Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Sunshine And March Vibes (2025 Wallpapers Edition)

      May 16, 2025

      The Case For Minimal WordPress Setups: A Contrarian View On Theme Frameworks

      May 16, 2025

      How To Fix Largest Contentful Paint Issues With Subpart Analysis

      May 16, 2025

      How To Prevent WordPress SQL Injection Attacks

      May 16, 2025

      Microsoft has closed its “Experience Center” store in Sydney, Australia — as it ramps up a continued digital growth campaign

      May 16, 2025

      Bing Search APIs to be “decommissioned completely” as Microsoft urges developers to use its Azure agentic AI alternative

      May 16, 2025

      Microsoft might kill the Surface Laptop Studio as production is quietly halted

      May 16, 2025

      Minecraft licensing robbed us of this controversial NFL schedule release video

      May 16, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      The power of generators

      May 16, 2025
      Recent

      The power of generators

      May 16, 2025

      Simplify Factory Associations with Laravel’s UseFactory Attribute

      May 16, 2025

      This Week in Laravel: React Native, PhpStorm Junie, and more

      May 16, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Microsoft has closed its “Experience Center” store in Sydney, Australia — as it ramps up a continued digital growth campaign

      May 16, 2025
      Recent

      Microsoft has closed its “Experience Center” store in Sydney, Australia — as it ramps up a continued digital growth campaign

      May 16, 2025

      Bing Search APIs to be “decommissioned completely” as Microsoft urges developers to use its Azure agentic AI alternative

      May 16, 2025

      Microsoft might kill the Surface Laptop Studio as production is quietly halted

      May 16, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»New Techniques, Same Threat: APT40 Adapts Tactics for Broader Attacks

    New Techniques, Same Threat: APT40 Adapts Tactics for Broader Attacks

    July 9, 2024

    The UK and its international allies have issued a new advisory shedding light on the evolving techniques of China state-sponsored cyber actors. The alert, spearheaded by the UK’s National Cyber Security Centre (NCSC), a part of GCHQ, comes in collaboration with cybersecurity agencies from Australia, the US, Canada, New Zealand, Germany, the Republic of Korea, and Japan.

    The advisory focuses on the methods employed by a particular China state-sponsored cyber actor, APT40, in attacks against Australian networks.

    APT40: Exploiting Vulnerable Devices

    APT40 has notably adopted the tactic of exploiting vulnerable small-office and home-office (SoHo) devices. These devices often do not run the latest software or lack recent security updates, making them prime targets. By leveraging these softer targets, APT40 can effectively conceal malicious traffic and launch broader attacks.

    The advisory includes two technical case studies to help network defenders identify and mitigate this malicious activity. These techniques are not limited to APT40; they are also employed by other China-state-sponsored actors globally.

    Historical Context and Previous Attributions

    The UK has previously attributed APT40 to the Chinese Ministry of State Security (MSS). The threat group, also known as Kryptonite Panda, GINGHAM TYPHOON, Leviathan, and Bronze Mohawk, has a history of targeting organizations across various countries, including Australia and the United States. APT40 is known for quickly adapting vulnerability proofs of concept (POCs) for reconnaissance and exploitation operations. They exploit new vulnerabilities in widely used software such as Log4J, Atlassian Confluence, and Microsoft Exchange.

    International Collaboration and Advisory Details

    The advisory, titled “PRC MSS Tradecraft in Action,” was co-released by the NCSC and its international partners. These include:

    Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC)
    US Cybersecurity and Infrastructure Security Agency (CISA)
    US National Security Agency (NSA)
    US Federal Bureau of Investigation (FBI)
    Canadian Cyber Security Centre (CCCS)
    New Zealand National Cyber Security Centre (NCSC-NZ)
    German Federal Intelligence Service (BND) and Federal Office for the Protection of the Constitution (BfV)
    Republic of Korea’s National Intelligence Service (NIS) and NIS’ National Cyber Security Center (NCSC)
    Japan’s National Center of Incident Readiness and Strategy for Cybersecurity (NISC) and National Police Agency (NPA)

    The advisory is based on the shared understanding of APT40’s tactics, techniques, and procedures (TTPs) as well as current incident response investigations led by ASD’s ACSC.

    Persistent and Adaptive Threats

    APT40’s capability to rapidly exploit new public vulnerabilities makes it a persistent threat. They conduct regular reconnaissance on networks of interest, looking for vulnerable, end-of-life, or unpatched devices to exploit. The group prefers exploiting vulnerable, public-facing infrastructure over techniques requiring user interaction, such as phishing. They place a high priority on obtaining valid credentials to enable a range of follow-on activities.

    Once initial access is gained, APT40 focuses on establishing persistence to maintain access within the victim’s environment. This often involves using web shells for persistence early in the intrusion lifecycle.

    Evolution of Techniques

    APT40 has evolved its techniques over time, moving from using compromised Australian websites as command and control (C2) hosts to leveraging compromised SoHo devices as operational infrastructure. These devices offer a launching point for attacks, blending in with legitimate traffic and presenting challenges to network defenders. This technique is also used by other PRC state-sponsored actors worldwide, underscoring a shared threat.

    Tooling and Recommendations

    The advisory includes details on some of the malicious files identified during investigations, which have been uploaded to VirusTotal. This enables the broader cybersecurity community to better understand the threats and enhance their defenses.

    The advisory urges all organizations and software manufacturers to review the provided guidance to identify, prevent, and remediate APT40 intrusions. It also emphasizes the importance of incorporating Secure by Design principles to strengthen the security posture of software products.

    Broader Implications and Ongoing Threats

    The publication of this advisory follows a warning made by the Director of GCHQ in May about the “genuine and increasing cyber risk to the UK” posed by China. The threat from APT40 and similar groups is ongoing, with the potential for far-reaching implications.

    APT40’s ability to rapidly exploit vulnerabilities and their preference for using compromised infrastructure make them a formidable adversary. The international collaboration highlighted in this advisory highlights the global nature of the threat and the need for coordinated efforts to defend against state-sponsored cyber activities.

    Source: Read More

    Hostinger
    Facebook Twitter Reddit Email Copy Link
    Previous ArticleEssential Steps in UX Research
    Next Article Hackers Exploiting Jenkins Script Console for Cryptocurrency Mining Attacks

    Related Posts

    Security

    Nmap 7.96 Launches with Lightning-Fast DNS and 612 Scripts

    May 16, 2025
    Common Vulnerabilities and Exposures (CVEs)

    CVE-2022-4363 – Wholesale Market WooCommerce CSRF Vulnerability

    May 16, 2025
    Leave A Reply Cancel Reply

    Continue Reading

    CISA Flags Critical Flaws in Mitel and Oracle Systems Amid Active Exploitation

    Development

    How the Amazon TimeHub team designed resiliency and high availability for their data replication framework: Part 2

    Databases

    Design Isn’t Dead.

    Web Development

    UK Driving Theory Test

    Development

    Highlights

    CES 2025 ICYMI: The most impressive products so far

    January 6, 2025

    Even before opening day, CES sees major announcements from the likes of Samsung, LG, Ring,…

    Dark web study exposes AI child abuse surge as UK man faces landmark arrest

    August 13, 2024

    How to Enable and Use ReadyBoost on Windows 10

    July 1, 2024

    Sellafield Nuclear Site Issues Apology Over Series of Cybersecurity Failings

    August 10, 2024
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.