APT24 – Pitty Panda – CHINA
APT24 is known to have targeted organizations headquartered in countries including the U.S. and Taiwan. This group has historically used the RAR archive utility to encrypt and compress stolen data ...
APT24 is known to have targeted organizations headquartered in countries including the U.S. and Taiwan. This group has historically used the RAR archive utility to encrypt and compress stolen data ...
APT23 has stolen information that has political and military significance, rather than intellectual property. This suggests that APT23 may perform data theft
APT22 - BRONZE OLIVE (also referred to as SuckFly) conducted a long-running espionage campaign against Indian government...
APT21 leverages strategic Russian-language attachments themed with national security issues in lure documents.
APT20 engages in cyber operations where the goal is data theft. APT 20 conducts intellectual property theft but also appears interested in stealing data...
APT19 (G0073) is a Chinese-based threat group that has targeted a variety of industries, including defense, finance, energy...
APT18 (G0026) is a threat group that has operated since at least 2009 and has targeted a range of industries, including technology...
APT17 (G0025) is a China-based threat group that has conducted network intrusions against U.S. government entities, the defense industry, law firms,
APT16 is a China-based threat group that has launched spear phishing campaigns targeting Japanese and Taiwanese organizations.
APT15 has targeted organizations headquartered in multiple locations, including a number of European countries, the U.S., and South Africa.
© 2025 | CyberMaterial | All rights reserved