DIRECTORY

  • Alerts
  • APTs
  • Blog
  • Books
  • Certifications
  • Cheat Sheets
  • Courses
  • Cyber Briefing
  • CyberDecoded
  • CyberReview
  • CyberStory
  • CyberTips
  • Definitions
  • Domains
  • Entertainment
  • FAQ
  • Frameworks
  • Hardware Tools
  • Incidents
  • Malware
  • News
  • Papers
  • Podcasts
  • Quotes
  • Reports
  • Tools
  • Threats
  • Tutorials
No Result
View All Result
  • Login
  • Register
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
Talk To An Expert
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
No Result
View All Result
Talk To An Expert
CyberMaterial
Home APT

APT 7(China) – APT Groups

Reading Time: 3 mins read
in APT
Names APT7
Location China
Suspected attribution China
Motivation Steals intellectual property
Associated tools DigDug, TRACKS

Overview

APT7 engages in cyber operations where the goal is intellectual property theft, usually focusing on data and projects that make an organization competitive within its field. This group is known to have targeted organizations headquartered in the U.S. and U.K.

Targets

Construction, Aerospace, Engineering and defense industrial estate

Attack vectors

APT7 threat actors have used access to one organization to infiltrate another organization under the same corporate parent. This is a form of lateral movement, but in this case was also the initial compromise method for the second organization.

How they work

DigDug it is a library file that helps creates web driver service tunnels. It connects the current server with other cloud driver tunnels. While creating a new amendment in its server, an URL with a proxy server provides every access that are given to a legal account. This let the actors in dark and helps to exploit the server.

The cyber operation of intellectual property theft is to steal data of the appropriate companies that are involved in this line of work. They target the U.S and U.K countries which are already infiltrated but by other APT’s.

The attack vectors by the threat actor’s attacks two or more organization of a parent company which comes under their target, but also attacks other organizations that share their threat.

Indicators of Compromise (IOC)

  • IP addresses:
    • 176.34.146.10
    • 176.34.146.11
    • 176.34.146.12
    • 176.34.146.13
    • 176.34.146.14
  • Domain names:
    • a.apt7.biz
    • b.apt7.biz
    • c.apt7.biz
    • d.apt7.biz
    • e.apt7.biz
  • File hashes:
    • 5482598005525873334
    • 6682888614648030960
    • 7883188223870288576
    • 8183487833092546176
    • 8283787442314803776

References:

  • Advanced Persistent Threats (APTs) – APT6
Tags: Advanced Persistent ThreatAPTAPT7China
ADVERTISEMENT

Related Posts

APT43 (Kimsuky, Thallium) – North Korea

May 30, 2023

APT42 (TA453, Mint Sandstorm) – Iran

May 30, 2023
APT41 (WICKED PANDA, TG-2633) – China

APT41 (WICKED PANDA, TG-2633) – China

August 16, 2021
APT40 (Leviathan, BRONZE MOHAWK) – China

APT40 (Leviathan, BRONZE MOHAWK) – China

August 16, 2021

More Articles

Tool

Lastpass Password Manager – Tool

March 30, 2023
Alerts

Chinese Hackers Targeting Online Casinos

October 19, 2022
Certification

ITIL® 4 Foundation Certification

February 24, 2022
Alerts

Multiple CVEs – Vulnerabilities in IBM Java Runtime affect IBM Integration Designer

February 24, 2021
Alerts

Tesla tackles CORS misconfigurations that left internal networks vulnerable

January 6, 2023
Tool

Netsparker Web Vulnerability Scanner

February 11, 2022

Illegal trade in private data millions of Dutch people from GGD corona systems

February 2, 2021

Teaching tech

October 18, 2020
Load More

Security through data

Cybersecurity Domains

  • API Security
  • Business Continuity
  • Career Development
  • Compliance
  • Cryptography
  • HSM
  • KPIs / KRIs
  • Penetration Testing
  • Shift Left
  • Vulnerability Scan

Emerging Technologies

  • 5G
  • Artificial Intelligence
  • Blockchain
  • Cryptocurrency
  • Deepfake
  • E-Commerce
  • Healthcare
  • IoT
  • Quantum Computing

Frameworks

  • CIS Controls
  • CCPA
  • GDPR
  • NIST
  • 23 NYCRR 500
  • HIPAA

Repository

  • Books
  • Certifications
  • Definitions
  • Documents
  • Entertainment
  • Quotes
  • Reports

Threats

  • APTs
  • DDoS
  • Insider Threat
  • Malware
  • Phishing
  • Ransomware
  • Social Engineering

© 2023 | CyberMaterial | All rights reserved.

World’s #1 Cybersecurity Repository

  • About
  • Legal and Privacy Policy
  • Site Map
No Result
View All Result
  • Alerts
  • Incidents
  • News
  • Audience
    • Cyber Citizens
    • Cyber Professionals
    • Institutions
  • Highlights
    • Blog
    • CyberDecoded
    • Cyber Review
    • CyberStory
    • CyberTips
  • Cyber Risks
    • Alerts
    • Attackers
    • Domains
    • Incidents
    • Threats
  • Opportunities
    • Events
    • Jobs
  • Repository
    • Books
    • Certifications
    • Cheat Sheets
    • Courses
    • Definitions
    • Frameworks
    • Games
    • Hardware Tools
    • Memes
    • Movies
    • Papers
    • Podcasts
    • Quotes
    • Reports
    • Tutorials
  • Report Cyber Incident
  • GET HELP
  • Contact Us

Subscribe to our newsletter

© 2022 Cybermaterial - Security Through Data .

Welcome Back!

Sign In with Google
Sign In with Linked In
OR

Forgotten Password? Sign Up

Create New Account!

Sign Up with Google
Sign Up with Linked In
OR

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.