In this second edition of the APEX™ Report, we analyze global compromise activities from January 1 through March 31. This report offers a comprehensive view of malicious activity during the initial phase of the COVID-19 outbreak by various threat actor groups. During this first quarter, we saw evidence of compromise from 164,879 IPs, corresponding to 19,180 companies.
Prevailion’s platform observed heightened malicious activity across several key industry sectors, which are focused on in this report: hospitals, pharmaceuticals, aerospace/defense and the oil and gas supply chain.
Since our last quarterly report, the APEX™ Platform has undergone several updates which have exponentially expanded its capabilities. The platform has been enhanced to incorporate thousands of additional sensors to track malware communications, or ‘beacons’. This means the platform’s readings are more accurate and more laser-focused to discover the activities within industry subsectors, and the Evidence of Compromise can be more specific—down to the level of malware deployed per IP address. These activities include both financially-motivated criminal groups and state-sponsored actors.
To help visualize some of these campaigns, in this edition we have incorporated new methods our data scientists have devised to show the impact of global compromises on industries over time. We hope this new perspective will help readers understand how not all malware are created equal. The right attack in the right industry subsector at the right time can lead to a level of cyber compromise that is akin to a contagion, spreading over a short period of time—a phenomenon not unlike the pandemic currently gripping the world.
A member of the FCC renewed urgency calls on Apple and Google to remove TikTok from their app stores, raising concerns that TikTok’s Chinese-based parent company is collecting user data that is being accessed in China.
What Wicked Webs We Un-weave: Wizard Spider once again proving it isn’t you, it isn’t me; we search for things that you can’t see Authored by: Matt Stafford and Sherman Smith Executive summary: In late January 2022, Prevailion’s Adversarial Counterintelligence Team (PACT) identified extensive phishing activity designed to harvest credentials for Naver. Naver is a […]