• XRATOR
  • Contact Us
  • Privacy & Policy
Conquer your risk
  • Home
  • Articles
  • News
  • Research
  • State of the art
No Result
View All Result
  • Home
  • Articles
  • News
  • Research
  • State of the art
No Result
View All Result
Conquer your risk
No Result
View All Result
Home Threat Intelligence

Dark Pink APT Group Continues to Target Government and Military Setups in APAC

Unvealed by Group-IB in january 2023, Dark Pink APT group is now targeting government and military setups in Malaysia.

Gert Van de VenbyGert Van de Ven
April 17, 2023
in Articles, Cyber Attacks, Cybercrime, Malware, Threat Intelligence
0
Dark Pink APT Group Continues to Target Government and Military Setups in APAC

As the threat landscape continues to evolve, advanced persistent threat (APT) groups continue to pose a significant risk to organizations in the Asia Pacific (APAC) region. One such group that has recently come to the attention of cybersecurity experts at Groub-IB is Dark Pink. This APT group has been found to be behind a series of targeted attacks against organizations in Vietnam and Indonesia, and has been active since mid-2021. Recently, Pakistan’s Cabinet Division has also issued a warning about the potential for hacking attempts by the Dark Pink group, which is targeting government and military setups in the region.

Dark Pink APT Group Tactics and Techniques

Dark Pink uses sophisticated tactics, techniques, and procedures (TTPs) to infiltrate systems and gain unauthorized access. The group has been found to use techniques such as USB infection and DLL exploitation to exploit systems, with phishing emails being the primary means of compromise. According to the advisory issued by Pakistan’s Cabinet Division, a recent analysis of attacks on the Malaysian Armed Forces revealed the use of phishing emails and sophisticated attacks on email networks by Dark Pink.

Preventive Measures Against APT Attacks

The advisory by Pakistan’s Cabinet Division offers several preventive measures against APT attacks, including using updated anti-virus/anti-malware, regular reviews of application permissions and system running processes, and the use of separate and complex passwords for each system. The advisory also recommends using well-reputed email service provider anti-virus scanners before downloading any attachments, and timely updating all applications and operating systems (mobile and PC). Additionally, it suggests implementing multi-factor authentication (MFA) or two-factor authentication wherever possible, not sharing personal details and credentials with unauthorized users, and not using personal accounts on official systems.

APAC as a Prime Target for Military Cyberespionage

APAC is an interesting target for military cyberespionage due to its rapidly growing economy and increasing importance in the global geopolitical landscape. Many countries in the region are experiencing significant economic growth, which has led to an increase in the development of critical infrastructure and the emergence of new industries. These factors make APAC a prime target for cyberespionage, as nation-states and other threat actors seek to gain access to sensitive information and intellectual property that can provide them with a strategic advantage.

Conclusion

The growing threat of APT groups like Dark Pink highlights the need for proactive cybersecurity measures and risk management in the APAC region. As the region becomes more important in the global geopolitical landscape, organizations need to take steps to protect themselves against cyber threats and ensure the security of their sensitive information and critical infrastructure.

Tags: APACAPTCyberespionageDark PinkGeopoliticsMalaysiaPakistanPhishing

Categories

  • Cybercrime
  • Malware
  • Vulnerability & Weakness
  • Threat Intelligence
  • Cyber Attacks
  • Cybersecurity
  • Offensive Security
  • Risk Management
  • Cyberdefense
  • Cyber Insurance

Popular News

  • Cybercriminals regularly hack into individual and organization network. They may steal password to sell them on the darkweb.

    4 websites to check if your password is in the darkweb

    0 shares
    Share 0 Tweet 0
  • 10 Essential Tools for IoT Pentesting

    0 shares
    Share 0 Tweet 0
  • Threat Modeling : from Software Security to Cyber Risk Management

    0 shares
    Share 0 Tweet 0
  • 8 TV Shows and Movies about Personal Data Abuse

    0 shares
    Share 0 Tweet 0
  • The Code Knight: Mastering the Craft of Defensive Programming

    0 shares
    Share 0 Tweet 0

"Conquer Your Risk" is a corporate blog for Cybersecurity and Risk Management executives and specialists, sharing XRATOR experts' views on Cybersecurity, Threat Intelligence, Risk Management and Cyber Insurance.

Categories

  • Articles
  • Cyber Attacks
  • Cyber Insurance
  • Cybercrime
  • Cyberdefense
  • Cybersecurity
  • Malware
  • News
  • Offensive Security
  • Research
  • Risk Management
  • Scams
  • State of the art
  • Threat Intelligence
  • Uncategorized
  • Vulnerability & Weakness

Quick Links

  • XRATOR
  • Our Experts
  • Privacy Policy
  • Contact Us

XRATOR® – copyright 2020-2021

No Result
View All Result
  • Contact Us
  • Homepages

© 2018 JNews by Jegtheme.

Manage Cookie Consent
We use cookies to optimize our website and our service.
By closing this windows, you automatically deny non-functionals cookies.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
Preferences
{title} {title} {title}
Manage Cookie Consent
We use cookies to optimize our website and our service.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
Preferences
{title} {title} {title}