|Motivation||Steals intellectual property|
|Associated tools||DigDug, TRACKS|
APT7 engages in cyber operations where the goal is intellectual property theft, usually focusing on data and projects that make an organization competitive within its field. This group is known to have targeted organizations headquartered in the U.S. and U.K.
Construction, Aerospace, Engineering and defense industrial estate
APT7 threat actors have used access to one organization to infiltrate another organization under the same corporate parent. This is a form of lateral movement, but in this case was also the initial compromise method for the second organization.
How they work
DigDug it is a library file that helps creates web driver service tunnels. It connects the current server with other cloud driver tunnels. While creating a new amendment in its server, an URL with a proxy server provides every access that are given to a legal account. This let the actors in dark and helps to exploit the server.
The cyber operation of intellectual property theft is to steal data of the appropriate companies that are involved in this line of work. They target the U.S and U.K countries which are already infiltrated but by other APT’s.
The attack vectors by the threat actor’s attacks two or more organization of a parent company which comes under their target, but also attacks other organizations that share their threat.
Indicators of Compromise (IOC)
- IP addresses:
- Domain names:
- File hashes: