Advertisement · 728 × 90
#
Hashtag
#ChinaAPT
Advertisement · 728 × 90
Preview
Probing the DNS Depths of PeckBirdy Trend Micro's report exposes PeckBirdy, a JavaScript-based C2 framework used by China-aligned APTs since 2023 and linked to modular backdoors (HOLODONUT, MKDOOR), stolen code-signing certificates, Cobalt Strike payloads, and exploits including CVE-2020-16040. Researchers analyzed 56 IoCs (domains, subdomains, IPs, WHOIS emails), confirmed many as illegitimate or previously weaponized, and published sample artifacts and full findings for download. #PeckBirdy #HOLODONUT

Trend Micro uncovers PeckBirdy, a JavaScript C2 framework linked to China-aligned APTs since 2023. Tied to modular backdoors, stolen certificates, Cobalt Strike, and CVE-2020-16040 exploits. #PeckBirdy #ChinaAPT #CodeSigning

1 0 0 0
Post image

China Hacked Downing Street Phones
Read More: buff.ly/ejGjfrj

#CyberEspionage #ChinaAPT #NationStateThreats #UKSecurity #GovernmentCyber #MobileSecurity #ThreatIntel #Infosec #Geopolitics

0 0 0 0
Post image

China Linked Hackers Exploit VMware ESXi
Read More: buff.ly/0K51dH5

#VMwareESXi #ChinaAPT #SonicWallExploit #VirtualizationSecurity #VMEscape #ThreatIntel #EnterpriseSecurity #RansomwarePrep

0 0 0 0
Post image

Mustang Panda Uses Signed Rootkit
Read More: buff.ly/jrfVltj

#MustangPanda #ChinaAPT #SignedRootkit #TONESHELL #CyberEspionage #AdvancedPersistentThreat #ThreatIntel #NationStateCyber #EndpointEvasion

0 0 0 0
Post image

China Group Abuses Windows Policy
Read More: buff.ly/yUlYuGH

#LongNosedGoblin #ChinaAPT #CyberEspionage #GroupPolicyAbuse #LivingOffTheLand #CloudAbuse #NationStateThreats #ThreatIntel

0 0 0 0
Post image

China Group Hacks Governments With Malware
Read More: buff.ly/NlnMX7F

#Jewelbug #InkDragon #ChinaAPT #CyberEspionage #GovernmentHacking #TelecomSecurity #LivingOffTheLand #NationStateThreat #AdvancedPersistentThreat

0 0 0 0
Post image

Stone Panda (APT 10) is still active across the globe in 2025.
• State-sponsored ops tied to China’s MSS
• Targets: healthcare, defense, academia
• Tools: Mimikatz, BloodHound, Impacket
• Active in the U.S., UK, Japan, India + more

#CyberEspionage #ChinaAPT #ThreatActor #Cyble

0 0 0 0
PRC State Actors Compromise Global Networks

~Cisa~
PRC state-sponsored actors exploit known CVEs in network edge devices (Cisco, Ivanti, Palo Alto) for global espionage and persistent access.
-
IOCs: 1. 222. 84. 29, 167. 88. 173. 252, 37. 120. 239. 52
-
#ChinaAPT #SaltTyphoon #ThreatIntel

0 0 0 0

3/3:
CrowdStrike warns: Murky Panda is a sophisticated espionage actor with advanced OPSEC, custom malware, and a focus on cloud supply-chain attacks. Organizations must monitor Entra ID, enforce MFA, and patch exposed services.
#ThreatIntel #ChinaAPT #CloudSecurity

0 0 0 0
Post image

Salt Typhoon (aka GhostEmperor) has hit critical US sectors incl. telecom, military & gov networks. FBI & Canada warn of its stealth ops. This isn't just cybercrime-it's strategic intel warfare.
#CyberSecurity #SaltTyphoon #APT #InfoSec #NationalGuard #ChinaAPT #CyberEspionage

0 0 0 0