APT35
APT35 is a known hacking group that needs to be researched and this article updated.
APT35 is an advanced persistent threat (APT) group that has been active since at least 2014 and continues to target organizations in various industries, including government agencies, military contractors, media outlets, telecommunications companies, and more. The group\\\'s primary focus appears to be on espionage activities related to stealing sensitive information such as intellectual property, trade secrets, and confidential business plans. APT35 has been linked to the Iranian government by cybersecurity researchers due to its use of malware tools that have previously been associated with other known Iranian threat groups. The group\\\'s tactics include spear-phishing emails, watering hole attacks, and targeted social engineering campaigns.
Techniques, tactics and practices: APT35 has been linked to several TTPs that include spear-phishing emails, watering hole attacks, targeted social engineering campaigns, use of malware tools associated with other Iranian threat groups such as OilRig and Charming Kitten. The group also employs techniques like using legitimate software or services to hide their activities from detection by security systems. They have been known to exploit vulnerabilities in popular software programs and operating systems, as well as targeting unpatched systems with outdated software versions. APT35 has also used various methods of exfiltration such as FTP, SCP, and HTTPS protocols to transfer stolen data from compromised networks back to their command-and-control servers located in Iran.