Site icon LIFARS, a SecurityScorecard company

Top Cyber Espionage Campaigns of 2014

2020: A New Cyber Cold War?

2020: A New Cyber Cold War?

Since it is the last day of the year, let’s have a look at this year’s top APT campaigns. This year surely was action-packed when it comes to various forms of hacking, data breaches, new malware, and related matters. Some of the most sophisticated cyber espionage campaigns have been revealed this year. Many of them so advanced, there is not a bit of doubt that they are state-backed. Although many new APTs were discovered, thinking of what is still out there and is rather disconcerting, considering how long many of these campaigns laid undiscovered. The list below contains an overview of the most notable campaigns of 2014.

REGIN – Regin APT is the undisputed king among APTs revealed in 2014.

Targets: Telecommunication operators, governments, financial institutions, research institutions – mainly with focus on mathematical, cryptographical research.
Countries: Algeria, Afghanistan, Belgium, Brazil, Fiji, Germany, Iran, India, Indonesia, Kiribati, Malaysia, Pakistan, Syria and Russia.

Key Features:

DARKHOTEL– The Darkhotel operation was a well-executed execs-targeting cyberespionage campaign.

Targets: C-level officials and senior management, Marketing Directors, top R&D persons.
Countries: Main focus on Japan, Taiwan, China, Russia and South Korea.

Key Features:

CLOUD ATLAS – Cloud Atlas turned out to be the notorious RedOctober cyberespionage campaign reborn.

Targets: Diplomatic organizations and government bodies.
Countries: Main focus on Russia, Kazakhstan, Belarus, India, and Czech Republic.

Key Features:

SANDWORM – Sandworm is the advanced cyberespionage group behind the NATO and Ukraine attacks.

Targets: Political bodies, governments, energy industry, suppliers of heavy power related materials, investors, academia, and high-tech.
Countries:   Russia, Ukraine, Poland, Lithuania, Belarus, Azerbaijan, Kyrgyzstan, Kazakhstan, Iran, Israel, Turkey, Libya, Kuwait, Taiwan, Vietnam, India, Croatia, Germany, Belgium, and Sweden.

Key Features:

Although these were some of the most prominent cyberespionage campaigns of 2014, there were many other campaigns reported on in 2014, including the Epic Turla, the Russian APT28, APT3, and others.

Based on the current success of APTs concentrating on cyberespionage, it is likely that cybercriminals are already picking up on the benefits of stealthy, persistent presence. In 2015 we are likely going to see a wide-spread evolution in cybercrime campaigns – mimicking current espionage APT mechanics. Criminals are realizing that targeting end users is less effective than targeting, let’s say a bank, directly.

Exit mobile version