Hacker News new | past | comments | ask | show | jobs | submit login
Iranian cyberspies target US defense orgs with a brand new backdoor (theregister.com)
31 points by LinuxBender 4 months ago | hide | past | favorite | 11 comments



"In a series of Xeets" I don't think I'll ever get used to hearing that.

Anyway, C2 means Command and Control, and APT stands for Advanced Persistent Threat, for those wondering.


Is there a plain old “Persistent Threat?” If so what distinguishes from an Advanced one?


"Advanced" seems to refer to those that are on cutting edge with new/zero-day or created exploits, as opposed to just a persistent threat using existing exploits or botnets.


What was that about Stuxnet, run to walk to crawl,… and send enrichment programs back to the drawing board! what a world we live in.


anyone know the APT designations for threat actors based in the US and Israel?


US: The Equation Group [0]

Israel: Unit 8200 [1]

According to this[2] Wikipedia article on APTs.

I'd be curious to know what kind of non-state APT groups in "The West" are at least tacitly approved, or 'sub-contracted'. The equivalent of say crime groups in Russia.

[0] https://en.wikipedia.org/wiki/Equation_Group

[1] https://en.wikipedia.org/wiki/Unit_8200

[2] https://en.wikipedia.org/wiki/Advanced_persistent_threat#APT...


Equation group was the one I was trying to remember thnx (didnt know unit 8200, just seen them in an old homey trap a while ago trying SQL injections from some Israeli government IP addresses)


Those are not really apt designations except the equation group. The sanctioned ngo cyber actors are groups like finfisher, nso, the greek one that was just sanctioned, the remnants of Hacking Team. Alongside DIB companies like Raytheon, LockMart, etc. it's all rather aboveboard.


For actual apt designations, you would be hard pressed. You kind of need to find actual unattributed instruction sets. Like Regin or Flame, which is not a group so much as the name for an attack.

However, generally speaking The Lamberts (BlackLambert, WhiteLambert, etc) are allegedly the CIA, EquationGroup allegedly NSA, ProjectSauron is allegedly Western. DarkHotel is allegedly South Korean. Mainly these are Kaspersky designations. As the West doesn't really track the various intrusions, and the Chinese public-facing info is either deliberately wrong, or so old it's useless.


CIA, NSA, and Mossad.


The headline would be a bit more accurate with: 'In response to US Cyber threats, and in retaliation for numerous data breaches incurred in the last 3 yeas, Iranian cyber-spies target...'

Seems the news agencies like to conveniently forget that part of the story.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: