Home Business 9 active threat actors that currently target organisations in Africa

Advanced Persistent Threats (APT) groups are complex threat actors that carry out targeted assaults over long periods. These organizations are frequently driven by espionage, financial gain, or, in some cases, hacktivism. According to Kaspersky Intelligence, MuddyWater, FruityArmor, and Sidewinder are among the region’s most prominent organizations. Kaspersky collaborates with law enforcement, providing them with the intelligence to track down the cybercriminals behind these assaults.

These threat actors utilize various methods to penetrate their targets in the region. Social engineering is a typical method employed on social media or via email, such as placing a bogus job advertisement for software developers. APT organizations also utilize complex modular malware such as DeadGlyph and StealerBot, as well as weaponizing legal remote apps, internet services, and cloud platforms – a method used by the MuddyWater APT gang to access the targeted site. Furthermore, these organizations might target third-party suppliers and enter their victims via the supply chain.

“The current geopolitical climate is a hotbed for APT activity; therefore, investigating these attacks and gaining intelligence on their movement is vital for security teams and corporations in Africa. Our research allows businesses and government entities to determine the significance of the threat posed, understand the attackers’ next move, and accordingly be able to take the appropriate security steps to protect themselves,” said Amin Hasbini, Head of Global Research and Analysis team for Middle East, Turkiye and Africa at Kaspersky.

With each APT investigation, Kaspersky’s Global Research and Analysis Team (GReAT) produces thorough findings that are available on Kaspersky’s Threat Intelligence Portal. These reports, due to their thoroughness, provide critical APT detection and forensic capabilities, instilling confidence in the audience about the accuracy and reliability of the information, allowing for efficient mitigation and treatment.

Read more: Kaspersky website

130 views 2 minutes read