Netcrook

APT Campaigns

82 article(s)

GravityRAT Malware Evolves: Multi-Platform Espionage Targets India’s Defense and Government

🗓 06 Jan 2026 · 👤 AGONY · 🌍 Asia

GravityRAT, a Pakistan-linked cyber-espionage tool, has evolved to target Windows, Android, and macOS devices. With new stealth tactics and persistent campaigns against Indian defense and government agencies, the malware poses a growing threat across platforms.

Patchwork’s Stealth Attack: How ZIP Archives and MSBuild Bypassed Military Defenses

🗓 04 Jan 2026 · 👤 AGONY · 🌍 Asia

Patchwork’s latest campaign used ZIP archives and hidden MSBuild files to deliver Python malware to military targets, slipping past antivirus detection and deploying the stealthy StreamSpy Trojan.

Handala Alert: Unmasking the Resistance Group’s New Cyber Division

🗓 03 Jan 2026 · 👤 AGONY · 🌍 Middle-East

Handala’s new ‘Alert’ division promises to amplify digital resistance, raising stakes in the world of hacktivist warfare. Netcrook investigates the group’s strategy and what it means for future cyber threats.

Phantom PDFs and Persistent Spies: How RATs Are Breaching Indian Networks

🗓 02 Jan 2026 · 👤 AGONY · 🌍 Asia

Cyber-espionage groups are targeting Indian government and academia with advanced RATs, using weaponized PDFs and cunning shortcuts. Learn how these attacks work and why vigilance is more critical than ever.

Careto Hacker Group Returns: New Cyberattack Tactics Revealed

🗓 02 Jan 2026 · 👤 AGONY

The Careto hacker group, dormant for nearly a decade, has reemerged with sophisticated attack methods targeting high-value organizations. Investigators reveal new malware, novel persistence tricks, and a chilling reminder: some APTs never truly disappear.

The Mask Returns: Inside the Shadowy Revival of the Careto Hacker Syndicate

🗓 02 Jan 2026 · 👤 AGONY

The notorious Careto (The Mask) hacker group has reappeared after years of silence, unleashing advanced cyberattack methods and targeting high-value organizations. Discover how their technical evolution places them among the world's most formidable digital adversaries.

APT36’s Stealthy LNK File Attack: Inside the Latest Espionage Campaign Against Indian Government

🗓 31 Dec 2025 · 👤 AGONY · 🌍 Asia

APT36 is using weaponized Windows shortcut files in a sophisticated cyber-espionage campaign targeting Indian government systems. Discover how fileless malware, adaptive persistence, and deceptive tactics enable long-term, undetected access to sensitive data.

APT36’s Shortcut Scheme: How LNK Files Penetrated Indian Government Networks

🗓 31 Dec 2025 · 👤 AGONY · 🌍 Asia

APT36 has launched a sophisticated cyber-espionage campaign against Indian government targets, using disguised Windows shortcut (LNK) files to deliver fileless malware, evade antivirus detection, and steal sensitive data.

Chinese Hackers Deploy Stealth Rootkit: ToneShell Backdoor Targets Asian Governments

🗓 30 Dec 2025 · 👤 AGONY · 🌍 Asia

Chinese APT group HoneyMyte has unleashed a kernel-mode rootkit to mask its ToneShell backdoor, targeting government agencies in Southeast Asia. Using stolen certificates and memory-only execution, this campaign sets a new bar for stealth and persistence.

HoneyMyte’s ToneShell Rootkit: The Stealth Attack on Southeast Asian Governments

🗓 30 Dec 2025 · 👤 AGONY · 🌍 Asia

HoneyMyte (Mustang Panda) is using a stealthy rootkit and the ToneShell backdoor to infiltrate government systems in Southeast Asia, bypassing antivirus defenses and remaining nearly undetectable.

« Prev 1 2 3 4 5 6 7 8 9 Next »