Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

CISA and ACSC Advisory on APT40 Threat

July 8, 2024
Reading Time: 2 mins read
in Alerts
CISA and ACSC Advisory on APT40 Threat

The Cybersecurity and Infrastructure Security Agency (CISA) has partnered with the Australian Signals Directorate’s Australian Cyber Security Centre (ACSC) to release an advisory detailing the activities of APT40, a state-sponsored cyber group from the People’s Republic of China. This advisory, developed with input from several prominent international cybersecurity organizations including the NSA, FBI, NCSC-UK, CCCS, NCSC-NZ, BND, BfV, NIS, and NISC, provides an in-depth look at the tradecraft and techniques used by APT40, also known by various other names such as Kryptonite Panda and Leviathan.

APT40 has been known for targeting various global organizations, including those in Australia and the United States. The group is recognized for its ability to rapidly adapt and leverage vulnerabilities in widely used public software, including Log4J, Atlassian Confluence, and Microsoft Exchange. Their tactics involve sophisticated exploitation and reconnaissance techniques, making them a significant threat to cybersecurity.

The advisory highlights APT40’s skill in transforming and adapting proofs of concept (POCs) to exploit vulnerabilities, emphasizing the need for organizations to be vigilant. CISA urges all entities, including software manufacturers, to review the advisory to enhance their security measures and address potential vulnerabilities. The focus is on incorporating Secure by Design principles to mitigate the impact of APT40’s techniques.

In response to these threats, CISA and its partners advocate for proactive measures to prevent and remediate APT40 intrusions. Organizations are encouraged to strengthen their security postures and collaborate with cybersecurity experts to ensure that their defenses are robust against the evolving tactics of state-sponsored threat actors.

Reference:
  • CISA and the Australian Cyber Security Centre Release Global APT40 Threat Advisory
Tags: ACSCAPT40AustraliaChinaCISACyber AlertsCyber Alerts 2024Cyber threatsCybersecurity and Infrastructure Security AgencyJuly 2024
ADVERTISEMENT

Related Posts

New Godfather Trojan Hijacks Banking Apps

Winos 4.0 Malware Hits Taiwan Via Tax Phish

June 20, 2025
New Godfather Trojan Hijacks Banking Apps

New Godfather Trojan Hijacks Banking Apps

June 20, 2025
New Godfather Trojan Hijacks Banking Apps

New Amatera Stealer Delivered By ClearFake

June 20, 2025
Fake Invoices Deliver Sorillus RAT In Europe

Fake Minecraft Mods On GitHub Spread Malware

June 19, 2025
Russian Phishing Scam Bypasses Google 2FA

Russian Phishing Scam Bypasses Google 2FA

June 19, 2025
Fake Invoices Deliver Sorillus RAT In Europe

Fake Invoices Deliver Sorillus RAT In Europe

June 19, 2025

Latest Alerts

Winos 4.0 Malware Hits Taiwan Via Tax Phish

New Amatera Stealer Delivered By ClearFake

New Godfather Trojan Hijacks Banking Apps

Fake Minecraft Mods On GitHub Spread Malware

Fake Invoices Deliver Sorillus RAT In Europe

Russian Phishing Scam Bypasses Google 2FA

Subscribe to our newsletter

    Latest Incidents

    Massive Leak Exposes 16 Billion Credentials

    Tonga Health System Down After Ransomware

    Chinese Spies Target Satellite Giant Viasat

    German Dealer Leymann Hacked Closes Stores

    Hacker Mints $27M From Meta Pool Gets 132K

    UBS and Pictet Hit By Vendor Data Breach

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial