National Cyber Warfare Foundation (NCWF)

BITTER


0 user ratings
2024-06-18 15:21:22
blscott

 - archive -- 

BITTER

MITRE:  G1002

Bitter is a known alias of the APT group APT47

BITTER is a suspected South Asian cyber espionage threat group that has been active since at least 2013. BITTER has targeted government, energy, and engineering organizations in Pakistan, China, Bangladesh, and Saudi Arabia.


BITTER is an advanced persistent threat (APT) that targets industrial control systems and critical infrastructure, such as power plants, water treatment facilities, and transportation networks. It has been active since at least 2017 and uses a variety of techniques to evade detection by security software, including stealthy malware delivery methods, sophisticated encryption algorithms, and the use of legitimate tools like PowerShell for command-and-control (C&C) communication. BITTER is believed to be associated with Russian state-sponsored hacking groups, such as APT28/Fancy Bear or Sofacy Group.\\
\\
Techniques, tactics and practices: \\
\\
BITTER uses a variety of techniques to evade detection by security software, including stealthy malware delivery methods such as spear-phishing emails or watering hole attacks that target specific websites frequented by the intended victim. It also employs sophisticated encryption algorithms and the use of legitimate tools like PowerShell for command-and-control (C&C) communication, making it difficult to detect by traditional security measures. Additionally, BITTER is known to have a high degree of persistence in its attacks, often remaining undetected within an organization\\\'s network for extended periods of time before carrying out its intended actions.



Comments
new comment
Nobody has commented yet. Will you be the first?


Primary Names
APT47
 




This link is from a restricted area of the forums.
Forum



Copyright 2012 through 2025 - National Cyber Warfare Foundation - All rights reserved worldwide.