16 October 2024

Nation-state hackers increasingly collaborate with cybercrooks to gather intelligence


Nation-state hackers increasingly collaborate with cybercrooks to gather intelligence

Microsoft said it observed an increase in cyber activity linked to nation-state actors collaborating with cybercriminals over the past year, targeting critical sectors including military, aerospace, and defense.

According to Microsoft’s report on digital threats, Russian state-backed hacker groups have been outsourcing cyberespionage tasks to cybercriminal groups, particularly those targeting Ukraine. In a June 2024 incident, a suspected cybercrime group deployed commodity malware, compromising at least 50 devices belonging to the Ukrainian military. Nearly 75% of Russian targets were in Ukraine or a NATO member state, Microsoft said.

Iranian nation-state actors have also expanded their tactics, using ransomware aspart of influence operations targeting, in particular, Israel. The campaign focused on a compromised Israeli dating website, with the attackers offering to erase individual profiles from their stolen database for a fee. Simultaneously, Iranian actors have exploited both the Israel-Hamas conflict and the Russia-Ukraine war to intensify disinformation campaigns across digital platforms.

North Korea, known for its financially motivated cyberattacks, is now also deploying ransomware as part of its operations. A new North Korean actor was linked to a custom ransomware variant dubbed “FakePenny,” used to target aerospace and defense companies. The attacks focused on exfiltrating sensitive data before locking networks, combining intelligence gathering with monetization efforts.

While China’s cyber operations have not shown significant shifts in geography or targeting tactics, Taiwan and Southeast Asia remain primary focus. Chinese threat actors have increasingly experimented with artificial intelligence (AI), using AI-generated imagery in disinformation campaigns to influence public perception, though no significant impact has been observed in terms of audience manipulation.

Additionally, Microsoft noted a 2.75x rise in ransomware attacks year-over-year. However, the number of ransomware attacks reaching the encryption stage has dropped threefold, likely due to improved cybersecurity measures. The leading initial access methods remain social engineering tactics, including phishing, identity theft, and exploiting unpatched systems.

Tech scams have also increased 400% since 2022. Microsoft recorded a surge from 7,000 daily scam attempts in 2023 to 100,000 in 2024. Over 70% of malicious infrastructure remains active for less than two hours, complicating detection and response efforts, the company said.


Back to the list

Latest Posts

Nation-state hackers increasingly collaborate with cybercrooks to gather intelligence

Nation-state hackers increasingly collaborate with cybercrooks to gather intelligence

Russian state-backed hackers have been outsourcing cyberespionage tasks to cybercriminals, particularly those targeting Ukraine.
16 October 2024
North Korean APT37 exploited IE zero-day to infect targets with malware

North Korean APT37 exploited IE zero-day to infect targets with malware

The attackers first compromised the server of the Korean online advertising agency and injected malicious code in the server’s ad content script.
16 October 2024
Finnish authorities dismantle Sipulitie darknet marketplace, seize servers

Finnish authorities dismantle Sipulitie darknet marketplace, seize servers

The online marketplace, which served both Finnish and English-speaking users, boasted a turnover of €1.3 million.
16 October 2024