Hackers are increasingly executing financially motivated attacks and all due to the lucrative potential of monetizing the stolen data, ransoms, and fraudulent activities.
The digital revolution of businesses has invented more openings to exploit financial transactions and access sensitive financial information.
AttackIQ recently unveiled that the Chinese Winnti group intensifies financially motivated attacks.
Winnti is an established cyber-espionage and financial-gain group linked to the Chinese government since 2010.
Their healthcare targeting activities were ramped up during COVID-19, with medical research as their main objective.
They are known for supply chain attacks and use ShadowPad which is their signature backdoor, as well as PlugX RAT.
Free Webinar on API vulnerability scanning for OWASP API Top 10 vulnerabilities -> Book Your Spot
Winnti’s Operation CuckooBees (2022-05) proceeds in multiple stages.
Here below we have mentioned those stages:-
Here below we have mentioned them:-
This campaign contains multiple stages, and here below we have mentioned them:-
Each stage employs specific MITRE ATT&CK techniques for system infiltration, reconnaissance, and malware deployment.
There are four critical techniques used by Winnti that need to be focused on:-
Continuous testing with these attack graphs helps improve the security control posture against this Chinese government-linked threat actor.
Free Webinar! 3 Security Trends to Maximize MSP Growth -> Register For Free
Cybercriminals are increasingly exploiting search engine optimization (SEO) techniques and paid advertisements to manipulate search…
Cybersecurity experts have unearthed an intricate cyber campaign that leverages deceptive websites posing as the…
Hackers are exploiting what's known as "Dangling DNS" records to take over corporate subdomains, posing…
Security researchers and cybersecurity experts have recently uncovered new variants of the notorious HelloKitty ransomware,…
The RansomHub ransomware group has emerged as a significant danger, targeting a wide array of…
Threat actors are increasingly using email bombing to bypass security protocols and facilitate further malicious…