Connect with us

Tech Features

In the Crosshairs of APT Groups: A Feline Eight-Step Kill Chain

Published

on

hacking

By Alexander Badaev, Information security threat researcher, Positive Technologies Expert Security Center and Yana Avezova, Senior Research Analyst, Positive Technologies

In cybersecurity, “vulnerability” typically evokes concern. One actively searches for it and patches it up to build robust defenses against potential attacks. Picture a carefully orchestrated robbery, where a group of skilled criminals thoroughly examines a building’s structure, spots vulnerabilities, and crafts a step-by-step plan to breach security and steal valuables. This analogy perfectly describes the modus operandi of cybercriminals, with the “kill chain” acting as their detailed blueprint.

In a recent study, analysts from Positive Technologies gathered information on 16 hacker groups attacking the Middle East analyzing their techniques and tactics. It is worth noting that most of the threats in Middle Eastern countries come from groups believed to be linked to Iran—groups such as APT35/Charming Kitten or APT34/Helix Kitten. Let’s see how APT groups operate, how they initiate attacks, and how they develop them toward their intended targets.

Step 1: The Genesis of Intrusion (Attack preparation)

It all begins with meticulous planning and reconnaissance. APT groups leave no stone unturned in their quest for vulnerable targets. They compile lists of public systems with known vulnerabilities and gather employee information. For instance, groups like APT35 aka Charming Kitten known for targeting mainly Saudi Arabia and Israel, gather information about employees of target organizations, including mobile phone numbers, which they leverage for nefarious purposes like sending malicious links disguised as legitimate messages. After reconnaissance, they prepare tools for attacks, such as registering fake domains and creating email or social media accounts for spear phishing. For example, APT35 registers accounts on LinkedIn and other social networks to contact victims, persuading them through messages and voice calls to open malicious links.

Step 2: The Initial Access: Gaining a Foothold

Once armed with intelligence, cybercriminals proceed to gain initial access to their target’s network.  Phishing campaigns, often masquerading as legitimate emails, serve as the primary means of infiltration. An example is the Desert Falcons group, observed spreading their malware through pornographic phishing. Notably, some groups go beyond traditional email phishing, utilizing social networks and messaging platforms to lure unsuspecting victims, as seen with APT35, Bahamut, Dark Caracal, and OilRig. Moreover, techniques like the watering hole method, where attackers compromise trusted websites frequented by their targets, further highlight the sophistication of these operations. Additionally, attackers exploit vulnerabilities in resources accessible on the internet to gain access to internal infrastructure. For example, APT35 and Moses Staff exploited ProxyShell vulnerabilities on Microsoft Exchange servers.

Step 3: Establishing Persistence: The Art of Concealment

Having breached the perimeter, APT groups strive to establish a foothold within the victim’s infrastructure, ensuring prolonged access and control. This involves deploying techniques such as task scheduling, as seen in the campaign against the UAE government by the OilRig group, which created a scheduled task triggering malicious software every five minutes. Additionally, many malicious actors set up malware autostart, like the Bahamut group creating LNK files in the startup folder or Dark Caracal’s Bandook trojan. Some APT groups, such as APT33, Mustang Panda, and Stealth Falcon, establish themselves in victim infrastructures by creating subscriptions to WMI events for event-triggered execution. Furthermore, attackers exploit vulnerabilities in server applications to install malicious components like web shells, which provide a backdoor for remote access and data exfiltration.

Step 4: Unraveling the Network: Internal Reconnaissance

After breaking in, APT groups don’t just sit there. They explore the system like a thief casing a house to find valuables and escape routes. This digital reconnaissance involves several steps. First, they perform an inventory check, identifying the computer’s operating system, installed programs, and updates, like figuring out a house’s security measures. For instance, APT35 might use a simple command to see if the computer is a powerful 64-bit system, capable of handling more complex tasks. Second, they map the network layout, akin to identifying valuable items and escape routes. APT groups might use basic tools like “ipconfig” and “arp” (like Mustang Panda) to see how devices are connected and communicate. They also search for user accounts and activity levels, understanding who lives in the house (figuratively) and their routines. Malicious tools, like the Caterpillar web shell used by Volatile Cedar, can list all usernames on the system. Examining running programs is another tactic, like checking for security guards. Built-in commands like “tasklist” (used by APT15 and OilRig) can reveal a list of programs currently running.

Finally, APT groups might deploy programs that hunt for secrets hidden within files and folders, like searching for hidden safes or documents. The MuddyWater group, for example, used malware that specifically checked for directories or files containing keywords related to antivirus software. By gathering this comprehensive intel, APT groups can craft targeted attacks, steal sensitive data like financial records or personal information, or exploit vulnerabilities in the system to cause even more damage.
Step 5: Harvesting Credentials: Unlocking the Vault

Access to privileged credentials is the holy grail for cyber attackers, granting them unrestricted access to critical systems and data. One common tactic is “credential dumping,” where tools like Mimikatz (used by APT15, APT33, and others) snatch passwords directly from a system’s memory, similar to stealing a key left under a doormat. Keyloggers, used by APT35 and Bahamut for example, acts like a hidden camera, silently recording keystrokes to capture usernames and passwords as victims type them in.

These stolen credentials grant access to even more sensitive areas. APT groups also exploit weaknesses in how passwords are stored. For instance, some target the Windows Credential Manager (like stealing a notepad with written down passwords). Brute-force attacks, trying millions of combinations, can crack weak passwords. Even encrypted passwords can be vulnerable if attackers have specialized tools. By employing these tactics, APT groups bypass initial security and access sensitive information or critical systems.

Step 6: Data Extraction: The Quest for Valuable Assets

Once inside, APT groups aren’t shy about snooping around. They leverage stolen credentials to capture screenshots, record audio and video (like hidden cameras and microphones), or directly steal sensitive files and databases. For instance, the Dark Caracal group employed Bandook malware, which can capture video from webcams and audio from microphones. This stolen data becomes their loot.

To ensure a smooth getaway, APT groups often employ encryption and archiving techniques. Imagine them hiding their stolen treasure chests—the Mustang Panda group, for example, encrypted files with RC4 and compressed them with password protection before shipping them out. This makes it difficult for defenders to identify suspicious activity amongst regular network traffic.

Step 7: Communication Channels: Establishing Control

APT groups rely on hidden communication channels with command-and-control (C2) servers to control infected machines and exfiltrate data. They employ various tactics to blend in with regular network traffic. This includes using common protocols (like IRC or DNS requests disguised as legitimate web traffic) and encrypting communication for further stealth.

However, some groups take it a step further. For instance, OilRig used compromised email servers to send control messages hidden within emails and then deleted them, making their C2 channel nearly invisible. These innovative techniques make it difficult for security measures to detect malicious activity, highlighting the importance of staying informed about evolving APT tactics.

Step 8: Covering Tracks: Erasing Digital Footprints

As the operation ends, APT groups meticulously cover their tracks to evade detection and prolong their presence in the compromised environment. Techniques like file obfuscation, masquerading, and indicator removal are employed to erase digital footprints and thwart forensic investigations. For example, the Bahamut group used icons mimicking Microsoft Office files to disguise malware, and the OilRig group used .doc file extensions to make malware appear as office documents. The Moses Staff group named their StrifeWater malware calc.exe to make it look like a legitimate calculator program.

To further bypass defenses, attackers often proxy the execution of malicious commands using files signed with trusted digital certificates. The APT35 group used the rundll32.exe file to execute the MiniDump function from the comsvcs.dll system library when dumping the LSASS process memory. Meanwhile, the Dark Caracal group employed a Microsoft Compiled HTML Help file to download and execute malicious files. Many APT groups also remove signs of their activity by clearing event logs and network connection histories, and changing timestamps. For instance, APT35 deleted mailbox export requests from compromised Microsoft Exchange servers. This meticulous cleaning makes it much more difficult for cybersecurity professionals to conduct post-incident investigations, as attackers often remove their arsenal of software from compromised devices after achieving their goals.

Conclusion: A Call to Vigilance

In a nutshell, the threat landscape in the Middle East is fraught with peril, as APT groups continue to refine their tactics and techniques to evade detection and wreak havoc on unsuspecting organizations. By understanding the anatomy of cyber intrusions and remaining vigilant against emerging threats, organizations can bolster their defenses and mitigate the risks posed by these sophisticated adversaries. Together, let us remain steadfast in our commitment to safeguarding the digital frontier against cyber threats.

Research Link

Continue Reading
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Tech Features

Sustainable AI Practices Driving Ethical and Green Tech

Published

on

By Mansour Al Ajmi, CEO of X-Shift

Mansour Al Ajmi, CEO of X-Shift
Mansour Al Ajmi, CEO of X-Shift

Sustainable AI practices are no longer optional—they are essential for shaping technology that benefits both people and the planet. As artificial intelligence transforms industries from healthcare to transportation, the challenge is to ensure its growth is ethical, environmentally responsible, and socially inclusive. This means addressing not only energy efficiency and carbon reduction but also governance, fairness, and long-term societal impacts.

Why Sustainable AI Practices Go Beyond the Environment?

AI is now deeply embedded in investment strategies, medical diagnostics, media platforms, and public infrastructure. While reducing energy usage is vital, true sustainability also requires ethical governance and the elimination of bias.

For example, biased training datasets can unintentionally reinforce social inequality. Studies, such as those from the MIT Media Lab, have shown that some AI systems perform poorly with diverse populations, highlighting the risk of discrimination. Addressing this means conducting regular algorithmic audits, enforcing transparency, and ensuring diverse representation in AI development teams.

The Environmental Impact of AI

Training advanced AI models consumes enormous computational resources. The process can generate carbon emissions equivalent to hundreds of long-haul flights. To counter this, tech leaders are investing in renewable energy and designing energy-efficient processors and cooling systems.

However, sustainable AI practices should become the default, not the exception. From sourcing materials responsibly to rethinking hardware infrastructure, the focus must be on green innovation by design.

Embedding Sustainability at the Strategic Core

Sustainable AI practices work best when integrated into an organization’s core strategy. Aligning AI solutions with the UN’s Sustainable Development Goals (SDGs) can directly support climate action, reduce inequalities, and promote responsible consumption.

In the Middle East, initiatives like Saudi Arabia’s Vision 2030 and the UAE Strategy for Artificial Intelligence demonstrate how sustainability and AI can align with national priorities. These strategies not only meet ethical standards but also deliver competitive advantages, building consumer trust and fostering innovation.

Governance for Responsible AI

Strong governance is key to ensuring sustainable AI practices are upheld. Regulatory frameworks, such as the European Union’s AI Act, guide transparency, accountability, and fairness.

Governance should enable innovation while preventing harm. Public-private partnerships, global cooperation, and industry alliances are critical to creating ethical, scalable, and resilient AI ecosystems.

Preparing the Workforce for the AI Era

McKinsey estimates that AI adoption could displace up to 800 million jobs by 2030. Sustainable AI practices must include reskilling and upskilling initiatives to ensure inclusive economic growth.

By investing in training programs, organizations can help employees transition to new roles in AI-related fields. This proactive approach strengthens workforce agility and supports long-term resilience.

Leadership’s Role in Driving Sustainable AI Practices

AI can significantly advance sustainability goals, from optimizing supply chains to reducing environmental waste. Companies like Unilever are already using AI to achieve greener operations, proving its real-world potential.

Yet leadership commitment is essential. Executives must set measurable goals, model ethical behavior, and integrate sustainability into company culture. This ensures that sustainability is not a side project but a core business value.

The Shared Responsibility for a Sustainable AI Future

Creating a sustainable AI future requires collaboration between individuals, corporations, and governments. Citizens should stay informed and question how AI affects them. Companies must embed sustainability into their AI strategies, while governments need to establish policies that encourage responsible innovation.

By acting now, we can ensure AI evolves as a force for good—advancing technology without sacrificing ethics, equity, or environmental stewardship.

Check out our previous post on WHX Tech 2025 to Drive Global Digital Health Transformation

Continue Reading

Tech Features

Epicor CMO Kerrie Jordan to Drive Global Marketing Growth

Published

on

the-style-is-candid-image-photography-with-natural
Kerrie Jordan - Epicor
Kerrie Jordan – Epicor

Epicor CMO Kerrie Jordan has been appointed to lead the company’s global marketing strategy. This move marks a pivotal moment in the enterprise software leader’s expansion. Epicor, known for its industry-specific solutions for the make, move, and sell economy, announced the news on August 12, 2025, in Dubai.

Jordan brings a rare combination of senior product innovation and strategic marketing expertise. She will strengthen the Epicor brand, expand market reach, and deepen customer engagement worldwide.

Epicor CMO Kerrie Jordan Brings Product and Market Expertise Together

Vaibhav Vohra, Epicor President and Chief Product & Technology Officer, eVaibhav Vohra, Epicor President and Chief Product & Technology Officer, emphasized the importance of the appointment.

“Kerrie’s ability to connect product strategy with market execution makes her an ideal fit. Her leadership has already shaped our Cognitive ERP vision, and we’re excited to see her bring that same energy and insight to our marketing efforts.”

Since joining Epicor in 2023 as Group Vice President of Product Management and ISV Partner Programs, Jordan has advanced the company’s Cognitive ERP roadmap. This AI-driven approach turns ERP from a system of record into a system of action and insight, empowering supply chain businesses to operate smarter and faster.

A Vision for Accelerated Innovation and Growth

In her new role, Jordan will unite product innovation, analytics, and go-to-market strategies to accelerate customer time-to-value. She will also foster innovation and support Epicor’s global expansion.

“I’m honored to expand my role at Epicor,” Jordan said. “Epicor is at the forefront of enabling essential businesses to thrive through AI-driven, connected technologies. I look forward to amplifying our impact, building stronger relationships with customers and partners, and driving growth across global markets.”

A Career Built on Technology Leadership

Before joining Epicor, Jordan served in senior product marketing positions at Oracle. She developed strategies for enterprise software solutions and helped drive adoption. Earlier in her career, she led strategic marketing programs for technology clients during her consulting roles at global marketing firms.

Jordan is a recognized voice in cloud ERP, digital transformation, and supply chain innovation. She hosts Epicor’s “Manufacturing the Future” podcast, which features industry leaders discussing trends shaping manufacturing and supply chain sectors. She is also a Forbes Tech Council contributor. Jordan holds a Bachelor of Science in Marketing from Santa Clara University in California.

Epicor’s Commitment to Industry-Focused Growth

Epicor has served customers across automotive, building supply, distribution, manufacturing, and retail for more than 50 years. The company’s solutions are tailored to industry needs and adaptable to fast-changing market conditions.

Check out our previous post on WHX Tech 2025 to Drive Global Digital Health Transformation

Continue Reading

Tech Features

In-Hand Comfort Meets Elegant Design – A UI You’ll Love and Performance You Can Count On– Meet Oppo’s Reno 14 Series!

Published

on

Oppo Reno 14 Series promotional collage highlighting design and performance

In today’s crowded smartphone market, very few devices make a lasting impression from the first hold. The Oppo Reno 14 Series does exactly that. Its rounded front design, sharp edges, and striking Iridescent Mermaid finish give it a premium look that stands out. At just 7.42 mm thick and 187 g, with aluminium-framed edges, it feels light yet sturdy in the hand.

The 6.57-inch LTPS OLED display offers a 120 Hz Full HD+ experience with HDR10+ support and a peak brightness of 1,200 nits. While the brightness could be slightly higher, the rich colour tones make it ideal for streaming and gaming. The high refresh rate ensures smooth scrolling and responsive visuals.

Display & Performance in the Oppo Reno 14

Powered by the Snapdragon 6 Gen 1 mobile platform, paired with 12 GB of RAM and 512 GB of UFS 3.1 storage, the Oppo Reno 14 Series delivers fluid performance. Everyday tasks, multitasking, and gaming feel effortless. Even after a month of use, there’s no lag, and the phone remains cool under pressure.

The signal reception is equally reliable, performing well even in remote mountain regions. For gamers, the combination of smooth frame rates and strong connectivity makes it a dependable choice.

Camera Setup Built for Creativity

The Oppo Reno 14 Series brings a 32 MP front camera and a triple rear camera system (50 MP + 8 MP + 2 MP). It supports 4K 60 fps HDR video recording, delivering sharp and vibrant footage. Oppo’s image processing handles lighting well, although the AI can occasionally produce slightly artificial tones. When it dials back the processing, the results are impressively natural.

Selfies from the front camera are detailed, making it a strong option for content creators. AI-powered tools such as AI Eraser, AI Reflection Remover, AI Unblur, AI Recompose, and AI Perfect Shot add versatility. Beyond photography, features like real-time translation and cloud-based voice transcription offer extra value.

Battery Life & Charging Speed on the Oppo Reno 14

Battery performance is one of the standout features. The massive 6,000 mAh battery easily lasts over a day of heavy use. Paired with 80 W fast charging, it goes from 0% to 100% in just 40–50 minutes, reducing downtime significantly.

Software and User Experience

Running on ColorOS 15, the interface is polished and responsive. The design is intuitive, though it comes with pre-installed apps that many users may want to remove for a cleaner setup. The combination of IP69 water and dust resistance, strong haptics, and a promised five years of major updates enhances its long-term value.

Verdict: A Strong Contender in Its Price Range

The Oppo Reno 14 Series blends premium design, solid performance, long battery life, and camera versatility into a package that offers excellent value. Whether for everyday use, creative projects, or gaming, it meets a wide range of needs without compromise.

For readers who enjoyed this review, check out our previous feature on Sustainable Tech: How Globant Shapes a Greener Tomorrow to see how innovation is shaping the tech industry.

Continue Reading

Trending

Copyright © 2023 | The Integrator