APT40 – Leviathan – CHINA
APT40 typically poses as a prominent individual who is probably of interest to a target to send spear-phishing emails. This includes pretending to be a journalist, an individual from a ...
APT40 typically poses as a prominent individual who is probably of interest to a target to send spear-phishing emails. This includes pretending to be a journalist, an individual from a ...
APT39 is one of several names for cyberespionage activity conducted by the Iranian Ministry of Intelligence and Security (MOIS) through the front company...
APT38 is a financially-motivated threat group that is backed by the North Korean regime. The group mainly targets banks and financial institutions...
APT37 is a suspected North Korean cyber espionage group that has been active since at least 2012. The group has targeted victims primarily in South Korea..
APT36 - Proofpoint researchers recently uncovered evidence of an advanced persistent threat (APT) against Indian diplomatic and military resources.
APT35 (aka Newscaster Team) is an Iranian government-sponsored cyber espionage team that conducts long-term, resource-intensive operations...
Fireeye believe APT34 is involved in a long-term cyber espionage operation largely focused on reconnaissance efforts to benefit Iranian nation-state...
APT33 is a suspected Iranian threat group that has carried out operations since at least 2013. The group has targeted organizations across multiple industries..
APT32 is a threat group that has been active since at least 2014. The group has targeted multiple private sector industries as well ...
APT31 is a China-nexus cyber espionage actor focused on obtaining information that can provide the Chinese government and state-owned...
© 2025 | CyberMaterial | All rights reserved