This data-stealing malware waits for you to click a mouse button three times before going into action Cyber-espionage campaign is thought to be the work of Ke3chang, an ATP hacking group which has been active for ten years July 18, 2019 https://www.zdnet.com/article/this-...-button-three-times-before-going-into-action/ ESET: Okrum: Ke3chang group targets diplomatic missions (PDF - 980 KB): https://www.welivesecurity.com/wp-content/uploads/2019/07/ESET_Okrum_and_Ketrican.pdf
Hacking group builds new Ketrum malware from recycled backdoors May 26, 2020 https://www.bleepingcomputer.com/ne...s-new-ketrum-malware-from-recycled-backdoors/ Intezer: The Evolution of APT15’s Codebase 2020
Connection discovered between Chinese hacker group APT15 and defense contractor July 2, 2020 https://www.zdnet.com/article/conne...se-hacker-group-apt15-and-defense-contractor/
Going Down the Spyware Rabbit Hole with SilkBean Mobile Malware An Android spyware attack was recently discovered that targeted the Uyghur ethnic minority group – since 2013 July 22, 2020 https://threatpost.com/going-down-the-spyware-rabbit-hole-with-silkbean-mobile-malware/157619/
Chinese APT Group Vixen Panda Targets Iranian Government Entities By Alessandro Mascellino @a_mascellino - January 18, 2023 Palo Alto Networks - Unit42: Chinese Playful Taurus Activity in Iran