APT30: The Mechanics of a Long-Running Cyber Espionage Operation
When our Singapore-based FireEye Labs team examined malware aimed predominantly at entities in Southeast Asia and India, we suspected that we were peering into a regionally focused cyber espionage operation. In our latest Threat Intelligence Report, “APT 30 and the Mechanics of a Long-Running Cyber Espionage Operation,” we uncover a decade-long operation focused on targets—government and commercial—who hold key political, economic, and military information about the region.
This report shares the tools, tactics, and procedures of APT 30 for organizations across the region to quickly begin to detect, prevent, analyze, and respond to this consistent threat. It also outlines the profile of the attacker for security practitioners to better understand their threats.
In this report you will learn:
- How cyber espionage is not limited to targeting just the United States
- Why the South East Asian region has a specific set of challenges in cyber security
- Why the most successful APT groups use the path of least resistance to evade detection
- The benefits of sharing Threat Intelligence publicly