Sophisticated state-supported actors are following cybercriminals in exploiting the coronavirous pandemic and posing an “advanced persistent threat” (APT), French defence technology giant Thales warned Monday.
Hades, linked to the APT28 which is believed to be of Russian origin and behind an attack on the US Democrat party in 2016, was the first state-backed group to use the epidemic as bait, Thales’ cyber intelligence service reported.
“According to the cyber security company QiAnXin, Hades hackers waged a campaign in mid-February by hiding a Trojan horse in bait documents (…) disguised as e-mail from the Ukrainian health ministry’s public health centre,” Thales said.
“These targeted emails seem to have been part of an even bigger disinformation campaign that affected the entire country on different fronts,” with the aim of creating panic in Ukraine, it added.
Vicious Panda, a group believed to be of Chinese origin, was behind “a new campaign against the Mongolian public sector”, Thales said, quoting the US-Israeli firm Checkpoint.
Mustang Panda, also believed to be Chinese in origin, “managed to target Taiwan using new lures,” linked to the coronavirus, while Kimsuky, suspected to be of North Korean origin, continues to attack targets in South Korea, and APT36, a group said to have Pakistani origins, has gone after Indian targets.
Thales also warned of a proliferation of fake virus information applications for Android that exploit public demand.
The company said several sources confirmed that half of the domain names set up since December linked to COVID-19 themes are exposed to malware.
“It seems that the cyber threat ecosystem is following the geographical spread of COVID-19 with attacks first in Asia, then eastern Europe and now in western Europe,” Thales noted.
Related: Coronavirus Confinement Challenges Intelligence Services
Related: Android Surveillance Campaign Leverages COVID-19 Crisis
Related: China-linked APT Hackers Launch Coronavirus-Themed Attacks

More from AFP
- Huawei Has Replaced Thousands of US-Banned Parts With Chinese Versions: Founder
- Poland Breaks up Russian Spy Ring
- Facebook ‘Unlawfully’ Used Dutch Personal Data: Court
- White House Cybersecurity Strategy Stresses Software Safety
- Internet Access, Privacy ‘Essential for Freedom’: Proton Chief
- ‘Hackers’ Behind Air Raid Alerts Across Russia: Official
- Spies, Hackers, Informants: How China Snoops on the US
- European Police Arrest 42 After Cracking Covert App
Latest News
- Google Suspends Chinese Shopping App Amid Security Concerns
- Verosint Launches Account Fraud Detection and Prevention Platform
- Ransomware Gang Publishes Data Allegedly Stolen From Maritime Firm Royal Dirkzwager
- Zoom Paid Out $3.9 Million in Bug Bounties in 2022
- Oleria Scores $8M Seed Funding for ID Authentication Technology
- Exploitation of 55 Zero-Day Vulnerabilities Came to Light in 2022: Mandiant
- News Analysis: UK Commits $3 Billion to Support National Quantum Strategy
- Malicious NuGet Packages Used to Target .NET Developers
