APT7 engages in cyber operations where the goal is intellectual property theft, usually focusing on data and projects that make an organization competitive within its field. This group is known to have targeted organizations headquartered in the U.S. and U.K.
Name: N/A
Location: China
Suspected attribution: China
Date of initial activity:
Targets: Construction, Aerospace, Engineering and defense industrial estate
Motivation: Steals intellectual property
Associated malware: DigDug
Attack vectors: APT7 threat actors have used access to one organization to infiltrate another organization under the same corporate parent. This is a form of lateral movement, but in this case was also the initial compromise method for the second organization.
How they work: DigDug it is a library file that helps creates web driver service tunnels. It connects the current server with other cloud driver tunnels. While creating a new amendment in its server, an URL with a proxy server provides every access that are given to a legal account. This let the actors in dark and helps to exploit the server.
The cyber operation of intellectual property theft is to steal data of the appropriate companies that are involved in this line of work. They target the U.S and U.K countries which are already infiltrated but by other APT’s.
The attack vectors by the threat actors attacks two or more organization of a parent company which comes under their target, but also attacks other organizations that share their threat.