Global cybersecurity firm, Kaspersky is monitoring Advanced Persistent Threats (APTs) and has identified nine active threat actors targeting organizations, government entities, energy sectors, and telecommunications companies, which are primary targets across Africa.
APTs are sophisticated threat actors known for their prolonged and targeted attacks, often motivated by espionage, financial gain, or hacktivism. Prominent APT groups in the region include MuddyWater, FruityArmor, and Sidewinder. Kaspersky collaborates with legal authorities to provide crucial intelligence for tracking cybercriminals involved in these attacks.
These threat actors employ various techniques to infiltrate their targets. Social engineering tactics, such as fake job advertisements aimed at software developers, are commonly used on social media and email platforms.
APT groups also deploy advanced modular malware like DeadGlyph and StealerBot, and exploit legitimate remote applications, online services, and cloud platforms. For instance, MuddyWater has been known to utilize these methods to breach targeted sites. Additionally, these groups may infiltrate victims through third-party providers and supply-chain attacks.
ALSO READ: BTCL DELVES INTO DIGITAL E-COMMERCE BUSINESS
Kaspersky’s Global Research and Analysis Team (GReAT) publishes comprehensive reports on each APT investigation, accessible via Kaspersky’s Threat Intelligence Portal. These reports provide detailed insights into the activities and methodologies of APT groups, aiding in the global effort to combat cyber threats.