing data, damaging systems, or whatever else the attackers planned. This is the part where the heist movie reaches its climax and the villains try to get away with their loot.

Defense Against the Dark Arts of APTs

The defense against APTs typically involves a blend of technical measures, user education, and regular monitoring.

1. Threat Intelligence: By keeping tabs on the latest known threats, we can prepare ourselves for what may come our way. Like city guards sharing information about known criminals and their modus operandi.

2. Vulnerability Management: Regularly updating and patching systems is a must. This is like changing your locks and reinforcing your doors and windows after learning about new burglary techniques.

3. Incident Response: A good defense isn’t just about preventing attacks, but also about how quickly and efficiently you can react when an attack does happen.

4. User Education: Even the best security measures can be bypassed by human error. Regular training of employees can prevent simple mistakes like falling for a phishing email.

5. Regular Monitoring: Keeping a vigilant eye on the network is key to catching any unusual activity and dealing with it before it escalates.

The Usual Suspects: APT Groups Around the Globe

While understanding APTs in a broad sense is useful, it’s equally important to know the specific groups operating in this nefarious field.

These groups are usually tagged with identifiers assigned by cybersecurity researchers who first discover them, though occasionally, they even claim these names themselves.

Below are some of the APT groups identified globally, along with the names they’re known by:

China

  • PLA Unit 61398 (also known as APT1)
  • PLA Unit 61486 (also known as APT2)
  • Buckeye (also known as APT3)
  • Red Apollo (also known as APT 10, MenuPass, Stone Panda, or POTASSIUM)
  • Numbered Panda (also known as APT12)
  • DeputyDog (also known as APT17)
  • Codoso Team (also known as APT19)
  • Wocao (also known as APT20)
  • PLA Unit 78020 (also known as APT30 and Naikon)
  • Zirconium (also known as APT31)
  • Periscope Group (also known as APT40)
  • Double Dragon (also known as APT41, Winnti Group, Barium, or Axiom)
  • Tropic Trooper
  • Hafnium

France

  • Animal Farm, identified in 2016 as having been operated by the DGSE

Iran

  • Elfin Team (also known as APT33)
  • Helix Kitten (also known as APT34)
  • Charming Kitten (also known as APT35)
  • APT39
  • Pioneer Kitten

Israel

  • Unit 8200

North Korea

  • Kimsuky
  • Lazarus Group (also known as APT38)
  • Ricochet Chollima (also known as APT37)

Russia

  • Fancy Bear (also known as APT28)
  • Cozy Bear (also known as APT29)
  • Sandworm
  • Berserk Bear
  • FIN7
  • Venomous Bear

United States

  • Equation Group

Uzbekistan

  • SandCat (also known as National Security Service (Uzbekistan))

Vietnam

  • OceanLotus (also known as APT32)

While this list can seem intimidating, it’s essential to remember that this knowledge allows us to understand their tactics, techniques, and procedures better, equipping us to build more robust defenses.

It’s like having a rogue’s gallery in a detective’s office. By studying the “usual suspects,” we can prepare for their next move.

Exploring APTmap on GitHub

The GitHub repository “APTmap” by Andrea Cristaldi offers a unique resource in understanding and visualizing the complex world of Advanced Persistent Threats (APTs). Here’s a detailed overview of what this repository entails:

Overview and Purpose

APTmap is essentially a graphical representation of known APTs.

It’s designed to provide insights into stealthy network threat actors, including nation-states, state-sponsored, and non-state-sponsored groups.

These actors are notorious for conducting targeted, large-scale intrusions for specific objectives while remaining undetected over extended periods​​.

Data Analysis and Accessibility

The repository is remarkable for its extensive data analysis, which is based on static analysis techniques performed on 29GB of malware samples attributed to APT groups.

This data is limited to PE (Portable Executable) files and is made available in JSON format on the GitHub repository.

Such detailed analysis aids in understanding the characteristics and behaviors of various APT groups​​.

Spotlight on Lazarus Group

The Lazarus Group, also known as APT38, is one of the most notorious Advanced Persistent Threat (APT) actors on the global stage.

Believed to be based in North Korea, this group has been linked to a series of high-profile attacks since its emergence around 2009.

Lazarus is widely known for their ambitious and aggressive cyber-espionage campaigns, often involving financial institutions, cryptocurrency exchanges, and other entities associated with financial transactions. They’re not only interested in stealing information but have also been implicated in efforts to directly steal money.

One of the most well-known attacks attributed to the Lazarus Group is the Sony Pictures Entertainment breach in 2014.

This cyberattack resulted in the theft and subsequent leak of unreleased films, sensitive emails, and other proprietary information. The attack, according to U.S. officials, was in retaliation for a film depicting the fictional assassination of North Korea’s leader.

Another major operation attributed to Lazarus was the global WannaCry ransomware attack in 2017, which affected hundreds of thousands of computers across 150 countries, crippling critical infrastructure, including healthcare services, telecommunications, and transportation.

Lazarus was also implicated in the 2016 theft of $81 million from Bangladesh Bank’s account at the Federal Reserve Bank of New York. The audacity and scale of the operation highlighted the group’s capabilities and ambitions.

The Lazarus Group’s toolkit is broad and sophisticated. They’ve been known to use a wide variety of techniques, including spear-phishing emails, watering hole attacks, and zero-day vulnerabilities, among others. Moreover, they employ an array of custom and complex malware, frequently updated to avoid detection.

The activities of the Lazarus Group underscore the rapidly evolving nature of cyber threats and the potential impact they can have. Understanding the methods of groups like Lazarus aids cybersecurity professionals in developing more robust defenses, highlighting the importance of continuous learning and vigilance in the realm of cybersecurity.

Diving into Fancy Bear’s Den

Fancy Bear, also known as APT28, Sofacy, Strontium, or Pawn Storm, is one of the most prominent and active Advanced Persistent Threat (APT) groups on the global scene.

Fancy Bear is widely believed to be connected to the Russian government, more specifically, the Russian military intelligence agency, GRU.

This group has been operational since at least 2008 and has been associated with a wide range of cyber-espionage and disruption campaigns. Their targets are typically related to government and military institutions, defense contractors, political organizations, and individuals of strategic interest across the globe. They are also known to target international organizations, like the World Anti-Doping Agency (WADA), and media companies.

Fancy Bear is perhaps best known for its alleged involvement in the hacking of the Democratic National Committee (DNC) in 2016, which led to a significant leak of emails damaging to the Hillary Clinton campaign. This event significantly raised the profile of APTs in popular consciousness and underscored the potential impact of cyber-espionage on real-world events.

Fancy Bear employs a wide array of techniques in their campaigns, including spear-phishing, drive-by attacks, and exploiting zero-day vulnerabilities.

They are also known for using malware tools such as X-Agent, X-Tunnel, and Sofacy or Seduploader to exfiltrate data.

The group’s activities underline the growing trend of state-sponsored cyber-espionage. As we move further into the digital age, the activities of groups like Fancy Bear increasingly influence geopolitical events. Understanding the methods and motivations of these groups can help inform defensive strategies and highlight the importance of robust cybersecurity measures.

A Closer Look at Animal Farm

“Animal Farm” is the name given to an Advanced Persistent Threat (APT) group that was first identified around 2011.

This group drew the attention of cybersecurity researchers worldwide due to its use of sophisticated and custom malware in its cyber-espionage campaigns.

The group’s name, Animal Farm, comes from the names of the malware tools they have reportedly used, which include “Babar,” “Casper,” “Dino,” and “Bunny.”

Each of these names draws from popular cartoon characters, a light-hearted veneer for a very serious operation.

Their campaigns primarily targeted entities in the Middle East and Africa, but they also extended to other parts of the world. The targeted entities include government organizations, military institutions, telecommunication companies, humanitarian organizations, media outlets, and prominent individuals.

One of Animal Farm’s most infamous tools is Babar, a sophisticated piece of spyware capable of various malicious activities such as keylogging, capturing screenshots, recording audio, and stealing sensitive documents.

Notably, the Babar spyware has been found capable of defeating anti-virus detection methods, demonstrating the group’s advanced technical capabilities.

In 2016, an investigative report suggested that Animal Farm may be operated by the DGSE, which is France’s external intelligence agency.

This revelation was surprising, as France wasn’t widely recognized as a significant player in cyber-espionage. However, it’s important to remember that attributing cyber-attacks to specific groups or countries is challenging and often involves a degree of uncertainty.

The story of Animal Farm underlines the ever-evolving landscape of cyber threats. It shows that even the seemingly innocuous, like cartoon character names, can veil a serious and sophisticated threat in our interconnected world. As we continue to rely on digital infrastructure, understanding these threats and learning how to guard against them becomes increasingly crucial.

Conclusion

In the end, remember that there is no such thing as perfect security, online or offline.

As a web developer specialized in cybersecurity, I can tell you that APTs are one of the most challenging threats we face.

However, the right combination of technical defenses, ongoing vigilance, and user education can go a long way in keeping our cyber cities safe.

Navigating through the world of cyber threats might be daunting, but knowledge is power. By understanding the tactics, techniques, and procedures of Advanced Persistent Threats, we can demystify them, plan our defenses, and make the digital world a safer place.

Enjoyed the read? For more on Web Development, JavaScript, Next.js, Cybersecurity, and Blockchain, check out my other articles here:

If you have questions or feedback, don’t hesitate to reach out at caleb.pro@pm.me or in the comments section.

[Disclosure: Every article I pen is a fusion of my ideas and the supportive capabilities of artificial intelligence. While AI assists in refining and elaborating, the core thoughts and concepts stem from my perspective and knowledge. To know more about my creative process, read this article.]

--

--

🌐 JavaScript & Web Dev Enthusiast | 👨‍💻 Cybersecurity specialist ! 🔗 Blockchain Explorer | caleb.pro@pm.me