Ciberseguridad en #espacio: cómo se está enfrentando Thales a los desafíos que están por llegar
Alias: APT-C-06, DUBNIUM, DarkHotel, Fallout Team, Karba, Luder, Nemim, Nemin, Pioneer, SIG25, Shadow Crane, Tapaoux
ATK52 (aka: DarkHotel) is a Korean speaking attacker. While some have attributed this attacker to North Korea, notably due to the overlap between the group and ATK4, there is a consensus linking this threat actor to South Korea instead. This actor targets government entities, especially in the diplomatic, defense and law enforcement. It is especially active in the Sea of Japan and the East China Sea. Its goal is espionage of specific individuals. The group possesses extended cryptographic knowledge, that allowed it to create fake certificate, a capacity do develop and use 0-days (especially around Flash Player). It also has access to an extended network infrastructure that is reliable, allowing the group to maintain long-term access to the system.
In January 2020, a few days after Microsoft stopped Windows 7 support, DarkHotel used the DoubleStar 0day (CVE-2019-17026?CVE-2020-067) to attack Chinese government-related commerce agencies
REFERENCES