This report is focused on the most prolific cyber espionage group Mandiant tracks: APT1. This single organization has conducted a cyber espionage campaign against a broad range of victims since at least 2006.
Attacking and Defending Nation States.
don wrote:<rant>I just wish we had the balls in the US to not only fight back but also call a spade a spade.
If we just stand up and fight back, we can be again.</rant>
My only fear about all this is that we suck at defense. I'm not sure we (USA) could withstand a serious attack...
cd1zz wrote:My only fear about all this is that we suck at defense. I'm not sure we (USA) could withstand a serious attack...
don wrote:Like anything, it's about the money. China is about to overtake the US as the largest economy in the world. The have been doing it by stealing, manipulating currency, horrible labor practices as well as cyber warfare... you name it, China is doing it. This is why it always goes back to China.
<rant>I just wish we had the balls in the US to not only fight back but also call a spade a spade. China would not be in the position they're in without the US. So what are we so afraid of and why can't our leaders not only take action but also speak it outloud? Instead we get a bunch of wimps talking about trying to emulate China's economic model. Why? Because they say it's been successful. So are we willing to go down that path just to beat China at it's own game? That's so far beneath us and what we stand for as a freedom loving republic. We were number one by a long shot without having to emulate a Socialist country. If we just stand up and fight back, we can be again.</rant>
I'm just going to stop there before I get too heated.
Threat Actors Using Mandiant APT1 Report as a Spear Phishing Lure
By Intel Team on February 21, 2013
It was only a matter of time. Today, Mandiant learned of at least two malicious versions of our APT1 report that attempt to lure users into opening PDF documents titled “Mandiant” and “Mandiant_APT2_Report.” We are currently tracking the threat actors behind the activity and have no indication that APT1 itself is associated with either variant.
Symantec and Brandon Dixon’s 9B+ blog uncovered the two permutations of the report. Hashes for the malicious PDFs are available on their blogs. Thanks to both for posting their findings.
Mandiant has not been compromised. Reports downloaded, previously and currently from our website, do not contain exploits.
We recommend that you only retrieve Mandiant’s reports from: http://intelreport.mandiant.com, then check the hash of the downloaded files against the hashes posted on our web site.
Tags: Advanced Persistent Threat, APT1, Brandon Dixon, Symantec
Category: The Suite Spot
Users browsing this forum: No registered users and 1 guest